Skip to content

Commit 001aa55

Browse files
committed
upstream: lots of typos in comments/docs. Patch from Karsten Weiss
after checking with codespell tool (https://github.com/lucasdemarchi/codespell) OpenBSD-Commit-ID: 373222f12d7ab606598a2d36840c60be93568528
1 parent 260ede2 commit 001aa55

22 files changed

+54
-54
lines changed

PROTOCOL.certkeys

+2-2
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ certificate. Each represents a time in seconds since 1970-01-01
174174

175175
valid after <= current time < valid before
176176

177-
criticial options is a set of zero or more key options encoded as
177+
critical options is a set of zero or more key options encoded as
178178
below. All such options are "critical" in the sense that an implementation
179179
must refuse to authorise a key that has an unrecognised option.
180180

@@ -291,4 +291,4 @@ permit-user-rc empty Flag indicating that execution of
291291
of this script will not be permitted if
292292
this option is not present.
293293

294-
$OpenBSD: PROTOCOL.certkeys,v 1.13 2017/11/03 02:32:19 djm Exp $
294+
$OpenBSD: PROTOCOL.certkeys,v 1.14 2018/04/10 00:10:49 djm Exp $

PROTOCOL.chacha20poly1305

+2-2
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ that computes a 128 bit integrity tag given a message and a single-use
1616
The [email protected] combines these two primitives into an
1717
authenticated encryption mode. The construction used is based on that
1818
proposed for TLS by Adam Langley in [3], but differs in the layout of
19-
data passed to the MAC and in the addition of encyption of the packet
19+
data passed to the MAC and in the addition of encryption of the packet
2020
lengths.
2121

2222
Negotiation
@@ -103,5 +103,5 @@ References
103103
[3] "ChaCha20 and Poly1305 based Cipher Suites for TLS", Adam Langley
104104
http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03
105105

106-
$OpenBSD: PROTOCOL.chacha20poly1305,v 1.3 2016/05/03 13:10:24 djm Exp $
106+
$OpenBSD: PROTOCOL.chacha20poly1305,v 1.4 2018/04/10 00:10:49 djm Exp $
107107

PROTOCOL.krl

+2-2
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ This section may appear multiple times.
145145
5. KRL signature sections
146146

147147
The KRL_SECTION_SIGNATURE section serves a different purpose to the
148-
preceeding ones: to provide cryptographic authentication of a KRL that
148+
preceding ones: to provide cryptographic authentication of a KRL that
149149
is retrieved over a channel that does not provide integrity protection.
150150
Its format is slightly different to the previously-described sections:
151151
in order to simplify the signature generation, it includes as a "body"
@@ -166,4 +166,4 @@ Implementations that retrieve KRLs over untrusted channels must verify
166166
signatures. Signature sections are optional for KRLs distributed by
167167
trusted means.
168168

169-
$OpenBSD: PROTOCOL.krl,v 1.3 2015/01/30 01:10:33 djm Exp $
169+
$OpenBSD: PROTOCOL.krl,v 1.4 2018/04/10 00:10:49 djm Exp $

auth.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: auth.h,v 1.95 2018/03/03 03:15:51 djm Exp $ */
1+
/* $OpenBSD: auth.h,v 1.96 2018/04/10 00:10:49 djm Exp $ */
22

33
/*
44
* Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -89,7 +89,7 @@ struct Authctxt {
8989
struct sshkey **prev_keys;
9090
u_int nprev_keys;
9191

92-
/* Last used key and ancilliary information from active auth method */
92+
/* Last used key and ancillary information from active auth method */
9393
struct sshkey *auth_method_key;
9494
char *auth_method_info;
9595

authfd.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: authfd.c,v 1.108 2018/02/23 15:58:37 markus Exp $ */
1+
/* $OpenBSD: authfd.c,v 1.109 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -323,7 +323,7 @@ ssh_free_identitylist(struct ssh_identitylist *idl)
323323
*/
324324

