X-Git-Url: https://git.distorted.org.uk/~mdw/catacomb/blobdiff_plain/141c12847a1c2f8cc8db03d420551584e689fb87..1b420890ac399d1844ab6c4fe0e0e22ba8fbe3ad:/symm/eax-def.h diff --git a/symm/eax-def.h b/symm/eax-def.h index cf4c0010..3154ac07 100644 --- a/symm/eax-def.h +++ b/symm/eax-def.h @@ -123,7 +123,7 @@ void pre##_eaxsetkey(pre##_eaxkey *key, const void *k, size_t ksz) \ * \ * * %$z_i = E_K(t_0 \xor m_0)$% is the tweak with the `full final \ * buffer' mask applied, which is the final tag for a final empty \ - * message. \ + * message. \ */ \ BLKC_BSET(PRE, t, 0); pre##_eblk(&key->ctx, t, key->v0); \ BLKC_XMOVE(PRE, t, key->m0); pre##_eblk(&key->ctx, t, key->z0); \ @@ -275,9 +275,9 @@ int pre##_eaxencrypt(pre##_eaxctx *ctx, \ /* Determine the buffering plan. Our buffer is going to do double- \ * duty here. The end portion is going to contain mask from the \ * encrypted counter which we mix into the plaintext to encrypt it; \ - * the start portion, which originally mask bytes we've already used, \ - * will hold the output ciphertext, which will eventually be \ - * collected into the OMAC state. \ + * the start portion, which originally contained mask bytes we've \ + * already used, will hold the output ciphertext, which will \ + * eventually be collected into the OMAC state. \ */ \ rsvr_mkplan(&plan, &pre##_omacpolicy, ctx->off, sz); \ \ @@ -362,9 +362,9 @@ int pre##_eaxdecrypt(pre##_eaxctx *ctx, \ /* Determine the buffering plan. Our buffer is going to do double- \ * duty here. The end portion is going to contain mask from the \ * encrypted counter which we mix into the plaintext to encrypt it; \ - * the start portion, which originally mask bytes we've already used, \ - * will hold the input ciphertext, which will eventually be \ - * collected into the OMAC state. \ + * the start portion, which originally contained mask bytes we've \ + * already used, will hold the input ciphertext, which will \ + * eventually be collected into the OMAC state. \ */ \ rsvr_mkplan(&plan, &pre##_omacpolicy, ctx->off, sz); \ \