summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/sha
diff options
context:
space:
mode:
authorjmc <>2022-12-26 07:18:53 +0000
committerjmc <>2022-12-26 07:18:53 +0000
commit8144b51086b3c46594192ccbec62762e58d61200 (patch)
tree26f3d93398833b7449b8a97e9fe4af9904382dbf /src/lib/libcrypto/sha
parent54da696f897367a85e20e97a53d29b18b44cf8b7 (diff)
downloadopenbsd-8144b51086b3c46594192ccbec62762e58d61200.tar.gz
openbsd-8144b51086b3c46594192ccbec62762e58d61200.tar.bz2
openbsd-8144b51086b3c46594192ccbec62762e58d61200.zip
spelling fixes; from paul tagliamonte
i removed the arithmetics -> arithmetic changes, as i felt they were not clearly correct ok tb
Diffstat (limited to 'src/lib/libcrypto/sha')
-rw-r--r--src/lib/libcrypto/sha/asm/sha1-586.pl8
-rw-r--r--src/lib/libcrypto/sha/asm/sha1-sparcv9a.pl2
-rw-r--r--src/lib/libcrypto/sha/asm/sha1-thumb.pl2
-rwxr-xr-xsrc/lib/libcrypto/sha/asm/sha1-x86_64.pl4
-rwxr-xr-xsrc/lib/libcrypto/sha/asm/sha512-x86_64.pl2
5 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libcrypto/sha/asm/sha1-586.pl b/src/lib/libcrypto/sha/asm/sha1-586.pl
index d29ed84706..1de5e2650e 100644
--- a/src/lib/libcrypto/sha/asm/sha1-586.pl
+++ b/src/lib/libcrypto/sha/asm/sha1-586.pl
@@ -28,7 +28,7 @@
28# P4 +85%(!) +45% 28# P4 +85%(!) +45%
29# 29#
30# As you can see Pentium came out as looser:-( Yet I reckoned that 30# As you can see Pentium came out as looser:-( Yet I reckoned that
31# improvement on P4 outweights the loss and incorporate this 31# improvement on P4 outweighs the loss and incorporate this
32# re-tuned code to 0.9.7 and later. 32# re-tuned code to 0.9.7 and later.
33# ---------------------------------------------------------------- 33# ----------------------------------------------------------------
34# <appro@fy.chalmers.se> 34# <appro@fy.chalmers.se>
@@ -511,14 +511,14 @@ my $_ror=sub { &ror(@_) };
511# 511#
512# Temporary registers usage. X[2] is volatile at the entry and at the 512# Temporary registers usage. X[2] is volatile at the entry and at the
513# end is restored from backtrace ring buffer. X[3] is expected to 513# end is restored from backtrace ring buffer. X[3] is expected to
514# contain current K_XX_XX constant and is used to caclulate X[-1]+K 514# contain current K_XX_XX constant and is used to calculate X[-1]+K
515# from previous round, it becomes volatile the moment the value is 515# from previous round, it becomes volatile the moment the value is
516# saved to stack for transfer to IALU. X[4] becomes volatile whenever 516# saved to stack for transfer to IALU. X[4] becomes volatile whenever
517# X[-4] is accumulated and offloaded to backtrace ring buffer, at the 517# X[-4] is accumulated and offloaded to backtrace ring buffer, at the
518# end it is loaded with next K_XX_XX [which becomes X[3] in next 518# end it is loaded with next K_XX_XX [which becomes X[3] in next
519# round]... 519# round]...
520# 520#
521sub Xupdate_ssse3_16_31() # recall that $Xi starts wtih 4 521sub Xupdate_ssse3_16_31() # recall that $Xi starts with 4
522{ use integer; 522{ use integer;
523 my $body = shift; 523 my $body = shift;
524 my @insns = (&$body,&$body,&$body,&$body); # 40 instructions 524 my @insns = (&$body,&$body,&$body,&$body); # 40 instructions
@@ -940,7 +940,7 @@ my $_ror=sub { &shrd(@_[0],@_) };
940 &vmovdqa(&QWP(0+32,"esp"),@X[2]); 940 &vmovdqa(&QWP(0+32,"esp"),@X[2]);
941 &jmp (&label("loop")); 941 &jmp (&label("loop"));
942 942
943sub Xupdate_avx_16_31() # recall that $Xi starts wtih 4 943sub Xupdate_avx_16_31() # recall that $Xi starts with 4
944{ use integer; 944{ use integer;
945 my $body = shift; 945 my $body = shift;
946 my @insns = (&$body,&$body,&$body,&$body); # 40 instructions 946 my @insns = (&$body,&$body,&$body,&$body); # 40 instructions
diff --git a/src/lib/libcrypto/sha/asm/sha1-sparcv9a.pl b/src/lib/libcrypto/sha/asm/sha1-sparcv9a.pl
index e65291bbd9..e81a4dcb05 100644
--- a/src/lib/libcrypto/sha/asm/sha1-sparcv9a.pl
+++ b/src/lib/libcrypto/sha/asm/sha1-sparcv9a.pl
@@ -544,7 +544,7 @@ ___
544 544
545# Purpose of these subroutines is to explicitly encode VIS instructions, 545# Purpose of these subroutines is to explicitly encode VIS instructions,
546# so that one can compile the module without having to specify VIS 546# so that one can compile the module without having to specify VIS
547# extentions on compiler command line, e.g. -xarch=v9 vs. -xarch=v9a. 547# extensions on compiler command line, e.g. -xarch=v9 vs. -xarch=v9a.
