Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp5847728ybv; Wed, 12 Feb 2020 01:12:22 -0800 (PST) X-Google-Smtp-Source: APXvYqwV3mZEcPN/690xuUe69TOlQoTPPywXC/nddIz+0dwJsruKFj9BB6kSvs5pr/l8kQmfRLGL X-Received: by 2002:aca:dc45:: with SMTP id t66mr5737281oig.39.1581498742522; Wed, 12 Feb 2020 01:12:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581498742; cv=none; d=google.com; s=arc-20160816; b=1H6YuM9EkXPhk6NhcOMveYo9P5AyUSjK9Xx6He+cqYColk/UzDc5+kLYnUzAMoXisU E4Xl5/yiuMPQnWwNd32IFvsbz+QeOwFR57o2vdRzzyZEojvAX3JqmYZmt1JM9pEZsEkd DMdimG7NvdRYZYX6cn2pym9nr64D/FXfGxwyn7k87qBlvnFwneoJfuDXC9GN95YseW0q VTr1t1T9UV1/RgiJYCr6RHw4EA3N4inPVlQoVkMtswo3v5kgrT83omX3rp4qQ9eCihDN iHtCBY2/T549hQch8l8hcZjb57fImEJp8n7nQRnjdf9w4+gCtxGVLty5YUUVSo3JahOI lxCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=BNOm4lJoqRLdXAf+IkKYX5CxSOzzUz+ggCTE45Sbqzg=; b=BwJG67GD7A5plbH8vgE/tYY3Vr0E4rqJEAT6u6xoU45fGPd7yRr0nZdDemFcjURxWx 8UKGwX6fWyuzSIgd/70ScWgoQElDD9kbaHkt9AHP0jZJ+vbB5GtmYy75eESli+Oe+hxx 7DjWPrPxQCvxaOQqqhZk9S08st0YIlpyykQa6C80TJ2ENtm2Nji0hN7wTVI7YFFTZhMd MrEyXz/2VgEjAOnim7hRmK1r63sjmhrQYMUNQ3WOv4RsOprsTV/DVWd+fXOcJCnLs/Y6 DrIPZmfroYiJVdtMI/g9xpViu7/gcHukgy+8QjfVaXwz4YT8GXOxwcAKPMcr2VMZKhWz gXIw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p7si3258689ota.299.2020.02.12.01.12.10; Wed, 12 Feb 2020 01:12:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728727AbgBLJLw (ORCPT + 99 others); Wed, 12 Feb 2020 04:11:52 -0500 Received: from michel.telenet-ops.be ([195.130.137.88]:52386 "EHLO michel.telenet-ops.be" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728645AbgBLJLv (ORCPT ); Wed, 12 Feb 2020 04:11:51 -0500 Received: from ramsan ([84.195.182.253]) by michel.telenet-ops.be with bizsmtp id 1lBp220055USYZQ06lBpcE; Wed, 12 Feb 2020 10:11:49 +0100 Received: from rox.of.borg ([192.168.97.57]) by ramsan with esmtp (Exim 4.90_1) (envelope-from ) id 1j1o3h-0000Zh-0j; Wed, 12 Feb 2020 10:11:49 +0100 Received: from geert by rox.of.borg with local (Exim 4.90_1) (envelope-from ) id 1j1nf5-0002PR-IQ; Wed, 12 Feb 2020 09:46:23 +0100 From: Geert Uytterhoeven To: Harald Freudenberger , Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Jiri Kosina Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, Geert Uytterhoeven Subject: [PATCH trivial] s390/pkey/zcrypt: spelling s/crytp/crypt/ Date: Wed, 12 Feb 2020 09:46:22 +0100 Message-Id: <20200212084622.9219-1-geert+renesas@glider.be> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix typos in a comments. Signed-off-by: Geert Uytterhoeven --- drivers/s390/crypto/zcrypt_ep11misc.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/s390/crypto/zcrypt_ep11misc.c b/drivers/s390/crypto/zcrypt_ep11misc.c index d4caf46ff9df1559..2afe2153b34e32e9 100644 --- a/drivers/s390/crypto/zcrypt_ep11misc.c +++ b/drivers/s390/crypto/zcrypt_ep11misc.c @@ -887,7 +887,7 @@ static int ep11_unwrapkey(u16 card, u16 domain, /* empty pin tag */ *p++ = 0x04; *p++ = 0; - /* encrytped key value tag and bytes */ + /* encrypted key value tag and bytes */ p += asn1tag_write(p, 0x04, enckey, enckeysize); /* reply cprb and payload */ @@ -1095,7 +1095,7 @@ int ep11_clr2keyblob(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, /* Step 1: generate AES 256 bit random kek key */ rc = ep11_genaeskey(card, domain, 256, - 0x00006c00, /* EN/DECRYTP, WRAP/UNWRAP */ + 0x00006c00, /* EN/DECRYPT, WRAP/UNWRAP */ kek, &keklen); if (rc) { DEBUG_ERR( -- 2.17.1