diff options
author | RoboSchmied <github@roboschmie.de> | 2024-04-10 23:50:05 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-04-10 23:50:05 +0200 |
commit | c446773823e8b8e8a3dd2cebb30af1e96e2627bd (patch) | |
tree | f297390b1fd5bad630c148a57f829025d046b7f2 | |
parent | bd4566fe1fa4891542123315be9d1dd96db2e5b2 (diff) | |
download | VeraCrypt-c446773823e8b8e8a3dd2cebb30af1e96e2627bd.tar.gz VeraCrypt-c446773823e8b8e8a3dd2cebb30af1e96e2627bd.zip |
Fix: 7 typos (#1324)
Signed-off-by: RoboSchmied <github@roboschmie.de>
-rw-r--r-- | src/Common/GfMul.c | 6 | ||||
-rw-r--r-- | src/Crypto/Whirlpool.c | 6 | ||||
-rw-r--r-- | src/Crypto/misc.h | 2 |
3 files changed, 7 insertions, 7 deletions
diff --git a/src/Common/GfMul.c b/src/Common/GfMul.c index 970e6318..db51f499 100644 --- a/src/Common/GfMul.c +++ b/src/Common/GfMul.c @@ -287,7 +287,7 @@ static mode(32t) gf_poly64[2] = { 0, 0xd8000000 }; /* This function multiples a field element x, in the polynomial */ /* field representation. It uses 32-bit word operations to gain */ -/* speed but compensates for machine endianess and hence works */ +/* speed but compensates for machine endianness and hence works */ /* correctly on both styles of machine */ in_line void mul_x(mode(32t) x[4]) @@ -333,7 +333,7 @@ in_line void mul_x64(mode(32t) x[2]) } /* Multiply of a GF128 field element by x^8 using 32-bit words */ -/* for speed - machine endianess matters here */ +/* for speed - machine endianness matters here */ #if (PLATFORM_BYTE_ORDER == BRG_LITTLE_ENDIAN) @@ -380,7 +380,7 @@ in_line void mul_bex8_64(mode(32t) x[2]) /* mutiply with long words */ #endif -/* hence choose the correct version for the machine endianess */ +/* hence choose the correct version for the machine endianness */ #if PLATFORM_BYTE_ORDER == BRG_BIG_ENDIAN #define mul_x8 mul_bex8 diff --git a/src/Crypto/Whirlpool.c b/src/Crypto/Whirlpool.c index 98ba318d..9af0cb32 100644 --- a/src/Crypto/Whirlpool.c +++ b/src/Crypto/Whirlpool.c @@ -894,7 +894,7 @@ static uint64 HashMultipleBlocks(WHIRLPOOL_CTX * const ctx, const uint64 *input, #if BYTE_ORDER == BIG_ENDIAN WhirlpoolTransform(ctx->state, input); #else - CorrectEndianess(dataBuf, input, 64); + CorrectEndianness(dataBuf, input, 64); WhirlpoolTransform(ctx->state, dataBuf); #endif input += 8; @@ -1008,7 +1008,7 @@ void WHIRLPOOL_finalize(WHIRLPOOL_CTX * const ctx, memset(data, 0, 32); } #if BYTE_ORDER == LITTLE_ENDIAN - CorrectEndianess(dataBuf, dataBuf, 32); + CorrectEndianness(dataBuf, dataBuf, 32); #endif dataBuf[4] = 0; @@ -1018,7 +1018,7 @@ void WHIRLPOOL_finalize(WHIRLPOOL_CTX * const ctx, WhirlpoolTransform(stateBuf, dataBuf); #if BYTE_ORDER == LITTLE_ENDIAN - CorrectEndianess(stateBuf, stateBuf, 64); + CorrectEndianness(stateBuf, stateBuf, 64); #endif memcpy(result, stateBuf, 64); } diff --git a/src/Crypto/misc.h b/src/Crypto/misc.h index 47d0288a..25313d1d 100644 --- a/src/Crypto/misc.h +++ b/src/Crypto/misc.h @@ -151,7 +151,7 @@ VC_INLINE uint64 ByteReverseWord64(uint64 value) #endif } -VC_INLINE void CorrectEndianess(uint64 *out, const uint64 *in, size_t byteCount) +VC_INLINE void CorrectEndianness(uint64 *out, const uint64 *in, size_t byteCount) { size_t i, count = byteCount/sizeof(uint64); |