diff options
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libcrypto/bn/asm/ia64.S | 2 | ||||
-rw-r--r-- | src/lib/libcrypto/doc/EVP_BytesToKey.pod | 2 | ||||
-rw-r--r-- | src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod | 2 | ||||
-rw-r--r-- | src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | 2 | ||||
-rwxr-xr-x | src/lib/libcrypto/sha/asm/sha512-parisc.pl | 2 | ||||
-rw-r--r-- | src/lib/libssl/src/crypto/bn/asm/ia64.S | 2 | ||||
-rwxr-xr-x | src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl | 2 | ||||
-rw-r--r-- | src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod | 2 | ||||
-rw-r--r-- | src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod | 2 | ||||
-rw-r--r-- | src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod | 2 |
10 files changed, 10 insertions, 10 deletions
diff --git a/src/lib/libcrypto/bn/asm/ia64.S b/src/lib/libcrypto/bn/asm/ia64.S index 7c4fbd3118..0cf805ddc4 100644 --- a/src/lib/libcrypto/bn/asm/ia64.S +++ b/src/lib/libcrypto/bn/asm/ia64.S | |||
@@ -422,7 +422,7 @@ bn_mul_add_words: | |||
422 | 422 | ||
423 | // This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on | 423 | // This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on |
424 | // Itanium 2. Yes, unlike previous versions it scales:-) Previous | 424 | // Itanium 2. Yes, unlike previous versions it scales:-) Previous |
425 | // version was peforming *all* additions in IALU and was starving | 425 | // version was performing *all* additions in IALU and was starving |
426 | // for those even on Itanium 2. In this version one addition is | 426 | // for those even on Itanium 2. In this version one addition is |
427 | // moved to FPU and is folded with multiplication. This is at cost | 427 | // moved to FPU and is folded with multiplication. This is at cost |
428 | // of propogating the result from previous call to this subroutine | 428 | // of propogating the result from previous call to this subroutine |
diff --git a/src/lib/libcrypto/doc/EVP_BytesToKey.pod b/src/lib/libcrypto/doc/EVP_BytesToKey.pod index fe4c0a9194..a27146f5c9 100644 --- a/src/lib/libcrypto/doc/EVP_BytesToKey.pod +++ b/src/lib/libcrypto/doc/EVP_BytesToKey.pod | |||
@@ -29,7 +29,7 @@ A typical application of this function is to derive keying material for an | |||
29 | encryption algorithm from a password in the B<data> parameter. | 29 | encryption algorithm from a password in the B<data> parameter. |
30 | 30 | ||
31 | Increasing the B<count> parameter slows down the algorithm which makes it | 31 | Increasing the B<count> parameter slows down the algorithm which makes it |
32 | harder for an attacker to peform a brute force attack using a large number | 32 | harder for an attacker to perform a brute force attack using a large number |
33 | of candidate passwords. | 33 | of candidate passwords. |
34 | 34 | ||
35 | If the total key and IV length is less than the digest length and | 35 | If the total key and IV length is less than the digest length and |
diff --git a/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod b/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod index 7a2b8e6187..0c164a0ed6 100644 --- a/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod +++ b/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod | |||
@@ -49,7 +49,7 @@ encryption algorithm from a password in the B<pass>, a salt in B<salt>, | |||
49 | and an iteration count. | 49 | and an iteration count. |
50 | 50 | ||
51 | Increasing the B<iter> parameter slows down the algorithm which makes it | 51 | Increasing the B<iter> parameter slows down the algorithm which makes it |
52 | harder for an attacker to peform a brute force attack using a large number | 52 | harder for an attacker to perform a brute force attack using a large number |
53 | of candidate passwords. | 53 | of candidate passwords. |
54 | 54 | ||
55 | =head1 RETURN VALUES | 55 | =head1 RETURN VALUES |
diff --git a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod index 27af442b69..6acdd71e72 100644 --- a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod +++ b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | |||
@@ -104,7 +104,7 @@ certificates and makes the verification strictly apply B<X509> rules. | |||
104 | B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. | 104 | B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. |
105 | 105 | ||
106 | B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default | 106 | B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default |
107 | no policy checking is peformed. Additional information is sent to the | 107 | no policy checking is performed. Additional information is sent to the |
108 | verification callback relating to policy checking. | 108 | verification callback relating to policy checking. |
109 | 109 | ||
110 | B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and | 110 | B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and |
diff --git a/src/lib/libcrypto/sha/asm/sha512-parisc.pl b/src/lib/libcrypto/sha/asm/sha512-parisc.pl index 4af7731661..0704302d2a 100755 --- a/src/lib/libcrypto/sha/asm/sha512-parisc.pl +++ b/src/lib/libcrypto/sha/asm/sha512-parisc.pl | |||
@@ -19,7 +19,7 @@ | |||
19 | # SHA512 performance is >2.9x better than gcc 3.2 generated code on | 19 | # SHA512 performance is >2.9x better than gcc 3.2 generated code on |
20 | # PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the | 20 | # PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the |
21 | # code is executed on PA-RISC 2.0 processor and switches to 64-bit | 21 | # code is executed on PA-RISC 2.0 processor and switches to 64-bit |
