Module Name:    src
Committed By:   wiz
Date:           Mon Dec 12 10:13:00 UTC 2016

Modified Files:
        src/share/man/man4: cgd.4

Log Message:
Improve wording. Fix typo. Remove superfluous Pp.


To generate a diff of this commit:
cvs rdiff -u -r1.20 -r1.21 src/share/man/man4/cgd.4

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/share/man/man4/cgd.4
diff -u src/share/man/man4/cgd.4:1.20 src/share/man/man4/cgd.4:1.21
--- src/share/man/man4/cgd.4:1.20	Sun Dec 11 00:24:48 2016
+++ src/share/man/man4/cgd.4	Mon Dec 12 10:13:00 2016
@@ -1,4 +1,4 @@
-.\" $NetBSD: cgd.4,v 1.20 2016/12/11 00:24:48 alnsn Exp $
+.\" $NetBSD: cgd.4,v 1.21 2016/12/12 10:13:00 wiz Exp $
 .\"
 .\" Copyright (c) 2002, 2003 The NetBSD Foundation, Inc.
 .\" All rights reserved.
@@ -71,9 +71,9 @@ in
 mode.
 .Tn AES-XTS
 uses a 128 bit blocksize and can accept keys of length 256 or 512.
-Note that
+Note that an
 .Tn AES-XTS
-key is made of two
+key consists of two
 .Tn AES
 keys of equal size.
 The second key is used solely to encrypt the block number of the physical
@@ -174,7 +174,6 @@ and their associated data structures are
 .In dev/cgdvar.h
 header.
 .Sh WARNINGS
-.Pp
 It goes without saying that if you forget the passphrase that you used
 to configure a
 .Nm ,
@@ -192,7 +191,7 @@ mode to plaintext blocks of their choice
 The
 .Tn
 XTS mode isn't vulnerable to this particular attack but a lack of
-integrity should be taken into accout when evaluating security risks.
+integrity should be taken into account when evaluating security risks.
 .Sh FILES
 .Bl -tag -width indentxxxxxxxxxxx
 .It /dev/{,r}cgd*

Reply via email to