From patchwork Tue Dec 8 08:00:23 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Corentin Labbe X-Patchwork-Id: 7795461 X-Patchwork-Delegate: herbert@gondor.apana.org.au Return-Path: X-Original-To: patchwork-linux-crypto@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork2.web.kernel.org (Postfix) with ESMTP id 2C1D6BEEE1 for ; Tue, 8 Dec 2015 08:01:03 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 2685920532 for ; Tue, 8 Dec 2015 08:01:02 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 158002045A for ; Tue, 8 Dec 2015 08:01:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753374AbbLHIBA (ORCPT ); Tue, 8 Dec 2015 03:01:00 -0500 Received: from mail-wm0-f51.google.com ([74.125.82.51]:35788 "EHLO mail-wm0-f51.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753344AbbLHIA7 (ORCPT ); Tue, 8 Dec 2015 03:00:59 -0500 Received: by wmuu63 with SMTP id u63so170724761wmu.0; Tue, 08 Dec 2015 00:00:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:subject:date:message-id; bh=1xXFDndBZ6IiTKA4hOa1Y2OyVhOdRiHiqWhshNSoQc8=; b=bwV0UUfxh+4VlNgqcgqDHUI+RoylhtIRZOhn5ANuuwq2hrPBWbas3wAkqqlgS+CWn+ 0U6ckS/pgoTwrwjBtNX4xsI/X40ZgVHkMdj2eLd9K+sYPAFpIMI0X5jkK3P5k4/KHzvu mG8hVTjBJM7kbBEj6kEJHalI93hqTs6yWuZgpNTyjeANKJRNamupRdz/J5uPZWU/h+VZ 9qWaFToLDh2flW1VBwcyUaWcktf03gru+K3q1lMv8vjf35v2UGqUv9wnbo7qeCVufpDg VJ6KEAqOl3ZnuKoDzOZkNfjECMMt8UvknQtAoOghQbXGHjPYaw74HhKLur5cTEdFi6PD f3YA== X-Received: by 10.28.158.75 with SMTP id h72mr2829830wme.74.1449561656070; Tue, 08 Dec 2015 00:00:56 -0800 (PST) Received: from Red.local (ANice-651-1-254-254.w86-205.abo.wanadoo.fr. [86.205.38.254]) by smtp.googlemail.com with ESMTPSA id z13sm1714773wjr.47.2015.12.08.00.00.54 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 08 Dec 2015 00:00:55 -0800 (PST) From: LABBE Corentin To: davem@davemloft.net, herbert@gondor.apana.org.au Cc: LABBE Corentin , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] crypto: akcipher: fix typos in include/crypto/akcipher.h Date: Tue, 8 Dec 2015 09:00:23 +0100 Message-Id: <1449561627-6085-1-git-send-email-clabbe.montjoie@gmail.com> X-Mailer: git-send-email 2.4.10 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED, FREEMAIL_FROM, RCVD_IN_DNSWL_HI, T_DKIM_INVALID, T_RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Fix numerous spelling error in include/crypto/akcipher.h Signed-off-by: LABBE Corentin --- include/crypto/akcipher.h | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/include/crypto/akcipher.h b/include/crypto/akcipher.h index 45cd5b3..354de15 100644 --- a/include/crypto/akcipher.h +++ b/include/crypto/akcipher.h @@ -21,9 +21,9 @@ * @src: Source data * @dst: Destination data * @src_len: Size of the input buffer - * @dst_len: Size of the output buffer. It needs to be at leaset + * @dst_len: Size of the output buffer. It needs to be at least * as big as the expected result depending on the operation - * After operation it will be updated with the acctual size of the + * After operation it will be updated with the actual size of the * result. * In case of error where the dst sgl size was insufficient, * it will be updated to the size required for the operation. @@ -59,7 +59,7 @@ struct crypto_akcipher { * algorithm. In case of error, where the dst_len was insufficient, * the req->dst_len will be updated to the size required for the * operation - * @encrypt: Function performs an encrytp operation as defined by public key + * @encrypt: Function performs an encrypt operation as defined by public key * algorithm. In case of error, where the dst_len was insufficient, * the req->dst_len will be updated to the size required for the * operation @@ -73,7 +73,7 @@ struct crypto_akcipher { * @set_priv_key: Function invokes the algorithm specific set private key * function, which knows how to decode and interpret * the BER encoded private key - * @max_size: Function returns dest buffer size reqired for a given key. + * @max_size: Function returns dest buffer size required for a given key. * @init: Initialize the cryptographic transformation object. * This function is used to initialize the cryptographic * transformation object. This function is called only once at @@ -232,7 +232,7 @@ static inline void akcipher_request_set_callback(struct akcipher_request *req, } /** - * akcipher_request_set_crypt() -- Sets reqest parameters + * akcipher_request_set_crypt() -- Sets request parameters * * Sets parameters required by crypto operation *