Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/share/man/man4 Drop trailing white space in preparation for ...



details:   https://anonhg.NetBSD.org/src/rev/20c59dbb512b
branches:  trunk
changeset: 566132:20c59dbb512b
user:      wiz <wiz%NetBSD.org@localhost>
date:      Wed Apr 28 15:19:20 2004 +0000

description:
Drop trailing white space in preparation for more changes.

diffstat:

 share/man/man4/crypto.4 |  58 ++++++++++++++++++++++++------------------------
 1 files changed, 29 insertions(+), 29 deletions(-)

diffs (169 lines):

diff -r 543db0441c4a -r 20c59dbb512b share/man/man4/crypto.4
--- a/share/man/man4/crypto.4   Wed Apr 28 14:17:55 2004 +0000
+++ b/share/man/man4/crypto.4   Wed Apr 28 15:19:20 2004 +0000
@@ -1,4 +1,4 @@
-.\"    $NetBSD: crypto.4,v 1.2 2004/04/27 23:42:59 jonathan Exp $
+.\"    $NetBSD: crypto.4,v 1.3 2004/04/28 15:19:20 wiz Exp $
 .\"
 .\" Copyright (c) 2004
 .\"    Jonathan Stone <jonathan%dsg.stanford.edu@localhost>. All rights reserved.
@@ -43,17 +43,17 @@
 The
 .Nm
 driver gives user-mode applications access to hardware-accelerated
-cryptographic transforms, as implemented by the 
+cryptographic transforms, as implemented by the
 .Xr opencrypto 9
 in-kernel interface.
 The
 .Pa /dev/crypto
-special device provides an 
+special device provides an
 .Xr ioctl 2
 based interface. User-mode applications should open the special device,
-then issue 
-.Xr ioctl 2 
-calls on the descriptor. The 
+then issue
+.Xr ioctl 2
+calls on the descriptor. The
 .Nm
 device provides two distinct modes of operation: one mode for
 symmetric-keyed cryptographic requests, and a second mode for
@@ -71,7 +71,7 @@
 .Pp
 To use symmetric mode, you must first create a session specifying
 the algorithm(s) and key(s) to use; then issue encrypt or decrypt
-requests against the session. 
+requests against the session.
 .Ss Symmetric-key privacy algorithms
 Contingent upon device drivers for installed cryptographic hardware
 registering with
@@ -101,7 +101,7 @@
 .It CRYPTO_MD5
 .It CRYPTO_SHA1
 .El
-The 
+The
 .Em CRYPTO_MD5
 and
 .Em CRYPTO_SHA1
@@ -112,27 +112,27 @@
 .Bl -tag -width CIOCFKEY
 .\"
 .It Dv CRIOCGET Fa int *fd
-Clone the fd argument to 
+Clone the fd argument to
 .Xr ioctl 4 ,
 yielding a new file descriptor which can be used to create
 crypto sessions and request crypto operations.
 .\"
 .It Dv CRIOCGSESSION Fa struct session_op *sessp
-Persistently bind a file descriptor returned by a previous 
-.Dv CRIOCGET 
+Persistently bind a file descriptor returned by a previous
+.Dv CRIOCGET
 to a session: that is, to the chosen privacy algorithm, integrity
-algorithm, and keys specified in 
+algorithm, and keys specified in
 .Fa sessp .
-The special value 0 for either privacy or integrity 
-is reserved to indicate that the indicated operation (privacy or integrity) 
-is not desired for this session. 
+The special value 0 for either privacy or integrity
+is reserved to indicate that the indicated operation (privacy or integrity)
+is not desired for this session.
 .Pp
-For non-zero symmetric-key privacy algorithms, the privacy algorithm 
+For non-zero symmetric-key privacy algorithms, the privacy algorithm
 must be specified in
 .Fa sess->cipher ,
 the key length in
 .Fa sessp->keylen ,
-and the key value in the octets addressed by 
+and the key value in the octets addressed by
 .Fa sessp->key .
 .Pp
 For keyed one-way hash algorithms, the one-way hash must be specified
@@ -140,19 +140,19 @@
 .Fa sessp->mac ,
 the key length in
 .Fa sessp->mackey ,
-and the key value in the octets addressed by 
+and the key value in the octets addressed by
 .Fa sessp->mackeylen .
 .\"
 .Pp
 Support for a specific combination of fused privacy  and
 integrity-check algorithms depends on whether the underlying
 hardware supports that combination. Not all combinations are supported
-by all hardware, even if the hardware supports each operation as a 
+by all hardware, even if the hardware supports each operation as a
 stand-alone non-fused operation.
 .It Dv CIOCCRYPT Fa struct crpyto_op *cr_op
-Request a symmetric-key (or unkeyed hash) operation. 
+Request a symmetric-key (or unkeyed hash) operation.
 The file descriptor argument to
-.Xr ioctl 4 
+.Xr ioctl 4
 must have been bound to a valid session.
 To encrypt, set
 .Fa cr_op->op
@@ -160,13 +160,13 @@
 .Fa cr_op->op
 to COP_DECRYPT.
 The field
-.Fa cr_op->len 
+.Fa cr_op->len
 supplies the length of the input buffer; the fields
 .Fa cr_op->src ,
 .Fa cr_op->dst ,
 .Fa cr_op->mac ,
-.Fa cr_op->iv 
-supply the addresses of the input buffer, output buffer, 
+.Fa cr_op->iv
+supply the addresses of the input buffer, output buffer,
 one-way hash, and initialization vector, respectively.
 .It Dv CIOCFSESSION Fa void
 Destroys the /dev/crypto session associated with the file-descriptor
@@ -200,19 +200,19 @@
 Each of the above-listed asymmetric operations is present
 if and only the bit position numbered by the code for that operation
 is set.
-For example, 
+For example,
 .Dv CRK_MOD_EXP
 is available if and only if the bit
 .Dv (1 << CRK_MOD_EX)
 is set.
 .It Dv CIOCFKEY Fa struct crypt_kop *kop
 Performs an asymmetric-key operation from the list above.
- The specific operation is supplied in 
+ The specific operation is supplied in
 .Fa kop->crk_op ;
 final status for the operation is returned in
 .Fa kop->crk_status .
 The number of input arguments and the number of output arguments
-is specified in 
+is specified in
 .Fa kop->crk_iparams
 and
 .Fa kop->crk_iparams ,
@@ -229,7 +229,7 @@
 .\"
 .Sh SEE ALSO
 .Xr hifn 4 ,
-.Xr ubsec 4 , 
+.Xr ubsec 4 ,
 .Xr opencrypto 9 .
 .Sh BUGS
 .Pp
@@ -238,7 +238,7 @@
 .Dv CRIOCGSESSION ,
 must exactly match the values expected by
 .XR opencrypto 9 .
-The output buffer and MAC buffers supplied to 
+The output buffer and MAC buffers supplied to
 .Dv CRIOCRYPT
 must follow whether privacy or integrity algorithms were specified for
 session: if you request a non-NULL algorithm, you must supply a suitably-sized



Home | Main Index | Thread Index | Old Index