nvmet-auth: fix a couple of spelling mistakes
authorColin Ian King <colin.i.king@gmail.com>
Fri, 15 Jul 2022 13:24:13 +0000 (14:24 +0100)
committerJens Axboe <axboe@kernel.dk>
Tue, 2 Aug 2022 23:22:51 +0000 (17:22 -0600)
There are a couple of spelling mistakes in pr_warn and pr_debug messages.
Fix them.

Signed-off-by: Colin Ian King <colin.i.king@gmail.com>
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
drivers/nvme/common/auth.c
drivers/nvme/target/auth.c

index df20445..04bd28f 100644 (file)
@@ -347,7 +347,7 @@ int nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len,
 
        hmac_name = nvme_auth_hmac_name(hmac_id);
        if (!hmac_name) {
-               pr_warn("%s: invalid hash algoritm %d\n",
+               pr_warn("%s: invalid hash algorithm %d\n",
                        __func__, hmac_id);
                ret = -EINVAL;
                goto out_free_key;
index 716a10c..cf690df 100644 (file)
@@ -515,7 +515,7 @@ int nvmet_auth_ctrl_sesskey(struct nvmet_req *req,
                                          req->sq->dhchap_skey,
                                          req->sq->dhchap_skey_len);
        if (ret)
-               pr_debug("failed to compute shared secred, err %d\n", ret);
+               pr_debug("failed to compute shared secret, err %d\n", ret);
        else
                pr_debug("%s: shared secret %*ph\n", __func__,
                         (int)req->sq->dhchap_skey_len,