22 | # code path delivering adequate peformance even in "blended" 32-bit | 22 | # code path delivering adequate performance even in "blended" 32-bit |
23 | # build. Though 64-bit code is not any faster than code generated by | 23 | # build. Though 64-bit code is not any faster than code generated by |
24 | # vendor compiler on PA-8600... | 24 | # vendor compiler on PA-8600... |
25 | # | 25 | # |
diff --git a/src/lib/libssl/src/crypto/bn/asm/ia64.S b/src/lib/libssl/src/crypto/bn/asm/ia64.S index 7c4fbd3118..0cf805ddc4 100644 --- a/src/lib/libssl/src/crypto/bn/asm/ia64.S +++ b/src/lib/libssl/src/crypto/bn/asm/ia64.S | |||
@@ -422,7 +422,7 @@ bn_mul_add_words: | |||
422 | 422 | ||
423 | // This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on | 423 | // This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on |
424 | // Itanium 2. Yes, unlike previous versions it scales:-) Previous | 424 | // Itanium 2. Yes, unlike previous versions it scales:-) Previous |
425 | // version was peforming *all* additions in IALU and was starving | 425 | // version was performing *all* additions in IALU and was starving |
426 | // for those even on Itanium 2. In this version one addition is | 426 | // for those even on Itanium 2. In this version one addition is |
427 | // moved to FPU and is folded with multiplication. This is at cost | 427 | // moved to FPU and is folded with multiplication. This is at cost |
428 | // of propogating the result from previous call to this subroutine | 428 | // of propogating the result from previous call to this subroutine |
diff --git a/src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl b/src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl index 4af7731661..0704302d2a 100755 --- a/src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl +++ b/src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl | |||
@@ -19,7 +19,7 @@ | |||
19 | # SHA512 performance is >2.9x better than gcc 3.2 generated code on | 19 | # SHA512 performance is >2.9x better than gcc 3.2 generated code on |
20 | # PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the | 20 | # PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the |
21 | # code is executed on PA-RISC 2.0 processor and switches to 64-bit | 21 | # code is executed on PA-RISC 2.0 processor and switches to 64-bit |
22 | # code path delivering adequate peformance even in "blended" 32-bit | 22 | # code path delivering adequate performance even in "blended" 32-bit |
23 | # build. Though 64-bit code is not any faster than code generated by | 23 | # build. Though 64-bit code is not any faster than code generated by |
24 | # vendor compiler on PA-8600... | 24 | # vendor compiler on PA-8600... |
25 | # | 25 | # |
diff --git a/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod b/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod index fe4c0a9194..a27146f5c9 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod | |||
@@ -29,7 +29,7 @@ A typical application of this function is to derive keying material for an | |||
29 | encryption algorithm from a password in the B<data> parameter. | 29 | encryption algorithm from a password in the B<data> parameter. |
30 | 30 | ||
31 | Increasing the B<count> parameter slows down the algorithm which makes it | 31 | Increasing the B<count> parameter slows down the algorithm which makes it |
32 | harder for an attacker to peform a brute force attack using a large number | 32 | harder for an attacker to perform a brute force attack using a large number |
33 | of candidate passwords. | 33 | of candidate passwords. |
34 | 34 | ||
35 | If the total key and IV length is less than the digest length and | 35 | If the total key and IV length is less than the digest length and |
diff --git a/src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod b/src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod index 7a2b8e6187..0c164a0ed6 100644 --- a/src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod +++ b/src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod | |||
@@ -49,7 +49,7 @@ encryption algorithm from a password in the B<pass>, a salt in B<salt>, | |||
49 | and an iteration count. | 49 | and an iteration count. |
50 | 50 | ||
51 | Increasing the B<iter> parameter slows down the algorithm which makes it | 51 | Increasing the B<iter> parameter slows down the algorithm which makes it |
52 | harder for an attacker to peform a brute force attack using a large number | 52 | harder for an attacker to perform a brute force attack using a large number |
53 | of candidate passwords. | 53 | of candidate passwords. |
54 | 54 | ||
55 | =head1 RETURN VALUES | 55 | =head1 RETURN VALUES |
diff --git a/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod index 27af442b69..6acdd71e72 100644 --- a/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod +++ b/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod | |||
@@ -104,7 +104,7 @@ certificates and makes the verification strictly apply B<X509> rules. | |||
104 | B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. | 104 | B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. |
105 | 105 | ||
106 | B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default | 106 | B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default |
107 | no policy checking is peformed. Additional information is sent to the | 107 | no policy checking is performed. Additional information is sent to the |
108 | verification callback relating to policy checking. | 108 | verification callback relating to policy checking. |
109 | 109 | ||
110 | B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and | 110 | B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and |