提交 477fd459 编写于 作者: D Dr. Stephen Henson

PR: 1835

Submitted by: Damien Miller <djm@mindrot.org>
Approved by: steve@openssl.org

Fix various typos.
上级 30b1b28a
...@@ -29,7 +29,7 @@ OSErr AppendErrorMessageToHandle(Handle inoutHandle); ...@@ -29,7 +29,7 @@ OSErr AppendErrorMessageToHandle(Handle inoutHandle);
// A bunch of evil macros that would be uneccessary if I were always using C++ ! // A bunch of evil macros that would be unnecessary if I were always using C++ !
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \ #define SetErrorMessageAndBailIfNil(theArg,theMessage) \
{ \ { \
......
...@@ -79,7 +79,7 @@ ASN1_STRING *d2i_ASN1_type_bytes(ASN1_STRING **a, const unsigned char **pp, ...@@ -79,7 +79,7 @@ ASN1_STRING *d2i_ASN1_type_bytes(ASN1_STRING **a, const unsigned char **pp,
if (tag >= 32) if (tag >= 32)
{ {
i=ASN1_R_TAG_VALUE_TOO_HIGH;; i=ASN1_R_TAG_VALUE_TOO_HIGH;
goto err; goto err;
} }
if (!(ASN1_tag2bit(tag) & type)) if (!(ASN1_tag2bit(tag) & type))
......
...@@ -928,7 +928,7 @@ int test_mod_exp(BIO *bp, BN_CTX *ctx) ...@@ -928,7 +928,7 @@ int test_mod_exp(BIO *bp, BN_CTX *ctx)
BN_bntest_rand(b,2+i,0,0); /**/ BN_bntest_rand(b,2+i,0,0); /**/
if (!BN_mod_exp(d,a,b,c,ctx)) if (!BN_mod_exp(d,a,b,c,ctx))
return(00); return(0);
if (bp != NULL) if (bp != NULL)
{ {
...@@ -1030,7 +1030,7 @@ int test_exp(BIO *bp, BN_CTX *ctx) ...@@ -1030,7 +1030,7 @@ int test_exp(BIO *bp, BN_CTX *ctx)
BN_bntest_rand(b,2+i,0,0); /**/ BN_bntest_rand(b,2+i,0,0); /**/
if (!BN_exp(d,a,b,ctx)) if (!BN_exp(d,a,b,ctx))
return(00); return(0);
if (bp != NULL) if (bp != NULL)
{ {
......
...@@ -2,7 +2,7 @@ solaris 2.5.1 usparc 167mhz?? - SC4.0 cc -fast -Xa -xO5 ...@@ -2,7 +2,7 @@ solaris 2.5.1 usparc 167mhz?? - SC4.0 cc -fast -Xa -xO5
For the ultra sparc, SunC 4.0 cc -fast -Xa -xO5, running 'des_opts' For the ultra sparc, SunC 4.0 cc -fast -Xa -xO5, running 'des_opts'
gives a speed of 475,000 des/s while 'speed' gives 417,000 des/s. gives a speed of 475,000 des/s while 'speed' gives 417,000 des/s.
I belive the difference is tied up in optimisation that the compiler I believe the difference is tied up in optimisation that the compiler
is able to perform when the code is 'inlined'. For 'speed', the DES is able to perform when the code is 'inlined'. For 'speed', the DES
routines are being linked from a library. I'll record the higher routines are being linked from a library. I'll record the higher
speed since if performance is everything, you can always inline speed since if performance is everything, you can always inline
......
...@@ -4,7 +4,7 @@ http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html ...@@ -4,7 +4,7 @@ http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html
This is my implementation of RIPEMD-160. The pentium assember is a little This is my implementation of RIPEMD-160. The pentium assember is a little
off the pace since I only get 1050 cycles, while the best is 1013. off the pace since I only get 1050 cycles, while the best is 1013.
