From patchwork Mon Oct 12 16:53:43 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Corentin Labbe X-Patchwork-Id: 7377861 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: X-Original-To: patchwork-linux-crypto@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork2.web.kernel.org (Postfix) with ESMTP id 02EB9BEEA4 for ; Mon, 12 Oct 2015 16:56:09 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 28328205CB for ; Mon, 12 Oct 2015 16:56:08 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 457FC2047C for ; Mon, 12 Oct 2015 16:56:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751592AbbJLQyb (ORCPT ); Mon, 12 Oct 2015 12:54:31 -0400 Received: from mail-wi0-f172.google.com ([209.85.212.172]:37424 "EHLO mail-wi0-f172.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752069AbbJLQy3 (ORCPT ); Mon, 12 Oct 2015 12:54:29 -0400 Received: by wijq8 with SMTP id q8so66857809wij.0; Mon, 12 Oct 2015 09:54:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=/J2tFdZIG7T70Pt90G5OrzObgG3dBFg4zSIEJcO0HUo=; b=qVyW01VARBUiR3LPEeA18Ob1NxVCLALGLr8hlkiGgGrku6KszZ9QRV8hEkhzU0dfqg sQRYTv/3OD5dlR50bdW89nd0EUkp4emMYEnF8E3pS0s+/hTkiCfT5X1j3rpkOZVVWOLx NrNfoJi6boDRTtWNqu6gk1hiv9RurwIlRzictT+yG2kwsK7lKWFqnS7pIz8yhzbL3qoS SSylxAjMxZaT2Bq4FzrZHjFsx3yYNZwhBYI2JC48HMb8feo8A1KKq2hokt4aswFhUmox jjc87s/CGYURd8M5d8dT980fdvNlGHKH2jOHRtELG84Ej42zS99TSlt0bbT1U0a+Pjvw r0Pg== X-Received: by 10.194.57.242 with SMTP id l18mr30677636wjq.34.1444668868242; Mon, 12 Oct 2015 09:54:28 -0700 (PDT) Received: from Red.local (ANice-651-1-429-185.w83-201.abo.wanadoo.fr. [83.201.253.185]) by smtp.googlemail.com with ESMTPSA id s16sm11548506wik.16.2015.10.12.09.54.27 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 12 Oct 2015 09:54:27 -0700 (PDT) From: LABBE Corentin To: herbert@gondor.apana.org.au, davem@davemloft.net, thomas.lendacky@amd.com, geert+renesas@glider.be, ulf.hansson@linaro.org, wsa@the-dreams.de, keescook@chromium.org, maxime.ripard@free-electrons.com Cc: linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, LABBE Corentin Subject: [PATCH 5/8] crypto: akcipher: fix typos in include/crypto/akcipher.h Date: Mon, 12 Oct 2015 18:53:43 +0200 Message-Id: <1444668826-6531-6-git-send-email-clabbe.montjoie@gmail.com> X-Mailer: git-send-email 2.4.9 In-Reply-To: <1444668826-6531-1-git-send-email-clabbe.montjoie@gmail.com> References: <1444668826-6531-1-git-send-email-clabbe.montjoie@gmail.com> Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED, FREEMAIL_FROM, RCVD_IN_DNSWL_HI, T_DKIM_INVALID, T_RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Fix numerous spelling error in include/crypto/akcipher.h Signed-off-by: LABBE Corentin --- include/crypto/akcipher.h | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/include/crypto/akcipher.h b/include/crypto/akcipher.h index 69d163e..0c9fa68 100644 --- a/include/crypto/akcipher.h +++ b/include/crypto/akcipher.h @@ -19,12 +19,12 @@ * * @base: Common attributes for async crypto requests * @src: Pointer to memory containing the input parameters - * The format of the parameter(s) is expeted to be Octet String - * @dst: Pointer to memory whare the result will be stored + * The format of the parameter(s) is expected to be Octet String + * @dst: Pointer to memory where the result will be stored * @src_len: Size of the input parameter - * @dst_len: Size of the output buffer. It needs to be at leaset + * @dst_len: Size of the output buffer. It needs to be at least * as big as the expected result depending on the operation - * After operation it will be updated with the acctual size of the + * After operation it will be updated with the actual size of the * result. In case of error, where the dst_len was insufficient, * it will be updated to the size required for the operation. * @__ctx: Start of private context data @@ -59,7 +59,7 @@ struct crypto_akcipher { * algorithm. In case of error, where the dst_len was insufficient, * the req->dst_len will be updated to the size required for the * operation - * @encrypt: Function performs an encrytp operation as defined by public key + * @encrypt: Function performs an encrypt operation as defined by public key * algorithm. In case of error, where the dst_len was insufficient, * the req->dst_len will be updated to the size required for the * operation @@ -224,7 +224,7 @@ static inline void akcipher_request_set_callback(struct akcipher_request *req, } /** - * akcipher_request_set_crypt() -- Sets reqest parameters + * akcipher_request_set_crypt() -- Sets request parameters * * Sets parameters required by crypto operation * @@ -233,7 +233,7 @@ static inline void akcipher_request_set_callback(struct akcipher_request *req, * @dst: ptr of output parameter * @src_len: size of the input buffer * @dst_len: size of the output buffer. It will be updated by the - * implementation to reflect the acctual size of the result + * implementation to reflect the actual size of the result */ static inline void akcipher_request_set_crypt(struct akcipher_request *req, void *src, void *dst,