summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libcrypto/bn/asm/ia64.S2
-rw-r--r--src/lib/libcrypto/doc/EVP_BytesToKey.pod2
-rw-r--r--src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod2
-rw-r--r--src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod2
-rwxr-xr-xsrc/lib/libcrypto/sha/asm/sha512-parisc.pl2
-rw-r--r--src/lib/libssl/src/crypto/bn/asm/ia64.S2
-rwxr-xr-xsrc/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl2
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod2
10 files changed, 10 insertions, 10 deletions
diff --git a/src/lib/libcrypto/bn/asm/ia64.S b/src/lib/libcrypto/bn/asm/ia64.S
index 7c4fbd3118..0cf805ddc4 100644
--- a/src/lib/libcrypto/bn/asm/ia64.S
+++ b/src/lib/libcrypto/bn/asm/ia64.S
@@ -422,7 +422,7 @@ bn_mul_add_words:
422 422
423// This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on 423// This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on
424// Itanium 2. Yes, unlike previous versions it scales:-) Previous 424// Itanium 2. Yes, unlike previous versions it scales:-) Previous
425// version was peforming *all* additions in IALU and was starving 425// version was performing *all* additions in IALU and was starving
426// for those even on Itanium 2. In this version one addition is 426// for those even on Itanium 2. In this version one addition is
427// moved to FPU and is folded with multiplication. This is at cost 427// moved to FPU and is folded with multiplication. This is at cost
428// of propogating the result from previous call to this subroutine 428// of propogating the result from previous call to this subroutine
diff --git a/src/lib/libcrypto/doc/EVP_BytesToKey.pod b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
index fe4c0a9194..a27146f5c9 100644
--- a/src/lib/libcrypto/doc/EVP_BytesToKey.pod
+++ b/src/lib/libcrypto/doc/EVP_BytesToKey.pod
@@ -29,7 +29,7 @@ A typical application of this function is to derive keying material for an
29encryption algorithm from a password in the B<data> parameter. 29encryption algorithm from a password in the B<data> parameter.
30 30
31Increasing the B<count> parameter slows down the algorithm which makes it 31Increasing the B<count> parameter slows down the algorithm which makes it
32harder for an attacker to peform a brute force attack using a large number 32harder for an attacker to perform a brute force attack using a large number
33of candidate passwords. 33of candidate passwords.
34 34
35If the total key and IV length is less than the digest length and 35If the total key and IV length is less than the digest length and
diff --git a/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod b/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod
index 7a2b8e6187..0c164a0ed6 100644
--- a/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod
+++ b/src/lib/libcrypto/doc/PKCS5_PBKDF2_HMAC.pod
@@ -49,7 +49,7 @@ encryption algorithm from a password in the B<pass>, a salt in B<salt>,
49and an iteration count. 49and an iteration count.
50 50
51Increasing the B<iter> parameter slows down the algorithm which makes it 51Increasing the B<iter> parameter slows down the algorithm which makes it
52harder for an attacker to peform a brute force attack using a large number 52harder for an attacker to perform a brute force attack using a large number
53of candidate passwords. 53of candidate passwords.
54 54
55=head1 RETURN VALUES 55=head1 RETURN VALUES
diff --git a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
index 27af442b69..6acdd71e72 100644
--- a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
+++ b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod
@@ -104,7 +104,7 @@ certificates and makes the verification strictly apply B<X509> rules.
104B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. 104B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification.
105 105
106B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default 106B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default
107no policy checking is peformed. Additional information is sent to the 107no policy checking is performed. Additional information is sent to the
108verification callback relating to policy checking. 108verification callback relating to policy checking.
109 109
110B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and 110B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and
diff --git a/src/lib/libcrypto/sha/asm/sha512-parisc.pl b/src/lib/libcrypto/sha/asm/sha512-parisc.pl
index 4af7731661..0704302d2a 100755
--- a/src/lib/libcrypto/sha/asm/sha512-parisc.pl
+++ b/src/lib/libcrypto/sha/asm/sha512-parisc.pl
@@ -19,7 +19,7 @@
19# SHA512 performance is >2.9x better than gcc 3.2 generated code on 19# SHA512 performance is >2.9x better than gcc 3.2 generated code on
20# PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the 20# PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the
21# code is executed on PA-RISC 2.0 processor and switches to 64-bit 21# code is executed on PA-RISC 2.0 processor and switches to 64-bit
22# code path delivering adequate peformance even in "blended" 32-bit 22# code path delivering adequate performance even in "blended" 32-bit
23# build. Though 64-bit code is not any faster than code generated by 23# build. Though 64-bit code is not any faster than code generated by
24# vendor compiler on PA-8600... 24# vendor compiler on PA-8600...
