Branch: Tag:

2001-04-27

2001-04-27 13:41:35 by Henrik Grubbström (Grubba) <grubba@grubba.org>

Autodoc mk II markup fixes.

Rev: lib/modules/ADT.pmod/Table.pmod:1.20
Rev: lib/modules/Crypto/randomness.pmod:1.19
Rev: lib/modules/Function.pmod:1.5
Rev: lib/modules/Geography.pmod/Countries.pmod:1.12
Rev: lib/modules/Getopt.pmod:1.13
Rev: lib/modules/Locale.pmod/module.pmod:1.11
Rev: lib/modules/Parser.pmod/module.pmod:1.6
Rev: lib/modules/Protocols.pmod/DNS.pmod:1.59
Rev: lib/modules/Protocols.pmod/HTTP.pmod/module.pmod:1.24
Rev: lib/modules/Protocols.pmod/Line.pmod:1.16
Rev: lib/modules/Protocols.pmod/LysKOM.pmod/Connection.pike:1.8
Rev: lib/modules/Protocols.pmod/LysKOM.pmod/Request.pmod:1.9
Rev: lib/modules/Protocols.pmod/TELNET.pmod:1.16
Rev: lib/modules/Sql.pmod/Sql.pike:1.48
Rev: lib/modules/Stdio.pmod/module.pmod:1.113
Rev: lib/modules/_Image.pmod/module.pmod:1.18

1: - /* $Id: randomness.pmod,v 1.18 2000/09/28 03:38:39 hubbe Exp $ + /* $Id: randomness.pmod,v 1.19 2001/04/27 13:35:23 grubba Exp $    */    - //! module Crypto - //! submodule randomness +    //! Assorted stronger or weaker randomnumber generators.    - /* These devices tries to collect entropy from the environment. + /* These devices try to collect entropy from the environment.    * They differ in behaviour when they run low on entropy, /dev/random    * will block if it can't provide enough random bits, while /dev/urandom -  * will degenerate into a reasonably strong pseudo random generator */ +  * will degenerate into a reasonably strong pseudo random generator +  */      #pike __REAL_VERSION__   
16:   static constant PRANDOM_DEVICE = "/dev/urandom";      /* Collect somewhat random data from the environment. Unfortunately, -  * this is quite system dependent */ +  * this is quite system dependent +  */   static constant PATH = "/usr/sbin:/usr/etc:/usr/bin/:/sbin/:/etc:/bin";      #ifndef __NT__
35:   });   #endif    - #define PRIVATE + // ***************************** + #define private    - PRIVATE object global_arcfour; + private object global_arcfour;    - // method string some_entropy() +    // Executes several programs to generate some entropy from their output. - PRIVATE string some_entropy() + private string some_entropy()   {   #ifdef __NT__    object ctx = Crypto.nt.CryptAcquireContext(0, 0, Crypto.nt.PROV_RSA_FULL,
89:   }       - //! class pike_random +    //! A pseudo random generator based on the ordinary random() function.   class pike_random { -  //! method string read(int len) +     //! Returns a string of length len with pseudo random values.    string read(int len)    {
117:   }      #if constant(Crypto.arcfour) - //! class arcfour_random +    //! A pseudo random generator based on the arcfour crypto.   class arcfour_random { -  +     inherit Crypto.arcfour : arcfour;    -  //! method void create(string secret) +     //! Initialize and seed the arcfour random generator.    void create(string secret)    {
132: Inside #if constant(Crypto.arcfour)
   arcfour::set_encrypt_key(hash->digest());    }    -  //! method string read(int len) +     //! Return a string of the next len random characters from the    //! arcfour random generator.    string read(int len)