325325

326-
/* encode signature algoritm in flag bits, so we can keep the msg format */
326+
/* encode signature algorithm in flag bits, so we can keep the msg format */
327327
static u_int
328328
agent_encode_alg(const struct sshkey *key, const char *alg)
329329
{

channels.c

+4-4
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: channels.c,v 1.379 2018/02/05 05:36:49 tb Exp $ */
1+
/* $OpenBSD: channels.c,v 1.380 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -2599,7 +2599,7 @@ channel_output_poll(struct ssh *ssh)
25992599
* SSH_CHANNEL_MUX_PROXY channel and replace the mux clients ID
26002600
* with the newly allocated channel ID.
26012601
* 2) Upstream messages are received by matching SSH_CHANNEL_MUX_PROXY
2602-
* channels and procesed by channel_proxy_upstream(). The local channel ID
2602+
* channels and processed by channel_proxy_upstream(). The local channel ID
26032603
* is then translated back to the original mux client ID.
26042604
* 3) In both cases we need to keep track of matching SSH2_MSG_CHANNEL_CLOSE
26052605
* messages so we can clean up SSH_CHANNEL_MUX_PROXY channels.
@@ -2610,7 +2610,7 @@ channel_output_poll(struct ssh *ssh)
26102610
* channel. E.g. client_request_forwarded_tcpip() needs to figure
26112611
* out whether the request is addressed to the local client or a
26122612
* specific downstream client based on the listen-address/port.
2613-
* 6) Agent and X11-Forwarding have a similar problem and are currenly
2613+
* 6) Agent and X11-Forwarding have a similar problem and are currently
26142614
* not supported as the matching session/channel cannot be identified
26152615
* easily.
26162616
*/
@@ -2787,7 +2787,7 @@ channel_proxy_upstream(Channel *c, int type, u_int32_t seq, struct ssh *ssh)
27872787
/*
27882788
* When receiving packets from the peer we need to check whether we
27892789
* need to forward the packets to the mux client. In this case we
2790-
* restore the orignal channel id and keep track of CLOSE messages,
2790+
* restore the original channel id and keep track of CLOSE messages,
27912791
* so we can cleanup the channel.
27922792
*/
27932793
if (c == NULL || c->type != SSH_CHANNEL_MUX_PROXY)

clientloop.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: clientloop.c,v 1.311 2018/02/11 21:16:56 dtucker Exp $ */
1+
/* $OpenBSD: clientloop.c,v 1.312 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -664,7 +664,7 @@ client_status_confirm(struct ssh *ssh, int type, Channel *c, void *ctx)
664664
options.request_tty == REQUEST_TTY_YES))
665665
cr->action = CONFIRM_CLOSE;
666666

667-
/* XXX supress on mux _client_ quietmode */
667+
/* XXX suppress on mux _client_ quietmode */
668668
tochan = options.log_level >= SYSLOG_LEVEL_ERROR &&
669669
c->ctl_chan != -1 && c->extended_usage == CHAN_EXTENDED_WRITE;
670670

kexdhs.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: kexdhs.c,v 1.26 2018/02/07 02:06:51 jsing Exp $ */
1+
/* $OpenBSD: kexdhs.c,v 1.27 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Copyright (c) 2001 Markus Friedl. All rights reserved.
44
*
@@ -194,7 +194,7 @@ input_kex_dh_init(int type, u_int32_t seq, struct ssh *ssh)
194194

195195
/* destroy_sensitive_data(); */
196196

197-
/* send server hostkey, DH pubkey 'f' and singed H */
197+
/* send server hostkey, DH pubkey 'f' and signed H */
198198
if ((r = sshpkt_start(ssh, SSH2_MSG_KEXDH_REPLY)) != 0 ||
199199
(r = sshpkt_put_string(ssh, server_host_key_blob, sbloblen)) != 0 ||
200200
(r = sshpkt_put_bignum2(ssh, kex->dh->pub_key)) != 0 || /* f */

kexgexs.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: kexgexs.c,v 1.32 2018/02/07 02:06:51 jsing Exp $ */
1+
/* $OpenBSD: kexgexs.c,v 1.33 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Copyright (c) 2000 Niels Provos. All rights reserved.
44
* Copyright (c) 2001 Markus Friedl. All rights reserved.
@@ -224,7 +224,7 @@ input_kex_dh_gex_init(int type, u_int32_t seq, struct ssh *ssh)
224224