25# 25#
diff --git a/src/lib/libssl/src/crypto/bn/asm/ia64.S b/src/lib/libssl/src/crypto/bn/asm/ia64.S
index 7c4fbd3118..0cf805ddc4 100644
--- a/src/lib/libssl/src/crypto/bn/asm/ia64.S
+++ b/src/lib/libssl/src/crypto/bn/asm/ia64.S
@@ -422,7 +422,7 @@ bn_mul_add_words:
422 422
423// This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on 423// This loop spins in 3*(n+10) ticks on Itanium and in 2*(n+10) on
424// Itanium 2. Yes, unlike previous versions it scales:-) Previous 424// Itanium 2. Yes, unlike previous versions it scales:-) Previous
425// version was peforming *all* additions in IALU and was starving 425// version was performing *all* additions in IALU and was starving
426// for those even on Itanium 2. In this version one addition is 426// for those even on Itanium 2. In this version one addition is
427// moved to FPU and is folded with multiplication. This is at cost 427// moved to FPU and is folded with multiplication. This is at cost
428// of propogating the result from previous call to this subroutine 428// of propogating the result from previous call to this subroutine
diff --git a/src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl b/src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl
index 4af7731661..0704302d2a 100755
--- a/src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl
+++ b/src/lib/libssl/src/crypto/sha/asm/sha512-parisc.pl
@@ -19,7 +19,7 @@
19# SHA512 performance is >2.9x better than gcc 3.2 generated code on 19# SHA512 performance is >2.9x better than gcc 3.2 generated code on
20# PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the 20# PA-7100LC, PA-RISC 1.1 processor. Then implementation detects if the
21# code is executed on PA-RISC 2.0 processor and switches to 64-bit 21# code is executed on PA-RISC 2.0 processor and switches to 64-bit
22# code path delivering adequate peformance even in "blended" 32-bit 22# code path delivering adequate performance even in "blended" 32-bit
23# build. Though 64-bit code is not any faster than code generated by 23# build. Though 64-bit code is not any faster than code generated by
24# vendor compiler on PA-8600... 24# vendor compiler on PA-8600...
25# 25#
diff --git a/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod b/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod
index fe4c0a9194..a27146f5c9 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod
@@ -29,7 +29,7 @@ A typical application of this function is to derive keying material for an
29encryption algorithm from a password in the B<data> parameter. 29encryption algorithm from a password in the B<data> parameter.
30 30
31Increasing the B<count> parameter slows down the algorithm which makes it 31Increasing the B<count> parameter slows down the algorithm which makes it
32harder for an attacker to peform a brute force attack using a large number 32harder for an attacker to perform a brute force attack using a large number
33of candidate passwords. 33of candidate passwords.
34 34
35If the total key and IV length is less than the digest length and 35If the total key and IV length is less than the digest length and
diff --git a/src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod b/src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod
index 7a2b8e6187..0c164a0ed6 100644
--- a/src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod
+++ b/src/lib/libssl/src/doc/crypto/PKCS5_PBKDF2_HMAC.pod
@@ -49,7 +49,7 @@ encryption algorithm from a password in the B<pass>, a salt in B<salt>,
49and an iteration count. 49and an iteration count.
50 50
51Increasing the B<iter> parameter slows down the algorithm which makes it 51Increasing the B<iter> parameter slows down the algorithm which makes it
52harder for an attacker to peform a brute force attack using a large number 52harder for an attacker to perform a brute force attack using a large number
53of candidate passwords. 53of candidate passwords.
54 54
55=head1 RETURN VALUES 55=head1 RETURN VALUES
diff --git a/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod
index 27af442b69..6acdd71e72 100644
--- a/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod
+++ b/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod
@@ -104,7 +104,7 @@ certificates and makes the verification strictly apply B<X509> rules.
104B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification. 104B<X509_V_FLAG_ALLOW_PROXY_CERTS> enables proxy certificate verification.
105 105
106B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default 106B<X509_V_FLAG_POLICY_CHECK> enables certificate policy checking, by default
107no policy checking is peformed. Additional information is sent to the 107no policy checking is performed. Additional information is sent to the
108verification callback relating to policy checking. 108verification callback relating to policy checking.
109 109
110B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and 110B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and