summaryrefslogtreecommitdiff
path: root/crypto
diff options
context:
space:
mode:
authorappro <appro>2011-10-18 08:03:02 +0000
committerappro <appro>2011-10-18 08:03:02 +0000
commit59101f17ca8859f87e6d9ef3b447ffbe9b150390 (patch)
tree695092da424a754429bbd2c97acf49fe864e36d6 /crypto
parenta27762b788a2df74350e06f2e99f79b9de9ecc13 (diff)
downloadopenssl-59101f17ca8859f87e6d9ef3b447ffbe9b150390.tar.gz
[bs|vp]aes-x86[_64].pl: typos and clarifications.
Diffstat (limited to 'crypto')
-rw-r--r--crypto/aes/asm/bsaes-x86_64.pl2
-rw-r--r--crypto/aes/asm/vpaes-x86.pl6
-rw-r--r--crypto/aes/asm/vpaes-x86_64.pl4
3 files changed, 6 insertions, 6 deletions
diff --git a/crypto/aes/asm/bsaes-x86_64.pl b/crypto/aes/asm/bsaes-x86_64.pl
index da7e95183..bbc86add3 100644
--- a/crypto/aes/asm/bsaes-x86_64.pl
+++ b/crypto/aes/asm/bsaes-x86_64.pl
@@ -70,7 +70,7 @@
# Atom 570 0.26
#
# The ratio values mean that 128-byte blocks will be processed
-# 21-27% slower, 256-byte blocks - 12-16%, 382-byte blocks - 8-11%,
+# 21-27% slower, 256-byte blocks - 12-16%, 384-byte blocks - 8-11%,
# etc. Then keep in mind that input sizes not divisible by 128 are
# *effectively* slower, especially shortest ones, e.g. consecutive
# 144-byte blocks are processed 44% slower than one would expect,
diff --git a/crypto/aes/asm/vpaes-x86.pl b/crypto/aes/asm/vpaes-x86.pl
index 789810668..84a6f6d33 100644
--- a/crypto/aes/asm/vpaes-x86.pl
+++ b/crypto/aes/asm/vpaes-x86.pl
@@ -22,8 +22,8 @@
#
# Performance summary. aes-586.pl column lists large-block CBC
# encrypt/decrypt/with-hyper-threading-off(*) results in cycles per
-# byte processed with 128-bit key, and vpaes-x86.pl column -
-# encrypt/decrypt.
+# byte processed with 128-bit key, and vpaes-x86.pl column - [also
+# large-block CBC] encrypt/decrypt.
#
# aes-586.pl vpaes-x86.pl
#
@@ -153,7 +153,7 @@ $k_dsbe=0x2a0; # decryption sbox output *E*u, *E*t
$k_dsbo=0x2c0; # decryption sbox final output
&data_word(0x7EF94000,0x1387EA53,0xD4943E2D,0xC7AA6DB9);
&data_word(0x93441D00,0x12D7560F,0xD8C58E9C,0xCA4B8159);
-&asciz ("Vector Permutation AES for x86, Mike Hamburg (Stanford University)");
+&asciz ("Vector Permutation AES for x86/SSSE3, Mike Hamburg (Stanford University)");
&align (64);
&function_begin_B("_vpaes_preheat");
diff --git a/crypto/aes/asm/vpaes-x86_64.pl b/crypto/aes/asm/vpaes-x86_64.pl
index 01011defb..025470223 100644
--- a/crypto/aes/asm/vpaes-x86_64.pl
+++ b/crypto/aes/asm/vpaes-x86_64.pl
@@ -23,7 +23,7 @@
# Performance summary. aes-x86_64.pl column lists large-block CBC
# encrypt/decrypt/with-hyper-threading-off(*) results in cycles per
# byte processed with 128-bit key, and vpaes-x86_64.pl column -
-# encrypt/decrypt.
+# [also large-block CBC] encrypt/decrypt.
#
# aes-x86_64.pl vpaes-x86_64.pl
#
@@ -1057,7 +1057,7 @@ _vpaes_consts:
.Lk_dsbo: # decryption sbox final output
.quad 0x1387EA537EF94000, 0xC7AA6DB9D4943E2D
.quad 0x12D7560F93441D00, 0xCA4B8159D8C58E9C
-.asciz "Vector Permutaion AES for x86_64, Mike Hamburg (Stanford University)"
+.asciz "Vector Permutaion AES for x86_64/SSSE3, Mike Hamburg (Stanford University)"
.align 64
.size _vpaes_consts,.-_vpaes_consts
___