summaryrefslogtreecommitdiffstats
path: root/share/man/man4/aesni.4
diff options
context:
space:
mode:
authorkib <kib@FreeBSD.org>2010-09-06 21:29:21 +0000
committerkib <kib@FreeBSD.org>2010-09-06 21:29:21 +0000
commita55080dd3731477dec8326a4cd1359273598b6ad (patch)
tree20459e69f1aca346fbd10b7bd979f2cc1a3ddd8d /share/man/man4/aesni.4
parent99af9c6710185ee143a630c7808df75eaf140934 (diff)
downloadFreeBSD-src-a55080dd3731477dec8326a4cd1359273598b6ad.zip
FreeBSD-src-a55080dd3731477dec8326a4cd1359273598b6ad.tar.gz
Grammar fixes.
Submitted by: Ben Kaduk <minimarmot gmail com>, Valentin Nechaev
Diffstat (limited to 'share/man/man4/aesni.4')
-rw-r--r--share/man/man4/aesni.415
1 files changed, 7 insertions, 8 deletions
diff --git a/share/man/man4/aesni.4 b/share/man/man4/aesni.4
index 2396e48..995f2b5 100644
--- a/share/man/man4/aesni.4
+++ b/share/man/man4/aesni.4
@@ -47,24 +47,23 @@ aesni_load="YES"
.Ed
.Sh DESCRIPTION
Starting with some models of Core i5/i7, Intel processors implement
-new set of instructions called AESNI.
+a new set of instructions called AESNI.
The set of six instructions accelerates the calculation of the key
schedule for key lengths of 128, 192, and 256 of the Advanced
-Encryption Standard (AES) symmetric cipher, and provides the hardware
+Encryption Standard (AES) symmetric cipher, and provides hardware
implementation of the regular and the last encryption and decryption
rounds.
.Pp
-The processor capability is reported as AESNI in the Features2 line
-at the boot. Driver does not attach on the system that lacks the
-required CPU capability.
+The processor capability is reported as AESNI in the Features2 line at boot.
+Driver does not attach on the system that lacks the required CPU capability.
.Pp
The
.Nm
driver registers itself to accelerate AES operations for
.Xr crypto 4 .
-Besides speed, advantage of using the driver is that the AESNI operation
-is data-independend, thus eliminating some attack vectors based on the
-measuring cache use and timings, typically present in the table-driven
+Besides speed, the advantage of using the driver is that the AESNI operation
+is data-independent, thus eliminating some attack vectors based on
+measuring cache use and timings typically present in the table-driven
implementations.
.Sh SEE ALSO
.Xr crypt 3 ,
OpenPOWER on IntegriCloud