VeraCrypt
aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoboSchmied <github@roboschmie.de>2024-04-10 23:50:05 +0200
committerGitHub <noreply@github.com>2024-04-10 23:50:05 +0200
commitc446773823e8b8e8a3dd2cebb30af1e96e2627bd (patch)
treef297390b1fd5bad630c148a57f829025d046b7f2
parentbd4566fe1fa4891542123315be9d1dd96db2e5b2 (diff)
downloadVeraCrypt-c446773823e8b8e8a3dd2cebb30af1e96e2627bd.tar.gz
VeraCrypt-c446773823e8b8e8a3dd2cebb30af1e96e2627bd.zip
Fix: 7 typos (#1324)
Signed-off-by: RoboSchmied <github@roboschmie.de>
-rw-r--r--src/Common/GfMul.c6
-rw-r--r--src/Crypto/Whirlpool.c6
-rw-r--r--src/Crypto/misc.h2
3 files changed, 7 insertions, 7 deletions
diff --git a/src/Common/GfMul.c b/src/Common/GfMul.c
index 970e6318..db51f499 100644
--- a/src/Common/GfMul.c
+++ b/src/Common/GfMul.c
@@ -287,7 +287,7 @@ static mode(32t) gf_poly64[2] = { 0, 0xd8000000 };
/* This function multiples a field element x, in the polynomial */
/* field representation. It uses 32-bit word operations to gain */
-/* speed but compensates for machine endianess and hence works */
+/* speed but compensates for machine endianness and hence works */
/* correctly on both styles of machine */
in_line void mul_x(mode(32t) x[4])
@@ -333,7 +333,7 @@ in_line void mul_x64(mode(32t) x[2])
}
/* Multiply of a GF128 field element by x^8 using 32-bit words */
-/* for speed - machine endianess matters here */
+/* for speed - machine endianness matters here */
#if (PLATFORM_BYTE_ORDER == BRG_LITTLE_ENDIAN)
@@ -380,7 +380,7 @@ in_line void mul_bex8_64(mode(32t) x[2]) /* mutiply with long words */
#endif
-/* hence choose the correct version for the machine endianess */
+/* hence choose the correct version for the machine endianness */
#if PLATFORM_BYTE_ORDER == BRG_BIG_ENDIAN
#define mul_x8 mul_bex8
diff --git a/src/Crypto/Whirlpool.c b/src/Crypto/Whirlpool.c
index 98ba318d..9af0cb32 100644
--- a/src/Crypto/Whirlpool.c
+++ b/src/Crypto/Whirlpool.c
@@ -894,7 +894,7 @@ static uint64 HashMultipleBlocks(WHIRLPOOL_CTX * const ctx, const uint64 *input,
#if BYTE_ORDER == BIG_ENDIAN
WhirlpoolTransform(ctx->state, input);
#else
- CorrectEndianess(dataBuf, input, 64);
+ CorrectEndianness(dataBuf, input, 64);
WhirlpoolTransform(ctx->state, dataBuf);
#endif
input += 8;
@@ -1008,7 +1008,7 @@ void WHIRLPOOL_finalize(WHIRLPOOL_CTX * const ctx,
memset(data, 0, 32);
}
#if BYTE_ORDER == LITTLE_ENDIAN
- CorrectEndianess(dataBuf, dataBuf, 32);
+ CorrectEndianness(dataBuf, dataBuf, 32);
#endif
dataBuf[4] = 0;
@@ -1018,7 +1018,7 @@ void WHIRLPOOL_finalize(WHIRLPOOL_CTX * const ctx,
WhirlpoolTransform(stateBuf, dataBuf);
#if BYTE_ORDER == LITTLE_ENDIAN
- CorrectEndianess(stateBuf, stateBuf, 64);
+ CorrectEndianness(stateBuf, stateBuf, 64);
#endif
memcpy(result, stateBuf, 64);
}
diff --git a/src/Crypto/misc.h b/src/Crypto/misc.h
index 47d0288a..25313d1d 100644
--- a/src/Crypto/misc.h
+++ b/src/Crypto/misc.h
@@ -151,7 +151,7 @@ VC_INLINE uint64 ByteReverseWord64(uint64 value)
#endif
}
-VC_INLINE void CorrectEndianess(uint64 *out, const uint64 *in, size_t byteCount)
+VC_INLINE void CorrectEndianness(uint64 *out, const uint64 *in, size_t byteCount)
{
size_t i, count = byteCount/sizeof(uint64);