Fix CAAM related typos.
Signed-off-by: Heinrich Schuchardt
---
v2:
fix additional typos as indicated by Horia
replaces https://lkml.org/lkml/2020/6/3/1129
---
drivers/crypto/caam/Kconfig | 2 +-
drivers/crypto/caam/ctrl.c | 18 +-
drivers/crypto/caam/desc.h | 4 ++--
drivers/crypto/caam/pdb.h | 2 +-
4 files changed, 13 insertions(+), 13 deletions(-)
diff --git a/drivers/crypto/caam/Kconfig b/drivers/crypto/caam/Kconfig
index a62f228be6da..bc35aa0ec07a 100644
--- a/drivers/crypto/caam/Kconfig
+++ b/drivers/crypto/caam/Kconfig
@@ -147,7 +147,7 @@ config CRYPTO_DEV_FSL_CAAM_RNG_API
select HW_RANDOM
help
Selecting this will register the SEC4 hardware rng to
- the hw_random API for suppying the kernel entropy pool.
+ the hw_random API for supplying the kernel entropy pool.
endif # CRYPTO_DEV_FSL_CAAM_JR
diff --git a/drivers/crypto/caam/ctrl.c b/drivers/crypto/caam/ctrl.c
index 4fcdd262e581..f3d20b7645e0 100644
--- a/drivers/crypto/caam/ctrl.c
+++ b/drivers/crypto/caam/ctrl.c
@@ -54,7 +54,7 @@ static void build_instantiation_desc(u32 *desc, int handle,
int do_sk)
/*
* load 1 to clear written reg:
-* resets the done interrrupt and returns the RNG to idle.
+* resets the done interrupt and returns the RNG to idle.
*/
append_load_imm_u32(desc, 1, LDST_SRCDST_WORD_CLRW);
@@ -156,7 +156,7 @@ static inline int run_descriptor_deco0(struct device
*ctrldev, u32 *desc,
DESC_DER_DECO_STAT_SHIFT;
/*
-* If an error occured in the descriptor, then
+* If an error occurred in the descriptor, then
* the DECO status field will be set to 0x0D
*/
if (deco_state == DECO_STAT_HOST_ERR)
@@ -264,7 +264,7 @@ static void devm_deinstantiate_rng(void *data)
*- -ENODEV if DECO0 couldn't be acquired
*- -EAGAIN if an error occurred when executing the descriptor
* f.i. there was a RNG hardware error due to not "good enough"
- * entropy being aquired.
+ * entropy being acquired.
*/
static int instantiate_rng(struct device *ctrldev, int state_handle_mask,
int gen_sk)
@@ -733,8 +733,8 @@ static int caam_probe(struct platform_device *pdev)
handle_imx6_err005766(>mcr);
/*
-* Read the Compile Time paramters and SCFGR to determine
-* if Virtualization is enabled for this platform
+* Read the Compile Time parameters and SCFGR to determine
+* if virtualization is enabled for this platform
*/
scfgr = rd_reg32(>scfgr);
@@ -863,9 +863,9 @@ static int caam_probe(struct platform_device *pdev)
}
/*
* if instantiate_rng(...) fails, the loop will rerun
-* and the kick_trng(...) function will modfiy the
+* and the kick_trng(...) function will modify the
* upper and lower limits of the entropy sampling
-* interval, leading to a sucessful initialization of
+* interval, leading to a successful initialization of
* the RNG.
*/
ret = instantiate_rng(dev, inst_handles,
@@ -882,8 +882,8 @@ static int caam_probe(struct platform_device *pdev)
return ret;
}
/*
-* Set handles init'ed by this module as the complement of the
-* already initialized ones
+* Set handles initialized by this module as the complement of
+* the already initialized ones
*/
ctrlpriv->rng4_sh_init = ~ctrlpriv->rng4_sh_init & RDSTA_MASK;
diff --git a/drivers/crypto/caam/desc.h b/drivers/crypto/caam/desc.h
index e796d3cb9be8..e13470901586 100644
--- a/drivers/crypto/caam/desc.h
+++ b/drivers/crypto/caam/desc.h
@@ -18,7 +18,7 @@
*/
#define SEC4_SG_LEN_EXT0x8000 /* Entry points to
table */
-#define SEC4_SG_LEN_FIN0x4000 /* Last ent in table */
+#define SEC4_SG_LEN_FIN0x4000 /* Last entry in table
*/
#define SEC4_SG_BPID_MASK 0x00ff
#define SEC4_SG_BPID_SHIFT 16
#define SEC4_SG_LEN_MASK 0x3fff /* Excludes EXT and FINAL */
@@ -113,7 +113,7 @@
*/
#define HDR_REVERSE0x0800
-/* Propogate DNR property to SharedDesc */
+/* Propagate DNR property to SharedDesc */
#define HDR_PROP_DNR 0x0800
/* JobDesc/SharedDesc share property */
diff --git a/drivers/crypto/caam/pdb.h b/drivers/crypto/caam/pdb.h
index 68c1fd5dee5d..8ccc22075043 100644
--- a/drivers/crypto/caam/pdb.h
+++