PR: 1835
Submitted by: Damien Miller <djm@mindrot.org> Approved by: steve@openssl.org Fix various typos.
This commit is contained in:
parent
30b1b28aff
commit
477fd4596f
@ -29,7 +29,7 @@ OSErr AppendErrorMessageToHandle(Handle inoutHandle);
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
// A bunch of evil macros that would be uneccessary if I were always using C++ !
|
// A bunch of evil macros that would be unnecessary if I were always using C++ !
|
||||||
|
|
||||||
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \
|
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \
|
||||||
{ \
|
{ \
|
||||||
|
@ -79,7 +79,7 @@ ASN1_STRING *d2i_ASN1_type_bytes(ASN1_STRING **a, const unsigned char **pp,
|
|||||||
|
|
||||||
if (tag >= 32)
|
if (tag >= 32)
|
||||||
{
|
{
|
||||||
i=ASN1_R_TAG_VALUE_TOO_HIGH;;
|
i=ASN1_R_TAG_VALUE_TOO_HIGH;
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
if (!(ASN1_tag2bit(tag) & type))
|
if (!(ASN1_tag2bit(tag) & type))
|
||||||
|
@ -928,7 +928,7 @@ int test_mod_exp(BIO *bp, BN_CTX *ctx)
|
|||||||
BN_bntest_rand(b,2+i,0,0); /**/
|
BN_bntest_rand(b,2+i,0,0); /**/
|
||||||
|
|
||||||
if (!BN_mod_exp(d,a,b,c,ctx))
|
if (!BN_mod_exp(d,a,b,c,ctx))
|
||||||
return(00);
|
return(0);
|
||||||
|
|
||||||
if (bp != NULL)
|
if (bp != NULL)
|
||||||
{
|
{
|
||||||
@ -1030,7 +1030,7 @@ int test_exp(BIO *bp, BN_CTX *ctx)
|
|||||||
BN_bntest_rand(b,2+i,0,0); /**/
|
BN_bntest_rand(b,2+i,0,0); /**/
|
||||||
|
|
||||||
if (!BN_exp(d,a,b,ctx))
|
if (!BN_exp(d,a,b,ctx))
|
||||||
return(00);
|
return(0);
|
||||||
|
|
||||||
if (bp != NULL)
|
if (bp != NULL)
|
||||||
{
|
{
|
||||||
|
@ -2,7 +2,7 @@ solaris 2.5.1 usparc 167mhz?? - SC4.0 cc -fast -Xa -xO5
|
|||||||
|
|
||||||
For the ultra sparc, SunC 4.0 cc -fast -Xa -xO5, running 'des_opts'
|
For the ultra sparc, SunC 4.0 cc -fast -Xa -xO5, running 'des_opts'
|
||||||
gives a speed of 475,000 des/s while 'speed' gives 417,000 des/s.
|
gives a speed of 475,000 des/s while 'speed' gives 417,000 des/s.
|
||||||
I belive the difference is tied up in optimisation that the compiler
|
I believe the difference is tied up in optimisation that the compiler
|
||||||
is able to perform when the code is 'inlined'. For 'speed', the DES
|
is able to perform when the code is 'inlined'. For 'speed', the DES
|
||||||
routines are being linked from a library. I'll record the higher
|
routines are being linked from a library. I'll record the higher
|
||||||
speed since if performance is everything, you can always inline
|
speed since if performance is everything, you can always inline
|
||||||
|
@ -4,7 +4,7 @@ http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html
|
|||||||
This is my implementation of RIPEMD-160. The pentium assember is a little
|
This is my implementation of RIPEMD-160. The pentium assember is a little
|
||||||
off the pace since I only get 1050 cycles, while the best is 1013.
|
off the pace since I only get 1050 cycles, while the best is 1013.
