* \
* * %$z_i = E_K(t_0 \xor m_0)$% is the tweak with the `full final \
* buffer' mask applied, which is the final tag for a final empty \
- * message. \
+ * message. \
*/ \
BLKC_BSET(PRE, t, 0); pre##_eblk(&key->ctx, t, key->v0); \
BLKC_XMOVE(PRE, t, key->m0); pre##_eblk(&key->ctx, t, key->z0); \
/* Determine the buffering plan. Our buffer is going to do double- \
* duty here. The end portion is going to contain mask from the \
* encrypted counter which we mix into the plaintext to encrypt it; \
- * the start portion, which originally mask bytes we've already used, \
- * will hold the output ciphertext, which will eventually be \
- * collected into the OMAC state. \
+ * the start portion, which originally contained mask bytes we've \
+ * already used, will hold the output ciphertext, which will \
+ * eventually be collected into the OMAC state. \
*/ \
rsvr_mkplan(&plan, &pre##_omacpolicy, ctx->off, sz); \
\
/* Determine the buffering plan. Our buffer is going to do double- \
* duty here. The end portion is going to contain mask from the \
* encrypted counter which we mix into the plaintext to encrypt it; \
- * the start portion, which originally mask bytes we've already used, \
- * will hold the input ciphertext, which will eventually be \
- * collected into the OMAC state. \
+ * the start portion, which originally contained mask bytes we've \
+ * already used, will hold the input ciphertext, which will \
+ * eventually be collected into the OMAC state. \
*/ \
rsvr_mkplan(&plan, &pre##_omacpolicy, ctx->off, sz); \
\