Sun Mar 15 14:12:19 2009 UTC ()
Provide -width for tag lists.
XXX The examples need to be reworked to fit the terminal width


(joerg)
diff -r1.13 -r1.14 src/share/man/man9/secmodel.9

cvs diff -r1.13 -r1.14 src/share/man/man9/secmodel.9 (expand / switch to unified diff)

--- src/share/man/man9/secmodel.9 2008/11/12 12:35:54 1.13
+++ src/share/man/man9/secmodel.9 2009/03/15 14:12:19 1.14
@@ -1,14 +1,14 @@ @@ -1,14 +1,14 @@
1.\" $NetBSD: secmodel.9,v 1.13 2008/11/12 12:35:54 ad Exp $ 1.\" $NetBSD: secmodel.9,v 1.14 2009/03/15 14:12:19 joerg Exp $
2.\" 2.\"
3.\" Copyright (c) 2006 Elad Efrat <elad@NetBSD.org> 3.\" Copyright (c) 2006 Elad Efrat <elad@NetBSD.org>
4.\" All rights reserved. 4.\" All rights reserved.
5.\" 5.\"
6.\" Redistribution and use in source and binary forms, with or without 6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions 7.\" modification, are permitted provided that the following conditions
8.\" are met: 8.\" are met:
9.\" 1. Redistributions of source code must retain the above copyright 9.\" 1. Redistributions of source code must retain the above copyright
10.\" notice, this list of conditions and the following disclaimer. 10.\" notice, this list of conditions and the following disclaimer.
11.\" 2. Redistributions in binary form must reproduce the above copyright 11.\" 2. Redistributions in binary form must reproduce the above copyright
12.\" notice, this list of conditions and the following disclaimer in the 12.\" notice, this list of conditions and the following disclaimer in the
13.\" documentation and/or other materials provided with the distribution. 13.\" documentation and/or other materials provided with the distribution.
14.\" 3. The name of the author may not be used to endorse or promote products 14.\" 3. The name of the author may not be used to endorse or promote products
@@ -373,27 +373,27 @@ carefully following the desired policy t @@ -373,27 +373,27 @@ carefully following the desired policy t
373to all of the issues outlined above, one must also remember that any unhandled 373to all of the issues outlined above, one must also remember that any unhandled
374requests will be denied by default. 374requests will be denied by default.
375.Pp 375.Pp
376To make it easier on developers to write new security models from scratch, 376To make it easier on developers to write new security models from scratch,
377.Nx 377.Nx
378maintains skeleton listeners that contain every possible request and 378maintains skeleton listeners that contain every possible request and
379arguments. 379arguments.
380.Ss Available security models 380.Ss Available security models
381The following is a list of security models available in the default 381The following is a list of security models available in the default
382.Nx 382.Nx
383distribution. 383distribution.
384To choose, one should edit 384To choose, one should edit
385.Pa /usr/src/sys/conf/std . 385.Pa /usr/src/sys/conf/std .
386.Bl -tag 386.Bl -tag -width secmodel_overlay
387.It secmodel_bsd44 387.It secmodel_bsd44
388Traditional 388Traditional
389.Nx 389.Nx
390security model, derived from 390security model, derived from
391.Bx 4.4 . 391.Bx 4.4 .
392.It secmodel_overlay 392.It secmodel_overlay
393Sample overlay security model, sitting on-top of 393Sample overlay security model, sitting on-top of
394.Xr secmodel_bsd44 9 . 394.Xr secmodel_bsd44 9 .
395.El 395.El
396.Sh FILES 396.Sh FILES
397.Pa /usr/share/examples/secmodel 397.Pa /usr/share/examples/secmodel
398.Sh SEE ALSO 398.Sh SEE ALSO
399.Xr kauth 9 , 399.Xr kauth 9 ,