225225
/* destroy_sensitive_data(); */
226226

227-
/* send server hostkey, DH pubkey 'f' and singed H */
227+
/* send server hostkey, DH pubkey 'f' and signed H */
228228
if ((r = sshpkt_start(ssh, SSH2_MSG_KEX_DH_GEX_REPLY)) != 0 ||
229229
(r = sshpkt_put_string(ssh, server_host_key_blob, sbloblen)) != 0 ||
230230
(r = sshpkt_put_bignum2(ssh, kex->dh->pub_key)) != 0 || /* f */

scp.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: scp.c,v 1.195 2018/02/10 06:15:12 djm Exp $ */
1+
/* $OpenBSD: scp.c,v 1.196 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* scp - secure remote copy. This is basically patched BSD rcp which
44
* uses ssh to do the data transfer (instead of using rcmd).
@@ -311,7 +311,7 @@ do_cmd(char *host, char *remuser, int port, char *cmd, int *fdin, int *fdout)
311311
}
312312

313313
/*
314-
* This functions executes a command simlar to do_cmd(), but expects the
314+
* This function executes a command similar to do_cmd(), but expects the
315315
* input and output descriptors to be setup by a previous call to do_cmd().
316316
* This way the input and output of two commands can be connected.
317317
*/

servconf.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11

2-
/* $OpenBSD: servconf.c,v 1.327 2018/04/04 15:12:17 job Exp $ */
2+
/* $OpenBSD: servconf.c,v 1.328 2018/04/10 00:10:49 djm Exp $ */
33
/*
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
55
* All rights reserved
@@ -1951,7 +1951,7 @@ process_server_config_line(ServerOptions *options, char *line,
19511951
case sAuthenticationMethods:
19521952
if (options->num_auth_methods == 0) {
19531953
value = 0; /* seen "any" pseudo-method */
1954-
value2 = 0; /* sucessfully parsed any method */
1954+
value2 = 0; /* successfully parsed any method */
19551955
while ((arg = strdelim(&cp)) && *arg != '\0') {
19561956
if (strcmp(arg, "any") == 0) {
19571957
if (options->num_auth_methods > 0) {
@@ -2135,7 +2135,7 @@ int parse_server_match_testspec(struct connection_info *ci, char *spec)
21352135
*
21362136
* If the preauth flag is set, we do not bother copying the string or
21372137
* array values that are not used pre-authentication, because any that we
2138-
* do use must be explictly sent in mm_getpwnamallow().
2138+
* do use must be explicitly sent in mm_getpwnamallow().
21392139
*/
21402140
void
21412141
copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth)

sftp.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: sftp.c,v 1.182 2017/11/03 03:46:52 djm Exp $ */
1+
/* $OpenBSD: sftp.c,v 1.183 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Copyright (c) 2001-2004 Damien Miller <[email protected]>
44
*
@@ -1844,7 +1844,7 @@ complete_cmd_parse(EditLine *el, char *cmd, int lastarg, char quote,
18441844
return 0;
18451845
}
18461846

1847-
/* Complete ambigious command */
1847+
/* Complete ambiguous command */
18481848
tmp = complete_ambiguous(cmd, list, count);
18491849
if (count > 1)
18501850
complete_display(list, 0);

ssh-agent.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: ssh-agent.c,v 1.229 2018/04/09 23:54:49 djm Exp $ */
1+
/* $OpenBSD: ssh-agent.c,v 1.230 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -709,7 +709,7 @@ process_message(u_int socknum)
709709

710710
debug("%s: socket %u (fd=%d) type %d", __func__, socknum, e->fd, type);
711711

712-
/* check wheter agent is locked */
712+
/* check whether agent is locked */
713713
if (locked && type != SSH_AGENTC_UNLOCK) {
714714
sshbuf_reset(e->request);
715715
switch (type) {

ssh.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: ssh.c,v 1.475 2018/02/23 15:58:38 markus Exp $ */
1+
/* $OpenBSD: ssh.c,v 1.476 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -1485,7 +1485,7 @@ main(int ac, char **av)
14851485
/* load options.identity_files */
14861486
load_public_identity_files(pw);
14871487

