Commit 233997bc authored by Pekka Pessi's avatar Pekka Pessi

iptsec/auth_tag.c: fixed whitespace

darcs-hash:20081127125838-db55f-402f99bd13c035ce7165c41dd6f1781e94bde96e.gz
parent ccbf9d2d
......@@ -40,14 +40,14 @@
#include <sofia-sip/url_tag_class.h>
/**@def AUTHTAG_ANY()
*
*
* Filter tag matching any AUTHTAG_*().
*/
tag_typedef_t authtag_any = NSTAG_TYPEDEF(*);
/**@def AUTHTAG_MODULE()
*
* Pointer to an authentication server module (auth_mod_t).
*
* Pointer to an authentication server module (auth_mod_t).
*
* The tag item AUTHTAG_MODULE() contains pointer to an authentication server
* module. It is used to pass an already initialized authentication module
......@@ -58,11 +58,11 @@ tag_typedef_t authtag_module = PTRTAG_TYPEDEF(module);
/**@def AUTHTAG_METHOD()
*
* Name of the authentication scheme.
*
*
* The tag AUTHTAG_METHOD() specifies the authentication module and scheme
* to be used by the auth_module. The name can specify a basic
* authentication module, like "Digest" or "Basic", or an plugin module,
* like "SGMF+Digest".
* like "SGMF+Digest".
*
* @sa See <sofia-sip/auth_plugin.h> for plugin interface.
*/
......@@ -87,7 +87,7 @@ tag_typedef_t authtag_realm = STRTAG_TYPEDEF(realm);
*
* Opaque data used by authentication server.
*
* The tag authtag_opaque is used to pass opaque data to the @b auth_module.
* The tag authtag_opaque is used to pass opaque data to the @b auth_module.
* The opaque data will be included in all the challenges (however, the data
* is prefixed with a "." and other opaque data used by the algorithms.
*
......@@ -115,7 +115,7 @@ tag_typedef_t authtag_db = STRTAG_TYPEDEF(db);
/**@def AUTHTAG_QOP()
*
* Quality-of-protection used by Digest authentication.
*
*
* The tag AUTHTAG_QOP() specifies the qop scheme to be used by the
* digest authentication.
*/
......@@ -124,7 +124,7 @@ tag_typedef_t authtag_qop = STRTAG_TYPEDEF(qop);
/**@def AUTHTAG_ALGORITHM()
*
* Authentication algorithm used by Digest authentication.
*
*
* The tag AUTHTAG_ALGORITHM() specifies the qop scheme to be used by the
* digest authentication.
*/
......@@ -133,7 +133,7 @@ tag_typedef_t authtag_algorithm = STRTAG_TYPEDEF(algorithm);
/**@def AUTHTAG_EXPIRES()
*
* Nonce expiration time for Digest authentication.
*
*
* The tag AUTHTAG_EXPIRES() specifies the time in seconds that a nonce is
* considered valid. If 0, the nonce lifetime unbounded. The default time is
* 3600 seconds.
......@@ -143,7 +143,7 @@ tag_typedef_t authtag_expires = UINTTAG_TYPEDEF(expires);
/**@def AUTHTAG_NEXT_EXPIRES()
*
* Next nonce expiration time for Digest authentication.
*
*
* The tag AUTHTAG_NEXT_EXPIRES() specifies the time in seconds that a
* nextnonce sent in Authentication-Info header is considered valid. If 0,
* the nonce lifetime is unbounded. The default time is 3600 seconds.
......@@ -153,9 +153,9 @@ tag_typedef_t authtag_next_expires = UINTTAG_TYPEDEF(next_expires);
/**@def AUTHTAG_MAX_NCOUNT()
*
* Max nonce count value.
*
*
* The tag AUTHTAG_MAX_NCOUNT() specifies the maximum number of times a
* nonce should be used.
* nonce should be used.
*
* @todo Count actual usages and don't trust "nc" parameter only.
*/
......@@ -164,7 +164,7 @@ tag_typedef_t authtag_max_ncount = UINTTAG_TYPEDEF(max_ncount);
/**@def AUTHTAG_BLACKLIST()
*
* Blacklist time.
*
*
* The tag AUTHTAG_BLACKLIST() specifies the time the server delays its
* response if it is given bad credentials or malformed nonce. The default
* time is 5 seconds.
......@@ -176,7 +176,7 @@ tag_typedef_t authtag_blacklist = UINTTAG_TYPEDEF(blacklist);
/**@def AUTHTAG_FORBIDDEN()
*
* Respond with 403 Forbidden.
*
*
* When given a true argument, the tag AUTHTAG_FORBIDDEN() specifies that the
* server responds with 403 Forbidden (instead of 401/407) when it receives
* bad credentials.
......@@ -208,8 +208,8 @@ tag_typedef_t authtag_fake = BOOLTAG_TYPEDEF(fake);
/**@def AUTHTAG_REMOTE()
*
* Remote authenticator URL.
*
* The tag AUTHTAG_REMOTE() is used to specify URL for remote authenticator.
*
* The tag AUTHTAG_REMOTE() is used to specify URL for remote authenticator.
* The meaning of the URL is specific to the authentication module. The
* authentication module is selected by AUTHTAG_METHOD().
*/
......@@ -217,15 +217,15 @@ tag_typedef_t authtag_remote = URLTAG_TYPEDEF(remote);
/**@def AUTHTAG_ALLOW()
*
* Comma-separated list of methods that are not challenged.
*
* Comma-separated list of methods that are not challenged.
*
* The tag AUTHTAG_ALLOW() takes its argument a string containing a
* comma-separated list of methods, for example,
* @code
* AUTHTAG_ALLOW("ACK, BYE, CANCEL").
* @endcode
*
* The specified methods are not challenged by the authentication module.
* The specified methods are not challenged by the authentication module.
* For example, this may include SIP ACK method or SIP methods only used
* within an already established dialog.
*/
......@@ -234,7 +234,7 @@ tag_typedef_t authtag_allow = STRTAG_TYPEDEF(allow);
/**@def AUTHTAG_MASTER_KEY()
*
* Private master key for the authentication module.
*
*
* The tag AUTHTAG_MASTER_KEY() specifies a private master key that can be
* used by the authentication module for various purposes (for instance,
* validating that nonces are really generated by it).
......@@ -244,7 +244,7 @@ tag_typedef_t authtag_master_key = STRTAG_TYPEDEF(master_key);
/**@def AUTHTAG_CACHE_USERS()
*
* Time to cache user data.
*
*
* The tag AUTHTAG_CACHE_USERS() specifies how many seconds the user data is
* cached locally. Default value is typically 30 minutes.
*/
......@@ -253,7 +253,7 @@ tag_typedef_t authtag_cache_users = UINTTAG_TYPEDEF(cache_users);
/**@def AUTHTAG_CACHE_ERRORS()
*
* Time to cache errors.
*
*
* The tag AUTHTAG_CACHE_ERRORS() specifies the lifetime in seconds for
* errors in the local authentication data cache. Note that the errors
* generated locally (e.g., because of connectivity problem with
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment