data/haskell-cryptonite-0.26/CHANGELOG.md:220: arithmetics ==> arithmetic
data/haskell-cryptonite-0.26/cryptonite.cabal:448: benchs ==> benches
data/haskell-cryptonite-0.26/Crypto/ECC.hs:24: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:47: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:47: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:66: keypair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:67: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:126: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:160: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:183: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:207: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:226: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/ECC.hs:244: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/Hash.hs:57: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:57: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:70: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:70: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:77: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:77: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:79: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:102: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:102: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:109: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:109: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:109: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:112: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:117: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:118: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:120: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash.hs:123: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Random.hs:89: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Random.hs:89: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaCha.hs:74: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaCha.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaCha.hs:77: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaCha.hs:88: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaCha.hs:91: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaCha.hs:101: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaCha.hs:104: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:111: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:112: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:113: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:161: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:161: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:162: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:165: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:166: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:177: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:177: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:177: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:187: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:187: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/ChaChaPoly1305.hs:187: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/RC4.hs:64: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/RC4.hs:64: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/RC4.hs:68: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/RC4.hs:70: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/RC4.hs:71: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Salsa.hs:50: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Salsa.hs:52: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Salsa.hs:53: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Salsa.hs:64: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Salsa.hs:67: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types.hs:32: Authentification ==> Authentication
data/haskell-cryptonite-0.26/Crypto/Cipher/Utils.hs:8: BA ==> BY, BE
data/haskell-cryptonite-0.26/Crypto/Cipher/Utils.hs:14: BA ==> BY, BE
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:149: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:149: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:149: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:150: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:150: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:199: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:199: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:199: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:204: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:207: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:208: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:218: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:222: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:237: Similiar ==> Similar
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:239: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:243: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:264: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:267: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:268: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:282: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:286: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:287: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:292: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:292: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:292: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:297: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:297: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:297: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:303: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:306: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:307: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:312: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:316: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:317: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:321: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:323: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:323: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:336: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:338: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:338: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:350: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:355: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:356: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:394: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:394: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:394: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:407: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:407: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:407: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:450: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:450: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:450: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:463: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:463: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:463: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:522: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:522: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:522: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:535: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:535: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/AES/Primitive.hs:535: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:107: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:109: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:134: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:134: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:134: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:135: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:136: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:137: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:138: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:143: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:143: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:143: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:144: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:145: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:146: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:147: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Blowfish/Primitive.hs:229: interating ==> iterating, interacting
data/haskell-cryptonite-0.26/Crypto/Cipher/Camellia/Primitive.hs:272: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Camellia/Primitive.hs:274: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Camellia/Primitive.hs:275: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Camellia/Primitive.hs:279: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Camellia/Primitive.hs:281: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Camellia/Primitive.hs:282: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:35: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:35: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:38: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:38: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:38: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:58: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:58: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:58: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:58: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:58: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:66: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:68: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:69: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:72: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:72: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:72: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:100: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:102: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:103: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:107: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:107: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:107: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:177: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:177: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:183: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:183: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:186: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:186: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:193: