Fix typos
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(cherry picked from commit d900a015b5
)
This commit is contained in:
parent
61587d65ea
commit
020bc42893
@ -74,7 +74,7 @@ $inout3="xmm5"; $in1="xmm5";
|
||||
$inout4="xmm6"; $in0="xmm6";
|
||||
$inout5="xmm7"; $ivec="xmm7";
|
||||
|
||||
# AESNI extenstion
|
||||
# AESNI extension
|
||||
sub aeskeygenassist
|
||||
{ my($dst,$src,$imm)=@_;
|
||||
if ("$dst:$src" =~ /xmm([0-7]):xmm([0-7])/)
|
||||
|
@ -422,7 +422,7 @@ bn_mul_add_words:
|
||||
|
||||
// This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on
|
||||
// Itanium 2. Yes, unlike previous versions it scales:-) Previous
|
||||
// version was peforming *all* additions in IALU and was starving
|
||||
// version was performing *all* additions in IALU and was starving
|
||||
// for those even on Itanium 2. In this version one addition is
|
||||
// moved to FPU and is folded with multiplication. This is at cost
|
||||
// of propogating the result from previous call to this subroutine
|
||||
|
@ -19,7 +19,7 @@
|
||||
# SHA512 performance is >2.9x better than gcc 3.2 generated code on
|
||||
# PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the
|
||||
# code is executed on PA-RISC 2.0 processor and switches to 64-bit
|
||||
# code path delivering adequate peformance even in "blended" 32-bit
|
||||
# code path delivering adequate performance even in "blended" 32-bit
|
||||
# build. Though 64-bit code is not any faster than code generated by
|
||||
# vendor compiler on PA-8600...
|
||||
#
|
||||
|
@ -610,7 +610,7 @@ static int zencod_init(ENGINE *e)
|
||||
ptr_zencod_rc4_cipher = ptr_rc4_1;
|
||||
|
||||
/*
|
||||
* We should peform a test to see if there is actually any unit runnig on
|
||||
* We should perform a test to see if there is actually any unit runnig on
|
||||
* the system ... Even if the cryptozen library is loaded the module coul
|
||||
* not be loaded on the system ... For now we may just open and close the
|
||||
* device !!
|
||||
|
@ -9,9 +9,9 @@ BIO_read, BIO_write, BIO_gets, BIO_puts - BIO I/O functions
|
||||
#include <openssl/bio.h>
|
||||
|
||||
int BIO_read(BIO *b, void *buf, int len);
|
||||
int BIO_gets(BIO *b,char *buf, int size);
|
||||
int BIO_gets(BIO *b, char *buf, int size);
|
||||
int BIO_write(BIO *b, const void *buf, int len);
|
||||
int BIO_puts(BIO *b,const char *buf);
|
||||
int BIO_puts(BIO *b, const char *buf);
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
@ -26,7 +26,7 @@ return the digest and other BIOs may not support BIO_gets() at all.
|
||||
|
||||
BIO_write() attempts to write B<len> bytes from B<buf> to BIO B<b>.
|
||||
|
||||
BIO_puts() attempts to write a null terminated string B<buf> to BIO B<b>
|
||||
BIO_puts() attempts to write a null terminated string B<buf> to BIO B<b>.
|
||||
|
||||
=head1 RETURN VALUES
|
||||
|
||||
|
@ -19,7 +19,7 @@ BN_rand, BN_pseudo_rand - generate pseudo-random number
|
||||
=head1 DESCRIPTION
|
||||
|
||||
BN_rand() generates a cryptographically strong pseudo-random number of
|
||||
B<bits> bits in length and stores it in B<rnd>. If B<top> is -1, the
|
||||
B<bits> in length and stores it in B<rnd>. If B<top> is -1, the
|
||||
most significant bit of the random number can be zero. If B<top> is 0,
|
||||
it is set to 1, and if B<top> is 1, the two most significant bits of
|
||||
the number will be set to 1, so that the product of two such random
|
||||
|
@ -14,7 +14,7 @@ d2i_X509_NAME, i2d_X509_NAME - X509_NAME encoding functions
|
||||
=head1 DESCRIPTION
|
||||
|
||||
These functions decode and encode an B<X509_NAME> structure which is the
|
||||
the same as the B<Name> type defined in RFC2459 (and elsewhere) and used
|
||||
same as the B<Name> type defined in RFC2459 (and elsewhere) and used
|
||||
for example in certificate subject and issuer names.
|
||||
|
||||
Othewise the functions behave in a similar way to d2i_X509() and i2d_X509()
|
||||
|
Loading…
Reference in New Issue
Block a user