Re: [PATCH v2 1/1] crypto: caam - fix typos

2020-06-12 Thread Herbert Xu
On Thu, Jun 04, 2020 at 12:39:47PM +0200, Heinrich Schuchardt wrote:
> Fix CAAM related typos.
> 
> Signed-off-by: Heinrich Schuchardt 
> ---
> v2:
>   fix additional typos as indicated by Horia
>   replaces https://lkml.org/lkml/2020/6/3/1129
> ---
>  drivers/crypto/caam/Kconfig |  2 +-
>  drivers/crypto/caam/ctrl.c  | 18 +-
>  drivers/crypto/caam/desc.h  |  4 ++--
>  drivers/crypto/caam/pdb.h   |  2 +-
>  4 files changed, 13 insertions(+), 13 deletions(-)

Patch applied.  Thanks.
-- 
Email: Herbert Xu 
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt


Re: [PATCH v2 1/1] crypto: caam - fix typos

2020-06-04 Thread Horia Geantă
On 6/4/2020 1:40 PM, Heinrich Schuchardt wrote:
> Fix CAAM related typos.
> 
> Signed-off-by: Heinrich Schuchardt 
Reviewed-by: Horia Geantă 

Thanks,
Horia


[PATCH v2 1/1] crypto: caam - fix typos

2020-06-04 Thread Heinrich Schuchardt
Fix CAAM related typos.

Signed-off-by: Heinrich Schuchardt 
---
v2:
fix additional typos as indicated by Horia
replaces https://lkml.org/lkml/2020/6/3/1129
---
 drivers/crypto/caam/Kconfig |  2 +-
 drivers/crypto/caam/ctrl.c  | 18 +-
 drivers/crypto/caam/desc.h  |  4 ++--
 drivers/crypto/caam/pdb.h   |  2 +-
 4 files changed, 13 insertions(+), 13 deletions(-)

diff --git a/drivers/crypto/caam/Kconfig b/drivers/crypto/caam/Kconfig
index a62f228be6da..bc35aa0ec07a 100644
--- a/drivers/crypto/caam/Kconfig
+++ b/drivers/crypto/caam/Kconfig
@@ -147,7 +147,7 @@ config CRYPTO_DEV_FSL_CAAM_RNG_API
select HW_RANDOM
help
  Selecting this will register the SEC4 hardware rng to
- the hw_random API for suppying the kernel entropy pool.
+ the hw_random API for supplying the kernel entropy pool.

 endif # CRYPTO_DEV_FSL_CAAM_JR

diff --git a/drivers/crypto/caam/ctrl.c b/drivers/crypto/caam/ctrl.c
index 4fcdd262e581..f3d20b7645e0 100644
--- a/drivers/crypto/caam/ctrl.c
+++ b/drivers/crypto/caam/ctrl.c
@@ -54,7 +54,7 @@ static void build_instantiation_desc(u32 *desc, int handle, 
int do_sk)

/*
 * load 1 to clear written reg:
-* resets the done interrrupt and returns the RNG to idle.
+* resets the done interrupt and returns the RNG to idle.
 */
append_load_imm_u32(desc, 1, LDST_SRCDST_WORD_CLRW);

@@ -156,7 +156,7 @@ static inline int run_descriptor_deco0(struct device 
*ctrldev, u32 *desc,
 DESC_DER_DECO_STAT_SHIFT;

/*
-* If an error occured in the descriptor, then
+* If an error occurred in the descriptor, then
 * the DECO status field will be set to 0x0D
 */
if (deco_state == DECO_STAT_HOST_ERR)
@@ -264,7 +264,7 @@ static void devm_deinstantiate_rng(void *data)
  *- -ENODEV if DECO0 couldn't be acquired
  *- -EAGAIN if an error occurred when executing the descriptor
  *   f.i. there was a RNG hardware error due to not "good enough"
- *   entropy being aquired.
+ *   entropy being acquired.
  */
 static int instantiate_rng(struct device *ctrldev, int state_handle_mask,
   int gen_sk)
@@ -733,8 +733,8 @@ static int caam_probe(struct platform_device *pdev)
handle_imx6_err005766(>mcr);

/*
-*  Read the Compile Time paramters and SCFGR to determine
-* if Virtualization is enabled for this platform
+*  Read the Compile Time parameters and SCFGR to determine
+* if virtualization is enabled for this platform
 */
scfgr = rd_reg32(>scfgr);

@@ -863,9 +863,9 @@ static int caam_probe(struct platform_device *pdev)
}
/*
 * if instantiate_rng(...) fails, the loop will rerun
-* and the kick_trng(...) function will modfiy the
+* and the kick_trng(...) function will modify the
 * upper and lower limits of the entropy sampling
-* interval, leading to a sucessful initialization of
+* interval, leading to a successful initialization of
 * the RNG.
 */
ret = instantiate_rng(dev, inst_handles,
@@ -882,8 +882,8 @@ static int caam_probe(struct platform_device *pdev)
return ret;
}
/*
-* Set handles init'ed by this module as the complement of the
-* already initialized ones
+* Set handles initialized by this module as the complement of
+* the already initialized ones
 */
ctrlpriv->rng4_sh_init = ~ctrlpriv->rng4_sh_init & RDSTA_MASK;

diff --git a/drivers/crypto/caam/desc.h b/drivers/crypto/caam/desc.h
index e796d3cb9be8..e13470901586 100644
--- a/drivers/crypto/caam/desc.h
+++ b/drivers/crypto/caam/desc.h
@@ -18,7 +18,7 @@
  */

 #define SEC4_SG_LEN_EXT0x8000  /* Entry points to 
table */
-#define SEC4_SG_LEN_FIN0x4000  /* Last ent in table */
+#define SEC4_SG_LEN_FIN0x4000  /* Last entry in table 
*/
 #define SEC4_SG_BPID_MASK  0x00ff
 #define SEC4_SG_BPID_SHIFT 16
 #define SEC4_SG_LEN_MASK   0x3fff  /* Excludes EXT and FINAL */
@@ -113,7 +113,7 @@
  */
 #define HDR_REVERSE0x0800

-/* Propogate DNR property to SharedDesc */
+/* Propagate DNR property to SharedDesc */
 #define HDR_PROP_DNR   0x0800

 /* JobDesc/SharedDesc share property */
diff --git a/drivers/crypto/caam/pdb.h b/drivers/crypto/caam/pdb.h
index 68c1fd5dee5d..8ccc22075043 100644
--- a/drivers/crypto/caam/pdb.h
+++