Commit 252b5408 authored by Kai Ye's avatar Kai Ye Committed by JiangShui
Browse files

crypto: hisilicon/sec - fix spelling mistake 'ckeck' -> 'check'

mainline inclusion
from mainline-v6.2-rc1
commit 2132d4ef
category: feature
bugzilla: https://gitee/com/openeuler/kernel/issues/16VW8E
CVE: NA

Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2132d4efaa66388f1f79c79a920908a22464686b



-------------------------------------------------------------------

There are a couple of spelling mistakes in sec2. Fix them.

Signed-off-by: default avatarKai Ye <yekai13@huawei.com>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: default avatarJangShui <yangjiangshui@h-partners.com>
parent dc192268
Loading
Loading
Loading
Loading
+2 −2
Original line number Original line Diff line number Diff line
@@ -2009,7 +2009,7 @@ static int sec_aead_sha512_ctx_init(struct crypto_aead *tfm)
	return sec_aead_ctx_init(tfm, "sha512");
	return sec_aead_ctx_init(tfm, "sha512");
}
}


static int sec_skcipher_cryptlen_ckeck(struct sec_ctx *ctx,
static int sec_skcipher_cryptlen_check(struct sec_ctx *ctx,
	struct sec_req *sreq)
	struct sec_req *sreq)
{
{
	u32 cryptlen = sreq->c_req.sk_req->cryptlen;
	u32 cryptlen = sreq->c_req.sk_req->cryptlen;
@@ -2071,7 +2071,7 @@ static int sec_skcipher_param_check(struct sec_ctx *ctx, struct sec_req *sreq)
		}
		}
		return 0;
		return 0;
	} else if (c_alg == SEC_CALG_AES || c_alg == SEC_CALG_SM4) {
	} else if (c_alg == SEC_CALG_AES || c_alg == SEC_CALG_SM4) {
		return sec_skcipher_cryptlen_ckeck(ctx, sreq);
		return sec_skcipher_cryptlen_check(ctx, sreq);
	}
	}


	dev_err(dev, "skcipher algorithm error!\n");
	dev_err(dev, "skcipher algorithm error!\n");