From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f178.google.com (mail-pf1-f178.google.com [209.85.210.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EB0503A6B8C for ; Fri, 13 Mar 2026 14:53:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.178 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773413617; cv=none; b=KfGDX0i703az34CrsIkgZaZf+wVX1J5mHkVLN/PiybMKf895uBy6Z1VVNQkOrytQXtTRUA3JM1JtxNbg/yF45xwXjofsXoO63ofQtBlALZVMbQ3RU2nAgiG6PKTVXq5BljYJ5L54UGt4tvZLwbvGe4ckc8vKUuMBr2w7eiD5vdc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773413617; c=relaxed/simple; bh=mdwBFN8K5RDWuWmVmv54KlMzvSeOOo5UhSbsJBxJ9ZE=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=NaSsjhZHDGMTQvR50bmm2lCiMvTRu4InrjCa9iu7oRqlLIY1AbSBxi24DUYL2MKb08nNg3gZaJmXetxCBOB658kcsq2cvSwv6Gqe5QFoaKP1MVDUiDU3kbnAClq3rtEgIJOevXBIrmavBQz+S03Rv8nCUQjQI2n+xc9Z4fBGm8c= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=mxFD9SvI; arc=none smtp.client-ip=209.85.210.178 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="mxFD9SvI" Received: by mail-pf1-f178.google.com with SMTP id d2e1a72fcca58-829b2019b39so1317775b3a.3 for ; Fri, 13 Mar 2026 07:53:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1773413615; x=1774018415; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=Yhl5+IeUuVzO44nLBI8orasuKnNyReJagrIJl9tDNnw=; b=mxFD9SvIOTPlP0Ll+aTtVOCi4doNUYq2TA+x1MQUiGIJKRKblh4i/EVQLlB08K8fHF ejU2EI9P5+66/dmSqKQmE3+2ELeh/+oZy8Sn7NFL8qRDYtg+awPXgGsD6vcQCHJe4UYD qEfI6znndNj6sVGrUCPOQbSQU1owX/cU7C8gFNHU/SB5A1vVPlVF2I/pKi1FmqAAYY/p j7zlFksAC3aZTF6kzrFzsz2HpCHFh8PvrQkWmhduNuvEMtYhODiwiXUfHMQLN4OmgorK 8y82zodbUXwjyFC4TI23etfSazqfFSQmyfr9fn6hjvk+YQfNKH+b6JDexK8PqSftZOzw 35wA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1773413615; x=1774018415; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=Yhl5+IeUuVzO44nLBI8orasuKnNyReJagrIJl9tDNnw=; b=XW4a5Rk7HZyHf4IYZ++osoNilNrSrJ4IgZw0ABkljyYl1yzm4T29qAxYHjXZwQMxjW H2f8u5KXPb0AAn2H4QLwUm1wQlUeLr2L2uldqRtbbMhrenq2CgRb02a/HIRRSgjYC/l5 p12l5rakW8FsiTnHvzmtewplGil7jUoBV4fMSeonViQucN9WBuuT8VUx1T4X5EJs+o7D 7lCGdWGDixEBvo/3ZSQUbxyJOdG3lV/VxGLU95NnSrANufjx+QZqH0IdRythtenwQDKf zkDnqzt1zN/Tbl3sNm6PUa+9FaI0xTpQJD4KTPUZ7yw+PxyS5Bm64NEWYllpjVz14Dja utjA== X-Forwarded-Encrypted: i=1; AJvYcCUM53eqGVQwUntG+hNh6n6hdXpkTLOUm36pmAztopQcVYoOrrY/l6DFsmg1r11scziq35knkaM7M23U7xY=@vger.kernel.org X-Gm-Message-State: AOJu0YwdDasr/SDZSViOgSgrja6jWjnDYa0t6+xa3DRMzLFzhIfCd3/Y JZxcJ0FVczhxItK/tBL3qvY/aLWIrgvwho8GGvdrpLkZIvRaIO/xkPrE X-Gm-Gg: ATEYQzyrjTnKIn31vpUEVQEZSfztzD+n01kLAGIQKkrRGm+g0wxThf23A5klzdWUabz EnUGlqNzneF1wYwvJWYNMGfLktzjK+vW0Xoa6QXssMmBbGqR19RW49h6r8ttK/qEj0OwadVfDKm x4JXoBQDch89Tecar0AlJGVOJFoGpqSlcYGW+i2tJn2U5LuxZR9R78ef8zxcLTBss0igfAreK7B 32qXXGLoXg0jW9c6iQOs8Ytrnz0AUPH0UnHI106VNtrOWDWnBxHbvrvuXvji7Oi2Jtuw3IXxN+F Fvf4sYGK2h5fU7lKG8iehdtDo/fu7F4fOXtoqo7YzkmJRwh1y8kIO/fl+g+cAQRc+lNHEK4EGL1 kAdkIxlQkGsPRyyvjoPW9rfuuIyfrh5SZNmdXdEHy0cx02Go8BfZEuB/FqlP1SyFMOKP4WQSBvB SjFDdGvNiOVEAOKIEYIAelXsAUi2Gua0U5ItIy6ysS X-Received: by 2002:a05:6a00:138e:b0:81f:9b4c:81c0 with SMTP id d2e1a72fcca58-82a198b80e0mr3296300b3a.41.1773413615208; Fri, 13 Mar 2026 07:53:35 -0700 (PDT) Received: from x540up.localdomain ([2408:8340:a629:1ce0:feaa:76fa:efb7:a761]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-82a0738564csm5352372b3a.58.2026.03.13.07.53.