symm/*.S: Delete stray dots in some banner comments.
[catacomb] / symm / eax-def.h
index cf4c001..3154ac0 100644 (file)
@@ -123,7 +123,7 @@ void pre##_eaxsetkey(pre##_eaxkey *key, const void *k, size_t ksz)  \
    *                                                                   \
    *   * %$z_i = E_K(t_0 \xor m_0)$% is the tweak with the `full final \
    *    buffer' mask applied, which is the final tag for a final empty \
-   *    message. \
+   *    message.                                                       \
    */                                                                  \
   BLKC_BSET(PRE, t, 0); pre##_eblk(&key->ctx, t, key->v0);             \
   BLKC_XMOVE(PRE, t, key->m0); pre##_eblk(&key->ctx, t, key->z0);      \
@@ -275,9 +275,9 @@ int pre##_eaxencrypt(pre##_eaxctx *ctx,                                     \
   /* Determine the buffering plan.  Our buffer is going to do double-  \
    * duty here.  The end portion is going to contain mask from the     \
    * encrypted counter which we mix into the plaintext to encrypt it;  \
-   * the start portion, which originally mask bytes we've already used,        \
-   * will hold the output ciphertext, which will eventually be         \
-   * collected into the OMAC state.                                    \
+   * the start portion, which originally contained mask bytes we've    \
+   * already used, will hold the output ciphertext, which will         \
+   * eventually be collected into the OMAC state.                      \
    */                                                                  \
   rsvr_mkplan(&plan, &pre##_omacpolicy, ctx->off, sz);                 \
                                                                        \
@@ -362,9 +362,9 @@ int pre##_eaxdecrypt(pre##_eaxctx *ctx,                                     \
   /* Determine the buffering plan.  Our buffer is going to do double-  \
    * duty here.  The end portion is going to contain mask from the     \
    * encrypted counter which we mix into the plaintext to encrypt it;  \
-   * the start portion, which originally mask bytes we've already used,        \
-   * will hold the input ciphertext, which will eventually be          \
-   * collected into the OMAC state.                                    \
+   * the start portion, which originally contained mask bytes we've    \
+   * already used, will hold the input ciphertext, which will          \
+   * eventually be collected into the OMAC state.                      \
    */                                                                  \
   rsvr_mkplan(&plan, &pre##_omacpolicy, ctx->off, sz);                 \
                                                                        \