1488-
/* optionally set the SSH_AUTHSOCKET_ENV_NAME varibale */
1488+
/* optionally set the SSH_AUTHSOCKET_ENV_NAME variable */
14891489
if (options.identity_agent &&
14901490
strcmp(options.identity_agent, SSH_AUTHSOCKET_ENV_NAME) != 0) {
14911491
if (strcmp(options.identity_agent, "none") == 0) {

ssh_api.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: ssh_api.h,v 1.1 2015/01/19 20:30:23 markus Exp $ */
1+
/* $OpenBSD: ssh_api.h,v 1.2 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Copyright (c) 2012 Markus Friedl. All rights reserved.
44
*
@@ -81,7 +81,7 @@ int ssh_set_verify_host_key_callback(struct ssh *ssh,
8181
* ssh_packet_next() sets typep if there is no new packet available.
8282
* in this case the caller must fill the input byte-stream by passing
8383
* the data received over network to ssh_input_append().
84-
* additinally, the caller needs to send the resulting output
84+
* additionally, the caller needs to send the resulting output
8585
* byte-stream back over the network. otherwise the key exchange
8686
* would not proceed. the output byte-stream is accessed through
8787
* ssh_output_ptr().

ssh_config.5

+3-3
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,8 @@
3333
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
3434
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
3535
.\"
36-
.\" $OpenBSD: ssh_config.5,v 1.272 2018/04/07 13:50:10 jmc Exp $
37-
.Dd $Mdocdate: April 7 2018 $
36+
.\" $OpenBSD: ssh_config.5,v 1.273 2018/04/10 00:10:49 djm Exp $
37+
.Dd $Mdocdate: April 10 2018 $
3838
.Dt SSH_CONFIG 5
3939
.Os
4040
.Sh NAME
@@ -1308,7 +1308,7 @@ section.
13081308
.It Cm RemoteForward
13091309
Specifies that a TCP port on the remote machine be forwarded over
13101310
the secure channel.
1311-
The remote port may either be fowarded to a specified host and port
1311+
The remote port may either be forwarded to a specified host and port
13121312
from the local machine, or may act as a SOCKS 4/5 proxy that allows a remote
13131313
client to connect to arbitrary destinations from the local machine.
13141314
The first argument must be

sshbuf.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: sshbuf.h,v 1.9 2017/09/12 06:32:07 djm Exp $ */
1+
/* $OpenBSD: sshbuf.h,v 1.10 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Copyright (c) 2011 Damien Miller
44
*
@@ -53,7 +53,7 @@ struct sshbuf {
5353
#ifndef SSHBUF_NO_DEPREACTED
5454
/*
5555
* NB. Please do not use sshbuf_init() in new code. Please use sshbuf_new()
56-
* instead. sshbuf_init() is deprectated and will go away soon (it is
56+
* instead. sshbuf_init() is deprecated and will go away soon (it is
5757
* only included to allow compat with buffer_* in OpenSSH)
5858
*/
5959
void sshbuf_init(struct sshbuf *buf);

sshconnect.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: sshconnect.c,v 1.297 2018/02/23 15:58:38 markus Exp $ */
1+
/* $OpenBSD: sshconnect.c,v 1.298 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -277,7 +277,7 @@ ssh_kill_proxy_command(void)
277277
#ifdef HAVE_IFADDRS_H
278278
/*
279279
* Search a interface address list (returned from getifaddrs(3)) for an
280-
* address that matches the desired address family on the specifed interface.
280+
* address that matches the desired address family on the specified interface.
281281
* Returns 0 and fills in *resultp and *rlenp on success. Returns -1 on failure.
282282
*/
283283
static int

sshd.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: sshd.c,v 1.506 2018/03/03 03:15:51 djm Exp $ */
1+
/* $OpenBSD: sshd.c,v 1.507 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Author: Tatu Ylonen <[email protected]>
44
* Copyright (c) 1995 Tatu Ylonen <[email protected]>, Espoo, Finland
@@ -1336,7 +1336,7 @@ server_accept_loop(int *sock_in, int *sock_out, int *newsock, int *config_s)
13361336
* return an error if any are found). Basically we are worried about
13371337
* source routing; it can be used to pretend you are somebody
13381338
* (ip-address) you are not. That itself may be "almost acceptable"
1339-
* under certain circumstances, but rhosts autentication is useless
1339+
* under certain circumstances, but rhosts authentication is useless
13401340
* if source routing is accepted. Notice also that if we just dropped
13411341
* source routing here, the other side could use IP spoofing to do
13421342
* rest of the interaction and could still bypass security. So we

sshkey-xmss.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: sshkey-xmss.c,v 1.1 2018/02/23 15:58:38 markus Exp $ */
1+
/* $OpenBSD: sshkey-xmss.c,v 1.2 2018/04/10 00:10:49 djm Exp $ */
22
/*
33
* Copyright (c) 2017 Markus Friedl. All rights reserved.
44
*
@@ -66,7 +66,7 @@ struct ssh_xmss_state {
6666
treehash_inst *treehash;
6767

