From patchwork Tue Oct 20 07:34:01 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Corentin Labbe X-Patchwork-Id: 7442621 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: X-Original-To: patchwork-linux-crypto@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork2.web.kernel.org (Postfix) with ESMTP id E083FBEEA4 for ; Tue, 20 Oct 2015 07:36:09 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 19A9520561 for ; Tue, 20 Oct 2015 07:36:09 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 28C5D2052F for ; Tue, 20 Oct 2015 07:36:08 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753117AbbJTHfc (ORCPT ); Tue, 20 Oct 2015 03:35:32 -0400 Received: from mail-wi0-f175.google.com ([209.85.212.175]:33289 "EHLO mail-wi0-f175.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752892AbbJTHeW (ORCPT ); Tue, 20 Oct 2015 03:34:22 -0400 Received: by wijp11 with SMTP id p11so33258504wij.0; Tue, 20 Oct 2015 00:34:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=3+998Zme+AmucngfslfMGLukZhDhvy0mVOnj7H1JAU0=; b=RHUD+Tsddj+bOn8Gitk4sfLyfVTLeboyw956kbEzzOnj/sgGRdt1qgqqtkaPDPuPN3 1kyZcAuX6877SUNwWpUv8GX/UptNYuR19uYEhr/PMZZTWTHx1R7erFAJCgYW2kd9cyF1 NA4ko4iBxZxuUnV2h1BGTsI70GKwFDxZAb61lwNaD/dn13V4qD5OwSg8lb1p7C3GD9uE pIP+F6v7OsRS5RngZwAGDoLoUTvpZ1LR8lGRdwUfr0xW9pvoZ/eVGjHpPv7RioTB85wR Is5HfcfpSMJatFouJHfskvD3YVBPwlQzbSFNTJ49L1g2xYfuDhDlbdOUhi0dtpCBhGCg Hs3w== X-Received: by 10.180.34.38 with SMTP id w6mr23506055wii.78.1445326461546; Tue, 20 Oct 2015 00:34:21 -0700 (PDT) Received: from Red.local (ANice-651-1-191-74.w83-197.abo.wanadoo.fr. [83.197.127.74]) by smtp.googlemail.com with ESMTPSA id q1sm2006209wje.39.2015.10.20.00.34.20 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 20 Oct 2015 00:34:21 -0700 (PDT) From: LABBE Corentin To: davem@davemloft.net, herbert@gondor.apana.org.au Cc: LABBE Corentin , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 5/8] crypto: akcipher: fix typos in include/crypto/akcipher.h Date: Tue, 20 Oct 2015 09:34:01 +0200 Message-Id: <1445326444-11019-6-git-send-email-clabbe.montjoie@gmail.com> X-Mailer: git-send-email 2.4.10 In-Reply-To: <1445326444-11019-1-git-send-email-clabbe.montjoie@gmail.com> References: <1445326444-11019-1-git-send-email-clabbe.montjoie@gmail.com> Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED, FREEMAIL_FROM, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, T_DKIM_INVALID, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Fix numerous spelling error in include/crypto/akcipher.h Signed-off-by: LABBE Corentin --- include/crypto/akcipher.h | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/include/crypto/akcipher.h b/include/crypto/akcipher.h index 69d163e..0c9fa68 100644 --- a/include/crypto/akcipher.h +++ b/include/crypto/akcipher.h @@ -19,12 +19,12 @@ * * @base: Common attributes for async crypto requests * @src: Pointer to memory containing the input parameters - * The format of the parameter(s) is expeted to be Octet String - * @dst: Pointer to memory whare the result will be stored + * The format of the parameter(s) is expected to be Octet String + * @dst: Pointer to memory where the result will be stored * @src_len: Size of the input parameter - * @dst_len: Size of the output buffer. It needs to be at leaset + * @dst_len: Size of the output buffer. It needs to be at least * as big as the expected result depending on the operation - * After operation it will be updated with the acctual size of the + * After operation it will be updated with the actual size of the * result. In case of error, where the dst_len was insufficient, * it will be updated to the size required for the operation. * @__ctx: Start of private context data @@ -59,7 +59,7 @@ struct crypto_akcipher { * algorithm. In case of error, where the dst_len was insufficient, * the req->dst_len will be updated to the size required for the * operation - * @encrypt: Function performs an encrytp operation as defined by public key + * @encrypt: Function performs an encrypt operation as defined by public key * algorithm. In case of error, where the dst_len was insufficient, * the req->dst_len will be updated to the size required for the * operation @@ -224,7 +224,7 @@ static inline void akcipher_request_set_callback(struct akcipher_request *req, } /** - * akcipher_request_set_crypt() -- Sets reqest parameters + * akcipher_request_set_crypt() -- Sets request parameters * * Sets parameters required by crypto operation * @@ -233,7 +233,7 @@ static inline void akcipher_request_set_callback(struct akcipher_request *req, * @dst: ptr of output parameter * @src_len: size of the input buffer * @dst_len: size of the output buffer. It will be updated by the - * implementation to reflect the acctual size of the result + * implementation to reflect the actual size of the result */ static inline void akcipher_request_set_crypt(struct akcipher_request *req, void *src, void *dst,