summaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorSun Chaobo <suncoding913@gmail.com>2026-03-13 22:52:57 +0800
committerHerbert Xu <herbert@gondor.apana.org.au>2026-03-22 11:17:59 +0900
commit7fc31dd86415fc04c71b8fd4743ad63183e8565f (patch)
tree1ad84df7fefa9107b9862c1c99db7c29ebc67dab /crypto
parentb44c7129f1e3cd0e6233c7cb2d88f917d92f213d (diff)
downloadlwn-7fc31dd86415fc04c71b8fd4743ad63183e8565f.tar.gz
lwn-7fc31dd86415fc04c71b8fd4743ad63183e8565f.zip
crypto: Fix several spelling mistakes in comments
Fix several typos in comments and messages. No functional change. Signed-off-by: Sun Chaobo <suncoding913@gmail.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r--crypto/drbg.c2
-rw-r--r--crypto/lrw.c2
-rw-r--r--crypto/tcrypt.c2
-rw-r--r--crypto/tea.c2
-rw-r--r--crypto/xts.c2
5 files changed, 5 insertions, 5 deletions
diff --git a/crypto/drbg.c b/crypto/drbg.c
index 1ed209e5d5dd..9204e6edb426 100644
--- a/crypto/drbg.c
+++ b/crypto/drbg.c
@@ -1780,7 +1780,7 @@ static inline int __init drbg_healthcheck_sanity(void)
max_addtllen = drbg_max_addtl(drbg);
max_request_bytes = drbg_max_request_bytes(drbg);
drbg_string_fill(&addtl, buf, max_addtllen + 1);
- /* overflow addtllen with additonal info string */
+ /* overflow addtllen with additional info string */
len = drbg_generate(drbg, buf, OUTBUFLEN, &addtl);
BUG_ON(0 < len);
/* overflow max_bits */
diff --git a/crypto/lrw.c b/crypto/lrw.c
index dd403b800513..aa31ab03a597 100644
--- a/crypto/lrw.c
+++ b/crypto/lrw.c
@@ -134,7 +134,7 @@ static int lrw_next_index(u32 *counter)
/*
* We compute the tweak masks twice (both before and after the ECB encryption or
* decryption) to avoid having to allocate a temporary buffer and/or make
- * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
+ * multiple calls to the 'ecb(..)' instance, which usually would be slower than
* just doing the lrw_next_index() calls again.
*/
static int lrw_xor_tweak(struct skcipher_request *req, bool second_pass)
diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c
index db860f45765f..52e3b584c524 100644
--- a/crypto/tcrypt.c
+++ b/crypto/tcrypt.c
@@ -2828,7 +2828,7 @@ static int __init tcrypt_mod_init(void)
pr_debug("all tests passed\n");
}
- /* We intentionaly return -EAGAIN to prevent keeping the module,
+ /* We intentionally return -EAGAIN to prevent keeping the module,
* unless we're running in fips mode. It does all its work from
* init() and doesn't offer any runtime functionality, but in
* the fips case, checking for a successful load is helpful.
diff --git a/crypto/tea.c b/crypto/tea.c
index cb05140e3470..7c66efcb5caa 100644
--- a/crypto/tea.c
+++ b/crypto/tea.c
@@ -2,7 +2,7 @@
/*
* Cryptographic API.
*
- * TEA, XTEA, and XETA crypto alogrithms
+ * TEA, XTEA, and XETA crypto algorithms
*
* The TEA and Xtended TEA algorithms were developed by David Wheeler
* and Roger Needham at the Computer Laboratory of Cambridge University.
diff --git a/crypto/xts.c b/crypto/xts.c
index 3da8f5e053d6..ad97c8091582 100644
--- a/crypto/xts.c
+++ b/crypto/xts.c
@@ -76,7 +76,7 @@ static int xts_setkey(struct crypto_skcipher *parent, const u8 *key,
/*
* We compute the tweak masks twice (both before and after the ECB encryption or
* decryption) to avoid having to allocate a temporary buffer and/or make
- * mutliple calls to the 'ecb(..)' instance, which usually would be slower than
+ * multiple calls to the 'ecb(..)' instance, which usually would be slower than
* just doing the gf128mul_x_ble() calls again.
*/
static int xts_xor_tweak(struct skcipher_request *req, bool second_pass,