|
||||||
I have a few ideas for how to get another 20 or so cycles, but at
|
I have a few ideas for how to get another 20 or so cycles, but at
|
||||||
this point I will not bother right now. I belive the trick will be
|
this point I will not bother right now. I believe the trick will be
|
||||||
to remove my 'copy X array onto stack' until inside the RIP1() finctions the
|
to remove my 'copy X array onto stack' until inside the RIP1() finctions the
|
||||||
first time round. To do this I need another register and will only have one
|
first time round. To do this I need another register and will only have one
|
||||||
temporary one. A bit tricky.... I can also cleanup the saving of the 5 words
|
temporary one. A bit tricky.... I can also cleanup the saving of the 5 words
|
||||||
|
@ -84,7 +84,7 @@ int X509V3_add_value(const char *name, const char *value,
|
|||||||
CONF_VALUE *vtmp = NULL;
|
CONF_VALUE *vtmp = NULL;
|
||||||
char *tname = NULL, *tvalue = NULL;
|
char *tname = NULL, *tvalue = NULL;
|
||||||
if(name && !(tname = BUF_strdup(name))) goto err;
|
if(name && !(tname = BUF_strdup(name))) goto err;
|
||||||
if(value && !(tvalue = BUF_strdup(value))) goto err;;
|
if(value && !(tvalue = BUF_strdup(value))) goto err;
|
||||||
if(!(vtmp = (CONF_VALUE *)OPENSSL_malloc(sizeof(CONF_VALUE)))) goto err;
|
if(!(vtmp = (CONF_VALUE *)OPENSSL_malloc(sizeof(CONF_VALUE)))) goto err;
|
||||||
if(!*extlist && !(*extlist = sk_CONF_VALUE_new_null())) goto err;
|
if(!*extlist && !(*extlist = sk_CONF_VALUE_new_null())) goto err;
|
||||||
vtmp->section = NULL;
|
vtmp->section = NULL;
|
||||||
|
@ -28,7 +28,7 @@ SSL_CIPHER_get_version() returns the protocol version for B<cipher>, currently
|
|||||||
|
|
||||||
SSL_CIPHER_description() returns a textual description of the cipher used
|
SSL_CIPHER_description() returns a textual description of the cipher used
|
||||||
into the buffer B<buf> of length B<len> provided. B<len> must be at least
|
into the buffer B<buf> of length B<len> provided. B<len> must be at least
|
||||||
128 bytes, otherwise a pointer to the the string "Buffer too small" is
|
128 bytes, otherwise a pointer to the string "Buffer too small" is
|
||||||
returned. If B<buf> is NULL, a buffer of 128 bytes is allocated using
|
returned. If B<buf> is NULL, a buffer of 128 bytes is allocated using
|
||||||
OPENSSL_malloc(). If the allocation fails, a pointer to the string
|
OPENSSL_malloc(). If the allocation fails, a pointer to the string
|
||||||
"OPENSSL_malloc Error" is returned.
|
"OPENSSL_malloc Error" is returned.
|
||||||
|
@ -28,7 +28,7 @@ specifies the B<verify_callback> function to be used. If no callback function
|
|||||||
shall be specified, the NULL pointer can be used for B<verify_callback>. In
|
shall be specified, the NULL pointer can be used for B<verify_callback>. In
|
||||||
this case last B<verify_callback> set specifically for this B<ssl> remains. If
|
this case last B<verify_callback> set specifically for this B<ssl> remains. If
|
||||||
no special B<callback> was set before, the default callback for the underlying
|
no special B<callback> was set before, the default callback for the underlying
|
||||||
B<ctx> is used, that was valid at the the time B<ssl> was created with
|
B<ctx> is used, that was valid at the time B<ssl> was created with
|
||||||
L<SSL_new(3)|SSL_new(3)>.
|
L<SSL_new(3)|SSL_new(3)>.
|
||||||
|
|
||||||
SSL_CTX_set_verify_depth() sets the maximum B<depth> for the certificate chain
|
SSL_CTX_set_verify_depth() sets the maximum B<depth> for the certificate chain
|
||||||
|
@ -14,7 +14,7 @@ SSL_SESSION_free - free an allocated SSL_SESSION structure
|
|||||||
|
|
||||||
SSL_SESSION_free() decrements the reference count of B<session> and removes
|
SSL_SESSION_free() decrements the reference count of B<session> and removes
|
||||||
the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated
|
the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated
|
||||||
memory, if the the reference count has reached 0.
