Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 6 Sep 2010 21:29:21 +0000 (UTC)
From:      Konstantin Belousov <kib@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r212268 - head/share/man/man4
Message-ID:  <201009062129.o86LTLV7066254@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: kib
Date: Mon Sep  6 21:29:21 2010
New Revision: 212268
URL: http://svn.freebsd.org/changeset/base/212268

Log:
  Grammar fixes.
  
  Submitted by:	Ben Kaduk <minimarmot gmail com>, Valentin Nechaev

Modified:
  head/share/man/man4/aesni.4

Modified: head/share/man/man4/aesni.4
==============================================================================
--- head/share/man/man4/aesni.4	Mon Sep  6 21:06:11 2010	(r212267)
+++ head/share/man/man4/aesni.4	Mon Sep  6 21:29:21 2010	(r212268)
@@ -47,24 +47,23 @@ aesni_load="YES"
 .Ed
 .Sh DESCRIPTION
 Starting with some models of Core i5/i7, Intel processors implement
-new set of instructions called AESNI.
+a new set of instructions called AESNI.
 The set of six instructions accelerates the calculation of the key
 schedule for key lengths of 128, 192, and 256 of the Advanced
-Encryption Standard (AES) symmetric cipher, and provides the hardware
+Encryption Standard (AES) symmetric cipher, and provides hardware
 implementation of the regular and the last encryption and decryption
 rounds.
 .Pp
-The processor capability is reported as AESNI in the Features2 line
-at the boot. Driver does not attach on the system that lacks the
-required CPU capability.
+The processor capability is reported as AESNI in the Features2 line at boot.
+Driver does not attach on the system that lacks the required CPU capability.
 .Pp
 The
 .Nm
 driver registers itself to accelerate AES operations for
 .Xr crypto 4 .
-Besides speed, advantage of using the driver is that the AESNI operation
-is data-independend, thus eliminating some attack vectors based on the
-measuring cache use and timings, typically present in the table-driven
+Besides speed, the advantage of using the driver is that the AESNI operation
+is data-independent, thus eliminating some attack vectors based on
+measuring cache use and timings typically present in the table-driven
 implementations.
 .Sh SEE ALSO
 .Xr crypt 3 ,



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201009062129.o86LTLV7066254>