"An HMAC", not "A HMAC". Signed-off-by: Eric Biggers <ebigg...@kernel.org> --- include/crypto/sha2.h | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/include/crypto/sha2.h b/include/crypto/sha2.h index 36a9dab805be7..296ce9d468bfc 100644 --- a/include/crypto/sha2.h +++ b/include/crypto/sha2.h @@ -247,11 +247,11 @@ struct hmac_sha384_ctx { */ void hmac_sha384_preparekey(struct hmac_sha384_key *key, const u8 *raw_key, size_t raw_key_len); /** - * hmac_sha384_init() - Initialize a HMAC-SHA384 context for a new message + * hmac_sha384_init() - Initialize an HMAC-SHA384 context for a new message * @ctx: (output) the HMAC context to initialize * @key: the prepared HMAC key * * If you don't need incremental computation, consider hmac_sha384() instead. * @@ -262,11 +262,11 @@ static inline void hmac_sha384_init(struct hmac_sha384_ctx *ctx, { __hmac_sha512_init(&ctx->ctx, &key->key); } /** - * hmac_sha384_update() - Update a HMAC-SHA384 context with message data + * hmac_sha384_update() - Update an HMAC-SHA384 context with message data * @ctx: the HMAC context to update; must have been initialized * @data: the message data * @data_len: the data length in bytes * * This can be called any number of times. @@ -278,11 +278,11 @@ static inline void hmac_sha384_update(struct hmac_sha384_ctx *ctx, { __sha512_update(&ctx->ctx.sha_ctx, data, data_len); } /** - * hmac_sha384_final() - Finish computing a HMAC-SHA384 value + * hmac_sha384_final() - Finish computing an HMAC-SHA384 value * @ctx: the HMAC context to finalize; must have been initialized * @out: (output) the resulting HMAC-SHA384 value * * After finishing, this zeroizes @ctx. So the caller does not need to do it. * @@ -405,11 +405,11 @@ struct hmac_sha512_ctx { */ void hmac_sha512_preparekey(struct hmac_sha512_key *key, const u8 *raw_key, size_t raw_key_len); /** - * hmac_sha512_init() - Initialize a HMAC-SHA512 context for a new message + * hmac_sha512_init() - Initialize an HMAC-SHA512 context for a new message * @ctx: (output) the HMAC context to initialize * @key: the prepared HMAC key * * If you don't need incremental computation, consider hmac_sha512() instead. * @@ -420,11 +420,11 @@ static inline void hmac_sha512_init(struct hmac_sha512_ctx *ctx, { __hmac_sha512_init(&ctx->ctx, &key->key); } /** - * hmac_sha512_update() - Update a HMAC-SHA512 context with message data + * hmac_sha512_update() - Update an HMAC-SHA512 context with message data * @ctx: the HMAC context to update; must have been initialized * @data: the message data * @data_len: the data length in bytes * * This can be called any number of times. @@ -436,11 +436,11 @@ static inline void hmac_sha512_update(struct hmac_sha512_ctx *ctx, { __sha512_update(&ctx->ctx.sha_ctx, data, data_len); } /** - * hmac_sha512_final() - Finish computing a HMAC-SHA512 value + * hmac_sha512_final() - Finish computing an HMAC-SHA512 value * @ctx: the HMAC context to finalize; must have been initialized * @out: (output) the resulting HMAC-SHA512 value * * After finishing, this zeroizes @ctx. So the caller does not need to do it. * -- 2.50.0