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:193: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:206: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:245: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:245: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:255: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Twofish/Primitive.hs:255: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:21: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:21: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:21: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:22: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:22: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:22: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:22: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:38: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:38: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:38: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:42: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:42: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:42: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:43: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:43: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:50: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:53: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:55: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:62: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:65: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/AEAD.hs:67: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:62: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:65: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:66: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:81: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:81: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:81: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:86: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:86: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:86: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:91: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:91: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:91: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:97: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:97: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:97: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:102: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:102: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:102: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:113: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:113: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:113: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:128: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:132: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:133: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:140: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:144: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:145: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:181: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:181: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:181: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:188: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:188: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:188: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:196: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:196: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:196: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:204: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:204: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:204: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:212: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:212: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:212: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:219: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:219: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:222: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:222: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:225: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:226: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:226: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:230: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Block.hs:231: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/GF.hs:28: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/GF.hs:28: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/GF.hs:28: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Stream.hs:20: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Stream.hs:20: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Cipher/Types/Stream.hs:20: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:47: infered ==> inferred
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:57: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:58: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:59: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:60: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:61: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:67: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:67: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:67: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/ConstructHash/MiyaguchiPreneel.hs:67: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Data/AFIS.hs:53: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Data/AFIS.hs:57: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Data/AFIS.hs:58: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Data/AFIS.hs:84: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Data/AFIS.hs:87: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Data/AFIS.hs:88: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Data/Padding.hs:9: assymetric ==> asymmetric
data/haskell-cryptonite-0.26/Crypto/ECC/Edwards25519.hs:10: familly ==> family
data/haskell-cryptonite-0.26/Crypto/Error/Types.hs:46: authentification ==> authentication
data/haskell-cryptonite-0.26/Crypto/Hash/IO.hs:41: explicitely ==> explicitly
data/haskell-cryptonite-0.26/Crypto/Hash/IO.hs:46: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash/IO.hs:46: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Hash/Types.hs:38: hidding ==> hiding, hidden
data/haskell-cryptonite-0.26/Crypto/Hash/Blake2.hs:13: chosing ==> choosing
data/haskell-cryptonite-0.26/Crypto/Hash/Blake2.hs:51: espacially ==> especially
data/haskell-cryptonite-0.26/Crypto/Internal/ByteArray.hs:30: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Internal/ByteArray.hs:30: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Internal/CompatPrim.hs:100: comparaison ==> comparison
data/haskell-cryptonite-0.26/Crypto/KDF/PBKDF2.hs:57: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/PBKDF2.hs:62: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/PBKDF2.hs:102: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/PBKDF2.hs:102: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/BCrypt.hs:113: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/BCrypt.hs:113: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/BCrypt.hs:113: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/BCrypt.hs:150: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/BCrypt.hs:150: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/KDF/BCryptPBKDF.hs:72: algorihm ==> algorithm
data/haskell-cryptonite-0.26/Crypto/KDF/HKDF.hs:36: underlaying ==> underlying
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:8: Authentification ==> Authentication
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:47: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:47: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:47: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:47: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:47: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:60: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:62: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:62: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:70: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:70: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:70: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:89: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:89: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:89: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/CMAC.hs:89: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/Poly1305.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/Poly1305.hs:76: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/Poly1305.hs:83: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/Poly1305.hs:83: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/Poly1305.hs:99: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/Poly1305.hs:99: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/HMAC.hs:8: Authentification ==> Authentication
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:53: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:54: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:57: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:58: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:86: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:87: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:105: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:105: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:109: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:109: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:159: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:159: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:165: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/MAC/KMAC.hs:165: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Generate.hs:34: optionaly ==> optionally
data/haskell-cryptonite-0.26/Crypto/Number/ModArithmetic.hs:59: prefered ==> preferred
data/haskell-cryptonite-0.26/Crypto/Number/Nat.hs:45: satified ==> satisfied
data/haskell-cryptonite-0.26/Crypto/Number/Nat.hs:52: satified ==> satisfied
data/haskell-cryptonite-0.26/Crypto/Number/Nat.hs:60: satified ==> satisfied
data/haskell-cryptonite-0.26/Crypto/Number/Prime.hs:33: implicitely ==> implicitly
data/haskell-cryptonite-0.26/Crypto/Number/Prime.hs:130: continously ==> continuously
