Print this page
11628 typos detected by mandoc style

Split Close
Expand all
Collapse all
          --- old/usr/src/man/man3lib/libpkcs11.3lib.man.txt
          +++ new/usr/src/man/man3lib/libpkcs11.3lib.man.txt
↓ open down ↓ 31 lines elided ↑ open up ↑
  32   32       allowed to move sensitive token objects to other slots if that is
  33   33       necessary to perform an operation.
  34   34  
  35   35       Users can overwrite one or more system-wide configuration options for
  36   36       meta slot using these environment variables.
  37   37  
  38   38       The ${METASLOT_OBJECTSTORE_SLOT} and ${METASLOT_OBJECTSTORE_TOKEN}
  39   39       environment variables are used to specify an alternate token object
  40   40       store.  A user can specify either slot-description in
  41   41       ${METASLOT_OBJECTSTORE_SLOT} or token-label in
  42      -     ${METASLOT_OBJECTSTORE_TOKEN}, or both. Valid values for slot-description
  43      -     and token-label are available from output of the command:
       42 +     ${METASLOT_OBJECTSTORE_TOKEN}, or both.  Valid values for slot-
       43 +     description and token-label are available from output of the command:
  44   44  
  45   45             # cryptoadm list -v
  46   46  
  47   47       The ${METASLOT_ENABLED} environment variable is used to specify whether
  48   48       the user wants to turn the metaslot feature on or off.  Only two values
  49   49       are recognized.  The value "true" means meta slot will be on.  The value
  50   50       "false" means meta slot will be off.
  51   51  
  52   52       The ${METASLOT_AUTO_KEY_MIGRATE} environment variable is used to specify
  53   53       whether the user wants sensitive token objects to move to other slots for
↓ open down ↓ 9 lines elided ↑ open up ↑
  63   63       This library filters the list of mechanisms available from plug-ins based
  64   64       on the policy set by cryptoadm(1M).
  65   65  
  66   66       This library provides entry points for all PKCS#11 v2.40 functions.  See
  67   67       the PKCS#11 v2.40 specifications at http://www.oasis-open.org.
  68   68  
  69   69       Plug-ins are added to libpkcs11 by the pkcs11conf class action script
  70   70       during execution of pkgadd(1M).  The available mechanisms are
  71   71       administered by the cryptoadm(1M) utility.
  72   72  
  73      -     Plug-ins must have all of their library dependancies specified, including
       73 +     Plug-ins must have all of their library dependencies specified, including
  74   74       libc(3LIB).  Libraries that have unresolved symbols, including those from
  75   75       libc(3LIB), will be rejected and a message will be sent to syslog(3C) for
  76   76       such plug-ins.
  77   77  
  78   78       Due to U.S. Export regulations, all plug-ins are required to be
  79   79       cryptographically signed using the elfsign(1) utility.
  80   80  
  81   81       Any plug-in that is not signed or is not a compatible version of PKCS#11
  82   82       will be dropped by libpkcs11.  When a plug-in is dropped, the
  83   83       administrator is alerted by the syslog(3C) utility.
↓ open down ↓ 55 lines elided ↑ open up ↑
 139  139  
 140  140  INTERFACE STABILITY
 141  141       Committed
 142  142  
 143  143  MT-LEVEL
 144  144       The SUNW Extension functions are MT-Safe.  The PKCS#11 Standard functions
 145  145       are MT-Safe with exceptions.  See Section 2.5.3 of PKCS#11 Cryptographic
 146  146       Token Usage Guide v2.40 and Section 5.1.5 of PKCS#11 Cryptographic Token
 147  147       Interface Base Standard v2.40
 148  148  
 149      -STANDARD
 150      -     The PKCS#11 Standard functions conform to PKCS#11 Cryptographic Token
 151      -     Interface Profiles v2.40 Extended Provider.
 152      -
 153  149  SEE ALSO
 154  150       cryptoadm(1M), pkgadd(1M), Intro(3), syslog(3C),
 155  151       SUNW_C_GetMechSession(3EXT), attributes(5), pkcs11_kernel(5),
 156  152       pkcs11_softtoken(5)
 157  153  
 158  154       PKCS#11 Cryptographic Token Interface Base Specification v2.40 Plus
 159  155       Errata 01,
 160  156       http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/errata01/os/pkcs11-base-v2.40-errata01-os.html.
 161  157  
 162  158       PKCS#11 Cryptographic Token Interface Profiles v2.40,
 163  159       http://docs.oasis-open.org/pkcs11/pkcs11-profiles/v2.40/pkcs11-profiles-v2.40.html.
 164  160  
 165  161       PKCS#11 Cryptographic Token Interface Usage Guide v2.40,
 166  162       http://docs.oasis-open.org/pkcs11/pkcs11-ug/v2.40/pkcs11-ug-v2.40.html.
 167  163  
      164 +STANDARDS
      165 +     The PKCS#11 Standard functions conform to PKCS#11 Cryptographic Token
      166 +     Interface Profiles v2.40 Extended Provider.
      167 +
 168  168  NOTES
 169  169       If an application calls C_WaitForSlotEvent() without the CKF_DONT_BLOCK
 170  170       flag set, libpkcs11 must create threads internally.  If, however,
 171  171       CKF_LIBRARY_CANT_CREATE_OS_THREADS is set, C_WaitForSlotEvent() returns
 172  172       CKR_FUNCTION_FAILED.
 173  173  
 174      -     The PKCS#11 library does not work with Netscape 4.x but does work with
 175      -     more recent versions of Netscape and Mozilla.
 176      -
 177      -     Because C_Initalize() might have been called by both an application and a
 178      -     library, it is not safe for a library or its plugins to call
      174 +     Because C_Initialize() might have been called by both an application and
      175 +     a library, it is not safe for a library or its plugins to call
 179  176       C_Finalize().  A library can be finished calling functions from
 180  177       libpkcs11, while an application might not.
 181  178  
 182      -illumos                        October 19, 2016                        illumos
      179 +illumos                         August 27, 2019                        illumos
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX