diff options
author | FdaSilvaYY <fdasilvayy@gmail.com> | 2017-03-28 23:57:28 +0200 |
---|---|---|
committer | Richard Levitte <levitte@openssl.org> | 2017-03-29 07:14:29 +0200 |
commit | 69687aa829bc8bdcaf5468eb3dd0ada13700b7aa (patch) | |
tree | 564244011bcb19ef2157b0dac249aea3e1440cae /crypto/sha/asm/sha1-586.pl | |
parent | 7bd278957d27e09511520dabdc8696366ffb2b96 (diff) | |
download | openssl-69687aa829bc8bdcaf5468eb3dd0ada13700b7aa.zip openssl-69687aa829bc8bdcaf5468eb3dd0ada13700b7aa.tar.gz openssl-69687aa829bc8bdcaf5468eb3dd0ada13700b7aa.tar.bz2 |
More typo fixes
Fix some comments too
[skip ci]
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3069)
Diffstat (limited to 'crypto/sha/asm/sha1-586.pl')
-rw-r--r-- | crypto/sha/asm/sha1-586.pl | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/crypto/sha/asm/sha1-586.pl b/crypto/sha/asm/sha1-586.pl index c753ed3..59e1155 100644 --- a/crypto/sha/asm/sha1-586.pl +++ b/crypto/sha/asm/sha1-586.pl @@ -661,7 +661,7 @@ my $_ror=sub { &ror(@_) }; &jmp (&label("loop")); ###################################################################### -# SSE instruction sequence is first broken to groups of indepentent +# SSE instruction sequence is first broken to groups of independent # instructions, independent in respect to their inputs and shifter # (not all architectures have more than one). Then IALU instructions # are "knitted in" between the SSE groups. Distance is maintained for @@ -670,14 +670,14 @@ my $_ror=sub { &ror(@_) }; # # Temporary registers usage. X[2] is volatile at the entry and at the # end is restored from backtrace ring buffer. X[3] is expected to -# contain current K_XX_XX constant and is used to caclulate X[-1]+K +# contain current K_XX_XX constant and is used to calculate X[-1]+K # from previous round, it becomes volatile the moment the value is # saved to stack for transfer to IALU. X[4] becomes volatile whenever # X[-4] is accumulated and offloaded to backtrace ring buffer, at the # end it is loaded with next K_XX_XX [which becomes X[3] in next # round]... # -sub Xupdate_ssse3_16_31() # recall that $Xi starts wtih 4 +sub Xupdate_ssse3_16_31() # recall that $Xi starts with 4 { use integer; my $body = shift; my @insns = (&$body,&$body,&$body,&$body); # 40 instructions @@ -1200,7 +1200,7 @@ my $_ror=sub { &shrd(@_[0],@_) }; &and (@T[0],@T[1]); &jmp (&label("loop")); -sub Xupdate_avx_16_31() # recall that $Xi starts wtih 4 +sub Xupdate_avx_16_31() # recall that $Xi starts with 4 { use integer; my $body = shift; my @insns = (&$body,&$body,&$body,&$body); # 40 instructions |