From patchwork Mon Feb 21 22:31:18 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tom Rix X-Patchwork-Id: 12754216 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0883CC433EF for ; Mon, 21 Feb 2022 22:31:35 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235600AbiBUWb5 (ORCPT ); Mon, 21 Feb 2022 17:31:57 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:54702 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235577AbiBUWb4 (ORCPT ); Mon, 21 Feb 2022 17:31:56 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E48BA240B2 for ; Mon, 21 Feb 2022 14:31:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1645482691; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=TBA7vY6vDXXAWUvnPH4B+bcK6pUKZu1J6emvYjOF0V0=; b=UWz5poO/ST6hNuP5hZ7d0Q+SHKNzt3ucIhFaJ3943nYEz3iPzG65uc0ZwLIBsfP6CA6r8q yyfbL/0TnP/BNNhPBt6U8zjRvvWN2aWBVD1ZLe3yof0R9vHqn1MKwlHgdNBVcEb7PDZTBT BNOL/cBFN2emQEFn8Ykuo3jAdMgOyRo= Received: from mail-qk1-f199.google.com (mail-qk1-f199.google.com [209.85.222.199]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-626-xzN74dKhNa2WyjO2vH-qAA-1; Mon, 21 Feb 2022 17:31:28 -0500 X-MC-Unique: xzN74dKhNa2WyjO2vH-qAA-1 Received: by mail-qk1-f199.google.com with SMTP id i10-20020a05620a144a00b00648d4fa059dso4758044qkl.0 for ; Mon, 21 Feb 2022 14:31:28 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=TBA7vY6vDXXAWUvnPH4B+bcK6pUKZu1J6emvYjOF0V0=; b=piIFTkNh6wJI5Zim8EFPOAJ2A8n9cx9fOdSQcsHFY0SDFMX/S20gKhE/lHcItE5yh2 bYi6RLIEX7ZiI2nPk9e+u7SqjpahB4fkIwuMd1KevhGJSreIVnqAlEouOUAm9F1iwQl6 vGDTKKc8CoyzYBrsTEieTqJzv/pRZ3nSajQKNytxUecJq/gcOSRzEA/dTO+bDBS6zNSg zqxzzGYwzxsAUQDiWLzojLuPS8hbz1I82cTlg9dDzp9FAPw4Csa9qcr4g+Jy+mp42QTq KE2lU5mtOl0PSLa5X2XyFq1ZkTKlTTGUbQ26dpSUmW8GtYvqwwq0XXMdrgTVb+zwTl1a dPyQ== X-Gm-Message-State: AOAM531DEeA1KzPb3c1f30ckL4F1CwDQ5BBagH4u8MUmhU5z+hn7ieB4 JBUSV133SkvD1wFUaX3HPgbSg72GqYRHghWjXDevOoAMzWM8sg7qwMgyAcvXPDfW2bMMzO5ou6/ htns1c8UhLPqbmVHQroU= X-Received: by 2002:a05:620a:2a11:b0:649:77d:3966 with SMTP id o17-20020a05620a2a1100b00649077d3966mr2036461qkp.310.1645482687070; Mon, 21 Feb 2022 14:31:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJxbOF/hRKICFGwoBEi81hiBc/WVlGAa7Z9POxkJz1fy0DNgvUj85VvCRTzll+yqZ3kc1Dysww== X-Received: by 2002:a05:620a:2a11:b0:649:77d:3966 with SMTP id o17-20020a05620a2a1100b00649077d3966mr2036442qkp.310.1645482686811; Mon, 21 Feb 2022 14:31:26 -0800 (PST) Received: from localhost.localdomain.com (024-205-208-113.res.spectrum.com. [24.205.208.113]) by smtp.gmail.com with ESMTPSA id t23sm9721884qtp.67.2022.02.21.14.31.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 21 Feb 2022 14:31:26 -0800 (PST) From: trix@redhat.com To: dhowells@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net, dan.j.williams@intel.com, song@kernel.org, xni@redhat.com Cc: keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Tom Rix Subject: [PATCH] crypto: cleanup comments Date: Mon, 21 Feb 2022 14:31:18 -0800 Message-Id: <20220221223118.3744238-1-trix@redhat.com> X-Mailer: git-send-email 2.26.3 MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: keyrings@vger.kernel.org From: Tom Rix For spdx /* */ for *.h, // for *.c Space before spdx tag Replacements paramenters to parameters aymmetric to asymmetric sigature to signature boudary to boundary compliled to compiled eninges to engines explicity to explicitly Signed-off-by: Tom Rix Acked-by: Jarkko Sakkinen --- crypto/asymmetric_keys/signature.c | 2 +- crypto/asymmetric_keys/x509_parser.h | 2 +- crypto/async_tx/async_xor.c | 8 ++++---- crypto/async_tx/raid6test.c | 4 ++-- crypto/cfb.c | 2 +- crypto/dh.c | 2 +- crypto/sm2.c | 2 +- 7 files changed, 11 insertions(+), 11 deletions(-) diff --git a/crypto/asymmetric_keys/signature.c b/crypto/asymmetric_keys/signature.c index 4aff3eebec17..2deff81f8af5 100644 --- a/crypto/asymmetric_keys/signature.c +++ b/crypto/asymmetric_keys/signature.c @@ -35,7 +35,7 @@ void public_key_signature_free(struct public_key_signature *sig) EXPORT_SYMBOL_GPL(public_key_signature_free); /** - * query_asymmetric_key - Get information about an aymmetric key. + * query_asymmetric_key - Get information about an asymmetric key. * @params: Various parameters. * @info: Where to put the information. */ diff --git a/crypto/asymmetric_keys/x509_parser.h b/crypto/asymmetric_keys/x509_parser.h index c233f136fb35..668f5c9f0b54 100644 --- a/crypto/asymmetric_keys/x509_parser.h +++ b/crypto/asymmetric_keys/x509_parser.h @@ -22,7 +22,7 @@ struct x509_certificate { time64_t valid_to; const void *tbs; /* Signed data */ unsigned tbs_size; /* Size of signed data */ - unsigned raw_sig_size; /* Size of sigature */ + unsigned raw_sig_size; /* Size of signature */ const void *raw_sig; /* Signature data */ const void *raw_serial; /* Raw serial number in ASN.1 */ unsigned raw_serial_size; diff --git a/crypto/async_tx/async_xor.c b/crypto/async_tx/async_xor.c index d8a91521144e..1a3855284091 100644 --- a/crypto/async_tx/async_xor.c +++ b/crypto/async_tx/async_xor.c @@ -170,8 +170,8 @@ dma_xor_aligned_offsets(struct dma_device *device, unsigned int offset, * * xor_blocks always uses the dest as a source so the * ASYNC_TX_XOR_ZERO_DST flag must be set to not include dest data in - * the calculation. The assumption with dma eninges is that they only - * use the destination buffer as a source when it is explicity specified + * the calculation. The assumption with dma engines is that they only + * use the destination buffer as a source when it is explicitly specified * in the source list. * * src_list note: if the dest is also a source it must be at index zero. @@ -261,8 +261,8 @@ EXPORT_SYMBOL_GPL(async_xor_offs); * * xor_blocks always uses the dest as a source so the * ASYNC_TX_XOR_ZERO_DST flag must be set to not include dest data in - * the calculation. The assumption with dma eninges is that they only - * use the destination buffer as a source when it is explicity specified + * the calculation. The assumption with dma engines is that they only + * use the destination buffer as a source when it is explicitly specified * in the source list. * * src_list note: if the dest is also a source it must be at index zero. diff --git a/crypto/async_tx/raid6test.c b/crypto/async_tx/raid6test.c index 66db82e5a3b1..c9d218e53bcb 100644 --- a/crypto/async_tx/raid6test.c +++ b/crypto/async_tx/raid6test.c @@ -217,7 +217,7 @@ static int raid6_test(void) err += test(12, &tests); } - /* the 24 disk case is special for ioatdma as it is the boudary point + /* the 24 disk case is special for ioatdma as it is the boundary point * at which it needs to switch from 8-source ops to 16-source * ops for continuation (assumes DMA_HAS_PQ_CONTINUE is not set) */ @@ -241,7 +241,7 @@ static void raid6_test_exit(void) } /* when compiled-in wait for drivers to load first (assumes dma drivers - * are also compliled-in) + * are also compiled-in) */ late_initcall(raid6_test); module_exit(raid6_test_exit); diff --git a/crypto/cfb.c b/crypto/cfb.c index 0d664dfb47bc..5c36b7b65e2a 100644 --- a/crypto/cfb.c +++ b/crypto/cfb.c @@ -1,4 +1,4 @@ -//SPDX-License-Identifier: GPL-2.0 +// SPDX-License-Identifier: GPL-2.0 /* * CFB: Cipher FeedBack mode * diff --git a/crypto/dh.c b/crypto/dh.c index 27e62a2a8027..be3138636726 100644 --- a/crypto/dh.c +++ b/crypto/dh.c @@ -104,7 +104,7 @@ static int dh_set_secret(struct crypto_kpp *tfm, const void *buf, /* * SP800-56A public key verification: * - * * If Q is provided as part of the domain paramenters, a full validation + * * If Q is provided as part of the domain parameters, a full validation * according to SP800-56A section 5.6.2.3.1 is performed. * * * If Q is not provided, a partial validation according to SP800-56A section diff --git a/crypto/sm2.c b/crypto/sm2.c index ae3f77a66070..f3e1592965c0 100644 --- a/crypto/sm2.c +++ b/crypto/sm2.c @@ -1,4 +1,4 @@ -/* SPDX-License-Identifier: GPL-2.0-or-later */ +// SPDX-License-Identifier: GPL-2.0-or-later /* * SM2 asymmetric public-key algorithm * as specified by OSCCA GM/T 0003.1-2012 -- 0003.5-2012 SM2 and