Module Name: src
Committed By: wiz
Date: Mon Dec 12 10:13:00 UTC 2016
Modified Files:
src/share/man/man4: cgd.4
Log Message:
Improve wording. Fix typo. Remove superfluous Pp.
To generate a diff of this commit:
cvs rdiff -u -r1.20 -r1.21 src/share/man/man4/cgd.4
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/share/man/man4/cgd.4
diff -u src/share/man/man4/cgd.4:1.20 src/share/man/man4/cgd.4:1.21
--- src/share/man/man4/cgd.4:1.20 Sun Dec 11 00:24:48 2016
+++ src/share/man/man4/cgd.4 Mon Dec 12 10:13:00 2016
@@ -1,4 +1,4 @@
-.\" $NetBSD: cgd.4,v 1.20 2016/12/11 00:24:48 alnsn Exp $
+.\" $NetBSD: cgd.4,v 1.21 2016/12/12 10:13:00 wiz Exp $
.\"
.\" Copyright (c) 2002, 2003 The NetBSD Foundation, Inc.
.\" All rights reserved.
@@ -71,9 +71,9 @@ in
mode.
.Tn AES-XTS
uses a 128 bit blocksize and can accept keys of length 256 or 512.
-Note that
+Note that an
.Tn AES-XTS
-key is made of two
+key consists of two
.Tn AES
keys of equal size.
The second key is used solely to encrypt the block number of the physical
@@ -174,7 +174,6 @@ and their associated data structures are
.In dev/cgdvar.h
header.
.Sh WARNINGS
-.Pp
It goes without saying that if you forget the passphrase that you used
to configure a
.Nm ,
@@ -192,7 +191,7 @@ mode to plaintext blocks of their choice
The
.Tn
XTS mode isn't vulnerable to this particular attack but a lack of
-integrity should be taken into accout when evaluating security risks.
+integrity should be taken into account when evaluating security risks.
.Sh FILES
.Bl -tag -width indentxxxxxxxxxxx
.It /dev/{,r}cgd*