I have a few ideas for how to get another 20 or so cycles, but at I have a few ideas for how to get another 20 or so cycles, but at
this point I will not bother right now. I belive the trick will be this point I will not bother right now. I believe the trick will be
to remove my 'copy X array onto stack' until inside the RIP1() finctions the to remove my 'copy X array onto stack' until inside the RIP1() finctions the
first time round. To do this I need another register and will only have one first time round. To do this I need another register and will only have one
temporary one. A bit tricky.... I can also cleanup the saving of the 5 words temporary one. A bit tricky.... I can also cleanup the saving of the 5 words
......
...@@ -84,7 +84,7 @@ int X509V3_add_value(const char *name, const char *value, ...@@ -84,7 +84,7 @@ int X509V3_add_value(const char *name, const char *value,
CONF_VALUE *vtmp = NULL; CONF_VALUE *vtmp = NULL;
char *tname = NULL, *tvalue = NULL; char *tname = NULL, *tvalue = NULL;
if(name && !(tname = BUF_strdup(name))) goto err; if(name && !(tname = BUF_strdup(name))) goto err;
if(value && !(tvalue = BUF_strdup(value))) goto err;; if(value && !(tvalue = BUF_strdup(value))) goto err;
if(!(vtmp = (CONF_VALUE *)OPENSSL_malloc(sizeof(CONF_VALUE)))) goto err; if(!(vtmp = (CONF_VALUE *)OPENSSL_malloc(sizeof(CONF_VALUE)))) goto err;
if(!*extlist && !(*extlist = sk_CONF_VALUE_new_null())) goto err; if(!*extlist && !(*extlist = sk_CONF_VALUE_new_null())) goto err;
vtmp->section = NULL; vtmp->section = NULL;
......
...@@ -28,7 +28,7 @@ SSL_CIPHER_get_version() returns the protocol version for B<cipher>, currently ...@@ -28,7 +28,7 @@ SSL_CIPHER_get_version() returns the protocol version for B<cipher>, currently
SSL_CIPHER_description() returns a textual description of the cipher used SSL_CIPHER_description() returns a textual description of the cipher used
into the buffer B<buf> of length B<len> provided. B<len> must be at least into the buffer B<buf> of length B<len> provided. B<len> must be at least
128 bytes, otherwise a pointer to the the string "Buffer too small" is 128 bytes, otherwise a pointer to the string "Buffer too small" is
returned. If B<buf> is NULL, a buffer of 128 bytes is allocated using returned. If B<buf> is NULL, a buffer of 128 bytes is allocated using
OPENSSL_malloc(). If the allocation fails, a pointer to the string OPENSSL_malloc(). If the allocation fails, a pointer to the string
"OPENSSL_malloc Error" is returned. "OPENSSL_malloc Error" is returned.
......
...@@ -28,7 +28,7 @@ specifies the B<verify_callback> function to be used. If no callback function ...@@ -28,7 +28,7 @@ specifies the B<verify_callback> function to be used. If no callback function
shall be specified, the NULL pointer can be used for B<verify_callback>. In shall be specified, the NULL pointer can be used for B<verify_callback>. In
this case last B<verify_callback> set specifically for this B<ssl> remains. If this case last B<verify_callback> set specifically for this B<ssl> remains. If
no special B<callback> was set before, the default callback for the underlying no special B<callback> was set before, the default callback for the underlying
B<ctx> is used, that was valid at the the time B<ssl> was created with B<ctx> is used, that was valid at the time B<ssl> was created with
L<SSL_new(3)|SSL_new(3)>. L<SSL_new(3)|SSL_new(3)>.
SSL_CTX_set_verify_depth() sets the maximum B<depth> for the certificate chain SSL_CTX_set_verify_depth() sets the maximum B<depth> for the certificate chain
......
...@@ -14,7 +14,7 @@ SSL_SESSION_free - free an allocated SSL_SESSION structure ...@@ -14,7 +14,7 @@ SSL_SESSION_free - free an allocated SSL_SESSION structure
SSL_SESSION_free() decrements the reference count of B<session> and removes SSL_SESSION_free() decrements the reference count of B<session> and removes
the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated
memory, if the the reference count has reached 0. memory, if the reference count has reached 0.