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 Mar 2026 07:53:34 -0700 (PDT) From: Sun Chaobo To: herbert@gondor.apana.org.au, davem@davemloft.net Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, suncoding913@gmail.com Subject: [PATCH] crypto: Fix several spelling mistakes in comments Date: Fri, 13 Mar 2026 22:52:57 +0800 Message-ID: <20260313145257.41937-1-suncoding913@gmail.com> X-Mailer: git-send-email 2.53.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Fix several typos in comments and messages. No functional change. Signed-off-by: Sun Chaobo --- crypto/drbg.c | 2 +- crypto/lrw.c | 2 +- crypto/tcrypt.c | 2 +- crypto/tea.c | 2 +- crypto/xts.c | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/crypto/drbg.c b/crypto/drbg.c index 1ed209e5d..9204e6edb 100644 --- a/crypto/drbg.c +++ b/crypto/drbg.c @@ -1780,7 +1780,7 @@ static inline int __init drbg_healthcheck_sanity(void) max_addtllen = drbg_max_addtl(drbg); max_request_bytes = drbg_max_request_bytes(drbg); drbg_string_fill(&addtl, buf, max_addtllen + 1); - /* overflow addtllen with additonal info string */ + /* overflow addtllen with additional info string */ len = drbg_generate(drbg, buf, OUTBUFLEN, &addtl); BUG_ON(0 < len); /* overflow max_bits */ diff --git a/crypto/lrw.c b/crypto/lrw.c index dd403b800..aa31ab03a 100644 --- a/crypto/lrw.c +++ b/crypto/lrw.c @@ -134,7 +134,7 @@ static int lrw_next_index(u32 *counter) /* * We compute the tweak masks twice (both before and after the ECB encryption or * decryption) to avoid having to allocate a temporary buffer and/or make - * mutliple calls to the 'ecb(..)' instance, which usually would be slower than + * multiple calls to the 'ecb(..)' instance, which usually would be slower than * just doing the lrw_next_index() calls again. */ static int lrw_xor_tweak(struct skcipher_request *req, bool second_pass) diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c index aded37546..6374c86a1 100644 --- a/crypto/tcrypt.c +++ b/crypto/tcrypt.c @@ -2817,7 +2817,7 @@ static int __init tcrypt_mod_init(void) pr_debug("all tests passed\n"); } - /* We intentionaly return -EAGAIN to prevent keeping the module, + /* We intentionally return -EAGAIN to prevent keeping the module, * unless we're running in fips mode. It does all its work from * init() and doesn't offer any runtime functionality, but in * the fips case, checking for a successful load is helpful. diff --git a/crypto/tea.c b/crypto/tea.c index cb05140e3..7c66efcb5 100644 --- a/crypto/tea.c +++ b/crypto/tea.c @@ -2,7 +2,7 @@ /* * Cryptographic API. * - * TEA, XTEA, and XETA crypto alogrithms + * TEA, XTEA, and XETA crypto algorithms * * The TEA and Xtended TEA algorithms were developed by David Wheeler * and Roger Needham at the Computer Laboratory of Cambridge University. diff --git a/crypto/xts.c b/crypto/xts.c index 3da8f5e05..ad97c8091 100644 --- a/crypto/xts.c +++ b/crypto/xts.c @@ -76,7 +76,7 @@ static int xts_setkey(struct crypto_skcipher *parent, const u8 *key, /* * We compute the tweak masks twice (both before and after the ECB encryption or * decryption) to avoid having to allocate a temporary buffer and/or make - * mutliple calls to the 'ecb(..)' instance, which usually would be slower than + * multiple calls to the 'ecb(..)' instance, which usually would be slower than * just doing the gf128mul_x_ble() calls again. */ static int xts_xor_tweak(struct skcipher_request *req, bool second_pass, -- 2.53.0