|
memory, if the reference count has reached 0.
|
||||||
|
|
||||||
=head1 NOTES
|
=head1 NOTES
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ SSL_free - free an allocated SSL structure
|
|||||||
|
|
||||||
SSL_free() decrements the reference count of B<ssl>, and removes the SSL
|
SSL_free() decrements the reference count of B<ssl>, and removes the SSL
|
||||||
structure pointed to by B<ssl> and frees up the allocated memory if the
|
structure pointed to by B<ssl> and frees up the allocated memory if the
|
||||||
the reference count has reached 0.
|
reference count has reached 0.
|
||||||
|
|
||||||
=head1 NOTES
|
=head1 NOTES
|
||||||
|
|
||||||
|
@ -3800,9 +3800,9 @@ made public on sci.crypt in Sep 1994 (RC4) and Feb 1996 (RC2). I have
|
|||||||
copies of the origional postings if people are interested. RSA I believe
|
copies of the origional postings if people are interested. RSA I believe
|
||||||
claim that they were 'trade-secrets' and that some-one broke an NDA in
|
claim that they were 'trade-secrets' and that some-one broke an NDA in
|
||||||
revealing them. Other claim they reverse engineered the algorithms from
|
revealing them. Other claim they reverse engineered the algorithms from
|
||||||
compiled binaries. If the algorithms were reverse engineered, I belive
|
compiled binaries. If the algorithms were reverse engineered, I believe
|
||||||
RSA had no legal leg to stand on. If an NDA was broken, I don't know.
|
RSA had no legal leg to stand on. If an NDA was broken, I don't know.
|
||||||
Regardless, RSA, I belive, is willing to go to court over the issue so
|
Regardless, RSA, I believe, is willing to go to court over the issue so
|
||||||
licencing is probably the best idea, or at least talk to them.
|
licencing is probably the best idea, or at least talk to them.
|
||||||
If there are people who actually know more about this, pease let me know, I
|
If there are people who actually know more about this, pease let me know, I
|
||||||
don't want to vilify or spread miss-information if I can help it.
|
don't want to vilify or spread miss-information if I can help it.
|
||||||
|
@ -946,7 +946,7 @@ kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text)
|
|||||||
if (kssl_err == NULL) return;
|
if (kssl_err == NULL) return;
|
||||||
|
|
||||||
kssl_err->reason = reason;
|
kssl_err->reason = reason;
|
||||||
BIO_snprintf(kssl_err->text, KSSL_ERR_MAX, text);
|
BIO_snprintf(kssl_err->text, KSSL_ERR_MAX, "%s", text);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -190,7 +190,7 @@ int ssl3_connect(SSL *s)
|
|||||||
long num1;
|
long num1;
|
||||||
void (*cb)(const SSL *ssl,int type,int val)=NULL;
|
void (*cb)(const SSL *ssl,int type,int val)=NULL;
|
||||||
int ret= -1;
|
int ret= -1;
|
||||||
int new_state,state,skip=0;;
|
int new_state,state,skip=0;
|
||||||
|
|
||||||
RAND_add(&Time,sizeof(Time),0);
|
RAND_add(&Time,sizeof(Time),0);
|
||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
|
@ -68,7 +68,7 @@ eric (adding numbers to speculation)
|
|||||||
--- Appendix ---
|
--- Appendix ---
|
||||||
- The time measured is user time but these number a very rough.
|
- The time measured is user time but these number a very rough.
|
||||||
- Remember this is the cost of both client and server sides of the protocol.
|
- Remember this is the cost of both client and server sides of the protocol.
|
||||||
- The TCP/kernal overhead of connection establishment is normally the
|
- The TCP/kernel overhead of connection establishment is normally the
|
||||||
killer in SSL. Often delays in the TCP protocol will make session-id
|
killer in SSL. Often delays in the TCP protocol will make session-id
|
||||||
reuse look slower that new sessions, but this would not be the case on
|
reuse look slower that new sessions, but this would not be the case on
|
||||||
a loaded server.
|
a loaded server.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user