6868
u_int32_t idx; /* state read from file */
69-
u_int32_t maxidx; /* resticted # of signatures */
69+
u_int32_t maxidx; /* restricted # of signatures */
7070
int have_state; /* .state file exists */
7171
int lockfd; /* locked in sshkey_xmss_get_state() */
7272
int allow_update; /* allow sshkey_xmss_update_state() */
@@ -583,7 +583,7 @@ sshkey_xmss_update_state(const struct sshkey *k, sshkey_printfn *pr)
583583
}
584584
idx = PEEK_U32(k->xmss_sk);
585585
if (idx == state->idx) {
586-
/* no signature happend, no need to update */
586+
/* no signature happened, no need to update */
587587
ret = 0;
588588
goto done;
589589
} else if (idx != state->idx + 1) {

umac.c

+7-7
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
/* $OpenBSD: umac.c,v 1.16 2017/12/12 15:06:12 naddy Exp $ */
1+
/* $OpenBSD: umac.c,v 1.17 2018/04/10 00:10:49 djm Exp $ */
22
/* -----------------------------------------------------------------------
33
*
44
* umac.c -- C Implementation UMAC Message Authentication
@@ -65,7 +65,7 @@
6565
/* #define AES_IMPLEMENTAION 1 1 = OpenSSL, 2 = Barreto, 3 = Gladman */
6666
/* #define SSE2 0 Is SSE2 is available? */
6767
/* #define RUN_TESTS 0 Run basic correctness/speed tests */
68-
/* #define UMAC_AE_SUPPORT 0 Enable auhthenticated encrytion */
68+
/* #define UMAC_AE_SUPPORT 0 Enable authenticated encryption */
6969

7070
/* ---------------------------------------------------------------------- */
7171
/* -- Global Includes --------------------------------------------------- */
@@ -295,9 +295,9 @@ static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8])
295295
* Before beginning another hash calculation the nh_reset() routine
296296
* must be called. The single-buffer routine, nh(), is equivalent to
297297
* the sequence of calls nh_update() and nh_final(); however it is
298-
* optimized and should be prefered whenever the multiple-buffer interface
298+
* optimized and should be preferred whenever the multiple-buffer interface
299299
* is not necessary. When using either interface, it is the client's
300-
* responsability to pass no more than L1_KEY_LEN bytes per hash result.
300+
* responsibility to pass no more than L1_KEY_LEN bytes per hash result.
301301
*
302302
* The routine nh_init() initializes the nh_ctx data structure and
303303
* must be called once, before any other PDF routine.
@@ -319,8 +319,8 @@ static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8])
319319
typedef struct {
320320
UINT8 nh_key [L1_KEY_LEN + L1_KEY_SHIFT * (STREAMS - 1)]; /* NH Key */
321321
UINT8 data [HASH_BUF_BYTES]; /* Incoming data buffer */
322-
int next_data_empty; /* Bookeeping variable for data buffer. */
323-
int bytes_hashed; /* Bytes (out of L1_KEY_LEN) incorperated. */
322+
int next_data_empty; /* Bookkeeping variable for data buffer. */
323+
int bytes_hashed; /* Bytes (out of L1_KEY_LEN) incorporated. */
324324
UINT64 state[STREAMS]; /* on-line state */
325325
} nh_ctx;
326326

@@ -851,7 +851,7 @@ static void poly_hash(uhash_ctx_t hc, UINT32 data_in[])
851851

852852

853853
/* The final step in UHASH is an inner-product hash. The poly hash
854-
* produces a result not neccesarily WORD_LEN bytes long. The inner-
854+
* produces a result not necessarily WORD_LEN bytes long. The inner-
855855
* product hash breaks the polyhash output into 16-bit chunks and
856856
* multiplies each with a 36 bit key.
857857
*/

0 commit comments

Comments
 (0)