=head1 NOTES =head1 NOTES
......
...@@ -14,7 +14,7 @@ SSL_free - free an allocated SSL structure ...@@ -14,7 +14,7 @@ SSL_free - free an allocated SSL structure
SSL_free() decrements the reference count of B<ssl>, and removes the SSL SSL_free() decrements the reference count of B<ssl>, and removes the SSL
structure pointed to by B<ssl> and frees up the allocated memory if the structure pointed to by B<ssl> and frees up the allocated memory if the
the reference count has reached 0. reference count has reached 0.
=head1 NOTES =head1 NOTES
......
...@@ -3800,9 +3800,9 @@ made public on sci.crypt in Sep 1994 (RC4) and Feb 1996 (RC2). I have ...@@ -3800,9 +3800,9 @@ made public on sci.crypt in Sep 1994 (RC4) and Feb 1996 (RC2). I have
copies of the origional postings if people are interested. RSA I believe copies of the origional postings if people are interested. RSA I believe
claim that they were 'trade-secrets' and that some-one broke an NDA in claim that they were 'trade-secrets' and that some-one broke an NDA in
revealing them. Other claim they reverse engineered the algorithms from revealing them. Other claim they reverse engineered the algorithms from
compiled binaries. If the algorithms were reverse engineered, I belive compiled binaries. If the algorithms were reverse engineered, I believe
RSA had no legal leg to stand on. If an NDA was broken, I don't know. RSA had no legal leg to stand on. If an NDA was broken, I don't know.
Regardless, RSA, I belive, is willing to go to court over the issue so Regardless, RSA, I believe, is willing to go to court over the issue so
licencing is probably the best idea, or at least talk to them. licencing is probably the best idea, or at least talk to them.
If there are people who actually know more about this, pease let me know, I If there are people who actually know more about this, pease let me know, I
don't want to vilify or spread miss-information if I can help it. don't want to vilify or spread miss-information if I can help it.
......
...@@ -946,7 +946,7 @@ kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text) ...@@ -946,7 +946,7 @@ kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text)
if (kssl_err == NULL) return; if (kssl_err == NULL) return;
kssl_err->reason = reason; kssl_err->reason = reason;
BIO_snprintf(kssl_err->text, KSSL_ERR_MAX, text); BIO_snprintf(kssl_err->text, KSSL_ERR_MAX, "%s", text);
return; return;
} }
......
...@@ -190,7 +190,7 @@ int ssl3_connect(SSL *s) ...@@ -190,7 +190,7 @@ int ssl3_connect(SSL *s)
long num1; long num1;
void (*cb)(const SSL *ssl,int type,int val)=NULL; void (*cb)(const SSL *ssl,int type,int val)=NULL;
int ret= -1; int ret= -1;
int new_state,state,skip=0;; int new_state,state,skip=0;
RAND_add(&Time,sizeof(Time),0); RAND_add(&Time,sizeof(Time),0);
ERR_clear_error(); ERR_clear_error();
......
...@@ -68,7 +68,7 @@ eric (adding numbers to speculation) ...@@ -68,7 +68,7 @@ eric (adding numbers to speculation)
--- Appendix --- --- Appendix ---
- The time measured is user time but these number a very rough. - The time measured is user time but these number a very rough.
- Remember this is the cost of both client and server sides of the protocol. - Remember this is the cost of both client and server sides of the protocol.
- The TCP/kernal overhead of connection establishment is normally the - The TCP/kernel overhead of connection establishment is normally the
killer in SSL. Often delays in the TCP protocol will make session-id killer in SSL. Often delays in the TCP protocol will make session-id
reuse look slower that new sessions, but this would not be the case on reuse look slower that new sessions, but this would not be the case on
a loaded server. a loaded server.
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册