data/haskell-cryptonite-0.26/Crypto/Number/Serialize.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize.hs:29: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize.hs:29: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize.hs:53: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize.hs:53: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize/LE.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize/LE.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize/LE.hs:29: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize/LE.hs:29: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize/LE.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize/LE.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize/LE.hs:53: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/Number/Serialize/LE.hs:53: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:26: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:90: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:90: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:93: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:94: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:97: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:98: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:101: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/DSA.hs:102: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/ECIES.hs:38: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:56: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:56: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:64: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:64: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:79: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:79: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:95: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:95: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:106: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed25519.hs:106: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:60: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:60: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:68: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:68: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:83: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:83: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:99: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:99: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:110: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/Ed448.hs:110: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/ECDSA.hs:10: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/ECDSA.hs:52: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/ECDSA.hs:52: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/ECDSA.hs:56: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/ECDSA.hs:57: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/ECDSA.hs:60: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/ECDSA.hs:61: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:178: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:178: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:184: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:184: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:185: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:185: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:193: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:193: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:194: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:195: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:197: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:258: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:258: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:259: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:260: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:262: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:267: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/P256.hs:267: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/ECC/Types.hs:54: firt ==> first, flirt
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:23: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:29: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:29: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:29: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:39: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:49: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:49: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:49: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:55: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:55: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Prim.hs:55: ba ==> by, be
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/PSS.hs:62: explicitely ==> explicitly
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/PSS.hs:89: explicitely ==> explicitly
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:15: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:86: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:89: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:89: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:92: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:93: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:94: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:96: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:97: KeyPair ==> key pair
data/haskell-cryptonite-0.26/Crypto/PubKey/RSA/Types.hs:98: KeyPair ==> key pair
data/haskell-cryptonite-0.26/benchs/Bench.hs:135: ba ==> by, be
data/haskell-cryptonite-0.26/benchs/Bench.hs:136: ba ==> by, be
data/haskell-cryptonite-0.26/benchs/Bench.hs:136: ba ==> by, be
data/haskell-cryptonite-0.26/benchs/Bench.hs:148: ba ==> by, be
data/haskell-cryptonite-0.26/benchs/Bench.hs:149: ba ==> by, be
data/haskell-cryptonite-0.26/benchs/Bench.hs:149: ba ==> by, be
data/haskell-cryptonite-0.26/benchs/Bench.hs:245: KeyPair ==> key pair
data/haskell-cryptonite-0.26/benchs/Bench.hs:246: KeyPair ==> key pair
data/haskell-cryptonite-0.26/cbits/cryptonite_rdrand.c:94: succesfully ==> successfully
data/haskell-cryptonite-0.26/cbits/cryptonite_aes.c:197: strenght ==> strength
data/haskell-cryptonite-0.26/cbits/cryptonite_aes.c:636: strech ==> stretch
data/haskell-cryptonite-0.26/cbits/argon2/argon2.h:93: deafults ==> defaults
data/haskell-cryptonite-0.26/cbits/argon2/thread.h:49: successfuly ==> successfully
data/haskell-cryptonite-0.26/cbits/blake2/sse/blake2b-round.h:22: TOI ==> TO, TOY
data/haskell-cryptonite-0.26/cbits/blake2/sse/blake2s-load-sse41.h:19: TOI ==> TO, TOY
data/haskell-cryptonite-0.26/cbits/blake2/sse/blake2s-load-sse41.h:22: TOI ==> TO, TOY
data/haskell-cryptonite-0.26/cbits/blake2/sse/blake2s-load-sse41.h:25: TOI ==> TO, TOY
data/haskell-cryptonite-0.26/cbits/blake2/sse/blake2s-load-sse41.h:28: TOI ==> TO, TOY
data/haskell-cryptonite-0.26/cbits/blake2/sse/blake2s-round.h:22: TOI ==> TO, TOY
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:229: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:236: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:244: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:247: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:267: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:281: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:294: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:304: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/scalar.c:310: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/decaf.c:230: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/decaf.c:233: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/decaf.c:238: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/ed448goldilocks/decaf.c:242: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:102: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:111: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:118: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:124: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:131: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:135: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:234: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:238: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:250: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:254: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/include/decaf/point_448.h:258: ser ==> set
data/haskell-cryptonite-0.26/cbits/decaf/p448/f_field.h:73: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/decaf/p448/f_field.h:74: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/decaf/p448/f_field.h:76: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:194: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:194: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:195: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:195: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:196: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:199: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:200: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:203: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:204: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:205: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:206: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:207: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:210: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256_ec.c:211: inout ==> input, in out
data/haskell-cryptonite-0.26/cbits/p256/p256.h:49: assigment ==> assignment
data/haskell-cryptonite-0.26/tests/BCryptPBKDF.hs:38: implemenation ==> implementation
data/haskell-cryptonite-0.26/tests/BCryptPBKDF.hs:56: implemenation ==> implementation
data/haskell-cryptonite-0.26/tests/ECC.hs:276: keyPair ==> key pair
data/haskell-cryptonite-0.26/tests/ECC.hs:277: keyPair ==> key pair
data/haskell-cryptonite-0.26/tests/ECC.hs:285: keyPair ==> key pair
data/haskell-cryptonite-0.26/tests/ECC.hs:286: keyPair ==> key pair
data/haskell-cryptonite-0.26/tests/Number.hs:74: ba ==> by, be
data/haskell-cryptonite-0.26/tests/Number.hs:74: ba ==> by, be
data/haskell-cryptonite-0.26/tests/Number.hs:75: ba ==> by, be
data/haskell-cryptonite-0.26/tests/Number.hs:75: ba ==> by, be
data/haskell-cryptonite-0.26/tests/KAT_PubKey/ECC.hs:167: pRes ==> press
data/haskell-cryptonite-0.26/tests/KAT_PubKey/ECC.hs:169: pRes ==> press
data/haskell-cryptonite-0.26/tests/KAT_PubKey/ECC.hs:173: pRes ==> press
data/haskell-cryptonite-0.26/tests/KAT_PubKey/ECC.hs:175: pRes ==> press
data/haskell-cryptonite-0.26/tests/KAT_PubKey/PSS.hs:87: ba ==> by, be
data/haskell-cryptonite-0.26/tests/KAT_PubKey/PSS.hs:89: ba ==> by, be
data/haskell-cryptonite-0.26/tests/KAT_PubKey/PSS.hs:96: ba ==> by, be
data/haskell-cryptonite-0.26/tests/KAT_PubKey/PSS.hs:98: ba ==> by, be
data/haskell-cryptonite-0.26/tests/KAT_PubKey/PSS.hs:105: ba ==> by, be
data/haskell-cryptonite-0.26/tests/KAT_PubKey/PSS.hs:107: ba ==> by, be