Date: Mon, 6 Sep 2010 21:29:21 +0000 (UTC) From: Konstantin Belousov <kib@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r212268 - head/share/man/man4 Message-ID: <201009062129.o86LTLV7066254@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: kib Date: Mon Sep 6 21:29:21 2010 New Revision: 212268 URL: http://svn.freebsd.org/changeset/base/212268 Log: Grammar fixes. Submitted by: Ben Kaduk <minimarmot gmail com>, Valentin Nechaev Modified: head/share/man/man4/aesni.4 Modified: head/share/man/man4/aesni.4 ============================================================================== --- head/share/man/man4/aesni.4 Mon Sep 6 21:06:11 2010 (r212267) +++ head/share/man/man4/aesni.4 Mon Sep 6 21:29:21 2010 (r212268) @@ -47,24 +47,23 @@ aesni_load="YES" .Ed .Sh DESCRIPTION Starting with some models of Core i5/i7, Intel processors implement -new set of instructions called AESNI. +a new set of instructions called AESNI. The set of six instructions accelerates the calculation of the key schedule for key lengths of 128, 192, and 256 of the Advanced -Encryption Standard (AES) symmetric cipher, and provides the hardware +Encryption Standard (AES) symmetric cipher, and provides hardware implementation of the regular and the last encryption and decryption rounds. .Pp -The processor capability is reported as AESNI in the Features2 line -at the boot. Driver does not attach on the system that lacks the -required CPU capability. +The processor capability is reported as AESNI in the Features2 line at boot. +Driver does not attach on the system that lacks the required CPU capability. .Pp The .Nm driver registers itself to accelerate AES operations for .Xr crypto 4 . -Besides speed, advantage of using the driver is that the AESNI operation -is data-independend, thus eliminating some attack vectors based on the -measuring cache use and timings, typically present in the table-driven +Besides speed, the advantage of using the driver is that the AESNI operation +is data-independent, thus eliminating some attack vectors based on +measuring cache use and timings typically present in the table-driven implementations. .Sh SEE ALSO .Xr crypt 3 ,
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201009062129.o86LTLV7066254>