From 0d4fb8439092ff8253af72ac6bc193e77ebbcf2f Mon Sep 17 00:00:00 2001 From: FdaSilvaYY Date: Fri, 5 Feb 2016 15:23:54 -0500 Subject: GH601: Various spelling fixes. Signed-off-by: Rich Salz Reviewed-by: Matt Caswell --- crypto/modes/cfb128.c | 2 +- crypto/modes/ctr128.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) (limited to 'crypto/modes') diff --git a/crypto/modes/cfb128.c b/crypto/modes/cfb128.c index d4ecbd08ee..c4395bcab5 100644 --- a/crypto/modes/cfb128.c +++ b/crypto/modes/cfb128.c @@ -190,7 +190,7 @@ static void cfbr_encrypt_block(const unsigned char *in, unsigned char *out, block128_f block) { int n, rem, num; - unsigned char ovec[16 * 2 + 1]; /* +1 because we dererefence (but don't + unsigned char ovec[16 * 2 + 1]; /* +1 because we dereference (but don't * use) one byte off the end */ if (nbits <= 0 || nbits > 128) diff --git a/crypto/modes/ctr128.c b/crypto/modes/ctr128.c index f3bbcbf723..f56fd0cfad 100644 --- a/crypto/modes/ctr128.c +++ b/crypto/modes/ctr128.c @@ -117,7 +117,7 @@ static void ctr128_inc_aligned(unsigned char *counter) * before the first call to CRYPTO_ctr128_encrypt(). This algorithm assumes * that the counter is in the x lower bits of the IV (ivec), and that the * application has full control over overflow and the rest of the IV. This - * implementation takes NO responsability for checking that the counter + * implementation takes NO responsibility for checking that the counter * doesn't overflow into the rest of the IV when incremented. */ void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out, @@ -245,7 +245,7 @@ void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out, (*func) (in, out, blocks, key, ivec); /* (*ctr) does not update ivec, caller does: */ PUTU32(ivec + 12, ctr32); - /* ... overflow was detected, propogate carry. */ + /* ... overflow was detected, propagate carry. */ if (ctr32 == 0) ctr96_inc(ivec); blocks *= 16; -- cgit v1.2.3