Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 18 Sep 2014 07:26:10 GMT
From:      John-Mark Gurney <jmg@FreeBSD.org>
To:        Perforce Change Reviews <perforce@FreeBSD.org>
Subject:   PERFORCE change 1200387 for review
Message-ID:  <201409180726.s8I7QAX3050176@skunkworks.freebsd.org>

next in thread | raw e-mail | index | archive | help
http://p4web.freebsd.org/@@1200387?ac=10

Change 1200387 by jmg@jmg_carbon2 on 2014/09/18 07:25:48

	minor wording changes..
	
	Sponsored by:	FreeBSD Foundation
	Sponsored by:	Netgate

Affected files ...

.. //depot/projects/opencrypto/share/man/man9/crypto.9#4 edit

Differences ...

==== //depot/projects/opencrypto/share/man/man9/crypto.9#4 (text+ko) ====

@@ -17,7 +17,7 @@
 .\"
 .\" $FreeBSD: head/share/man/man9/crypto.9 267936 2014-06-26 21:44:30Z bapt $
 .\"
-.Dd August 12, 2014
+.Dd September 8, 2014
 .Dt CRYPTO 9
 .Os
 .Sh NAME
@@ -371,7 +371,7 @@
 For encryption algorithms, this bit is set when encryption is required
 (when not set, decryption is performed).
 .It Dv CRD_F_IV_PRESENT
-For encryption algorithms, this bit is set when the IV already
+For encryption, this bit is set when the IV already
 precedes the data, so the
 .Va crd_inject
 value will be ignored and no IV will be written in the buffer.
@@ -380,7 +380,7 @@
 .Va crd_inject .
 The IV length is assumed to be equal to the blocksize of the
 encryption algorithm.
-Some applications that do special
+Applications that do special
 .Dq "IV cooking" ,
 such as the half-IV mode in
 .Xr ipsec 4 ,



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201409180726.s8I7QAX3050176>