548# Idea is to reserve for option to produce "universal" binary and let 548# Idea is to reserve for option to produce "universal" binary and let
549# programmer detect if current CPU is VIS capable at run-time. 549# programmer detect if current CPU is VIS capable at run-time.
550sub unvis { 550sub unvis {
diff --git a/src/lib/libcrypto/sha/asm/sha1-thumb.pl b/src/lib/libcrypto/sha/asm/sha1-thumb.pl
index 7c9ea9b029..553e9cedb5 100644
--- a/src/lib/libcrypto/sha/asm/sha1-thumb.pl
+++ b/src/lib/libcrypto/sha/asm/sha1-thumb.pl
@@ -14,7 +14,7 @@
14# The code does not present direct interest to OpenSSL, because of low 14# The code does not present direct interest to OpenSSL, because of low
15# performance. Its purpose is to establish _size_ benchmark. Pretty 15# performance. Its purpose is to establish _size_ benchmark. Pretty
16# useless one I must say, because 30% or 88 bytes larger ARMv4 code 16# useless one I must say, because 30% or 88 bytes larger ARMv4 code
17# [avialable on demand] is almost _twice_ as fast. It should also be 17# [available on demand] is almost _twice_ as fast. It should also be
18# noted that in-lining of .Lcommon and .Lrotate improves performance 18# noted that in-lining of .Lcommon and .Lrotate improves performance
19# by over 40%, while code increases by only 10% or 32 bytes. But once 19# by over 40%, while code increases by only 10% or 32 bytes. But once
20# again, the goal was to establish _size_ benchmark, not performance. 20# again, the goal was to establish _size_ benchmark, not performance.
diff --git a/src/lib/libcrypto/sha/asm/sha1-x86_64.pl b/src/lib/libcrypto/sha/asm/sha1-x86_64.pl
index 147d21570b..cc8ef5337d 100755
--- a/src/lib/libcrypto/sha/asm/sha1-x86_64.pl
+++ b/src/lib/libcrypto/sha/asm/sha1-x86_64.pl
@@ -368,7 +368,7 @@ sub AUTOLOAD() # thunk [simplified] 32-bit style perlasm
368 $code .= "\t$opcode\t".join(',',$arg,reverse @_)."\n"; 368 $code .= "\t$opcode\t".join(',',$arg,reverse @_)."\n";
369} 369}
370 370
371sub Xupdate_ssse3_16_31() # recall that $Xi starts wtih 4 371sub Xupdate_ssse3_16_31() # recall that $Xi starts with 4
372{ use integer; 372{ use integer;
373 my $body = shift; 373 my $body = shift;
374 my @insns = (&$body,&$body,&$body,&$body); # 40 instructions 374 my @insns = (&$body,&$body,&$body,&$body); # 40 instructions
@@ -779,7 +779,7 @@ $code.=<<___;
779 jmp .Loop_avx 779 jmp .Loop_avx
780___ 780___
781 781
782sub Xupdate_avx_16_31() # recall that $Xi starts wtih 4 782sub Xupdate_avx_16_31() # recall that $Xi starts with 4
783{ use integer; 783{ use integer;
784 my $body = shift; 784 my $body = shift;
785 my @insns = (&$body,&$body,&$body,&$body); # 40 instructions 785 my @insns = (&$body,&$body,&$body,&$body); # 40 instructions
diff --git a/src/lib/libcrypto/sha/asm/sha512-x86_64.pl b/src/lib/libcrypto/sha/asm/sha512-x86_64.pl
index feb0f9e776..bc4b2e7487 100755
--- a/src/lib/libcrypto/sha/asm/sha512-x86_64.pl
+++ b/src/lib/libcrypto/sha/asm/sha512-x86_64.pl
@@ -34,7 +34,7 @@
34# level parallelism, on a given CPU implementation in this case. 34# level parallelism, on a given CPU implementation in this case.
35# 35#
36# Special note on Intel EM64T. While Opteron CPU exhibits perfect 36# Special note on Intel EM64T. While Opteron CPU exhibits perfect
37# perfromance ratio of 1.5 between 64- and 32-bit flavors [see above], 37# performance ratio of 1.5 between 64- and 32-bit flavors [see above],
38# [currently available] EM64T CPUs apparently are far from it. On the 38# [currently available] EM64T CPUs apparently are far from it. On the
39# contrary, 64-bit version, sha512_block, is ~30% *slower* than 32-bit 39# contrary, 64-bit version, sha512_block, is ~30% *slower* than 32-bit
40# sha256_block:-( This is presumably because 64-bit shifts/rotates 40# sha256_block:-( This is presumably because 64-bit shifts/rotates