X-Git-Url: https://git.stricted.de/?a=blobdiff_plain;f=crypto%2Fgf128mul.c;h=df35e4ccd07e565e02ca547a4202107118fdb1e1;hb=25985edcedea6396277003854657b5f3cb31a628;hp=a90d260528d4fbe09e3df8832736dc627f25de21;hpb=b97bedcdedb4ae95b2128a4770dfc160e113b174;p=GitHub%2Fmt8127%2Fandroid_kernel_alcatel_ttab.git diff --git a/crypto/gf128mul.c b/crypto/gf128mul.c index a90d260528d4..df35e4ccd07e 100644 --- a/crypto/gf128mul.c +++ b/crypto/gf128mul.c @@ -89,7 +89,7 @@ } /* Given the value i in 0..255 as the byte overflow when a field element - in GHASH is multipled by x^8, this function will return the values that + in GHASH is multiplied by x^8, this function will return the values that are generated in the lo 16-bit word of the field value by applying the modular polynomial. The values lo_byte and hi_byte are returned via the macro xp_fun(lo_byte, hi_byte) so that the values can be assembled into