Browse code

htable, permissions, print: regenerated readme files

Daniel-Constantin Mierla authored on 08/01/2014 18:06:19
Showing 3 changed files
... ...
@@ -17,7 +17,7 @@ Alex Balashov
17 17
 
18 18
    <abalashov@evaristesys.com>
19 19
 
20
-   Copyright © 2008-2011 http://www.asipto.com
20
+   Copyright � 2008-2011 http://www.asipto.com
21 21
      __________________________________________________________________
22 22
 
23 23
    Table of Contents
... ...
@@ -178,7 +178,7 @@ Chapter 1. Admin Guide
178 178
    You can read more about hash tables at:
179 179
    http://en.wikipedia.org/wiki/Hash_table.
180 180
 
181
-   The “name” can be a static string or can include pseudo- variables that
181
+   The "name" can be a static string or can include pseudo- variables that
182 182
    will be replaced at runtime.
183 183
 
184 184
    Example 1.1. Accessing $sht(htname=>key)
... ...
@@ -201,7 +201,7 @@ $sht(a=>$ci::srcip) = $si;
201 201
    the failed authentications per user and one for storing the time of
202 202
    last authentication attempt. To ensure unique name per user, the hash
203 203
    table uses a combination of authentication username and text
204
-   “::auth_count” and “::last_auth”.
204
+   "::auth_count" and "::last_auth".
205 205
 
206 206
    Example 1.2. Dictionary attack limitation
207 207
 ...
... ...
@@ -495,7 +495,7 @@ modparam("htable", "enable_dmq", 1)
495 495
    4.4. sht_lock(htable=>key)
496 496
    4.5. sht_unlock(htable=>key)
497 497
 
498
-4.1.  sht_print()
498
+4.1. sht_print()
499 499
 
500 500
    Dump content of hash table to L_ERR log level. Intended for debug
501 501
    purposes.
... ...
@@ -508,7 +508,7 @@ modparam("htable", "enable_dmq", 1)
508 508
 sht_print();
509 509
 ...
510 510
 
511
-4.2.  sht_rm_name_re(htable=>regexp)
511
+4.2. sht_rm_name_re(htable=>regexp)
512 512
 
513 513
    Delete all entries in the htable that match the name against regular
514 514
    expression.
... ...
@@ -521,7 +521,7 @@ sht_print();
521 521
 sht_rm_name_re("ha=>.*");
522 522
 ...
523 523
 
524
-4.3.  sht_rm_value_re(htable=>regexp)
524
+4.3. sht_rm_value_re(htable=>regexp)
525 525
 
526 526
    Delete all entries in the htable that match the value against regular
527 527
    expression.
... ...
@@ -534,7 +534,7 @@ sht_rm_name_re("ha=>.*");
534 534
 sht_rm_value_re("ha=>.*");
535 535
 ...
536 536
 
537
-4.4.  sht_lock(htable=>key)
537
+4.4. sht_lock(htable=>key)
538 538
 
539 539
    Lock the slot in htable corespoding to the key item.
540 540
 
... ...
@@ -545,7 +545,7 @@ sht_rm_value_re("ha=>.*");
545 545
 sht_lock("ha=>test");
546 546
 ...
547 547
 
548
-4.5.  sht_unlock(htable=>key)
548
+4.5. sht_unlock(htable=>key)
549 549
 
550 550
    Unlock the slot in htable corespoding to the key item.
551 551
 
... ...
@@ -576,7 +576,7 @@ sht_unlock("ha=>test");
576 576
    6.2. sht_dump
577 577
    6.3. sht_delete
578 578
 
579
-6.1.  sht_reload
579
+6.1. sht_reload
580 580
 
581 581
    Reload a hash table from database.
582 582
 
... ...
@@ -589,7 +589,7 @@ sht_unlock("ha=>test");
589 589
                 _hash_table_name_
590 590
                 _empty_line_
591 591
 
592
-6.2.  sht_dump
592
+6.2. sht_dump
593 593
 
594 594
    Dump content of a hash table via MI.
595 595
 
... ...
@@ -602,7 +602,7 @@ sht_unlock("ha=>test");
602 602
                 _hash_table_name_
603 603
                 _empty_line_
604 604
 
605
-6.3.  sht_delete
605
+6.3. sht_delete
606 606
 
607 607
    Delete a key from a hash table via MI.
608 608
 
... ...
@@ -632,7 +632,7 @@ sht_unlock("ha=>test");
632 632
    7.7. htable.listTables
633 633
    7.8. htable.stats
634 634
 
635
-7.1.  htable.get htable key
635
+7.1. htable.get htable key
636 636
 
637 637
    Lists one value in a hash table
638 638
 
... ...
@@ -648,7 +648,7 @@ sht_unlock("ha=>test");
648 648
 kamcmd htable.get students daniel
649 649
 ...
650 650
 
651
-7.2.  htable.delete htable key
651
+7.2. htable.delete htable key
652 652
 
653 653
    Delete one value in a hash table
654 654
 
... ...
@@ -664,7 +664,7 @@ kamcmd htable.get students daniel
664 664
 kamcmd htable.get students anna
665 665
 ...
666 666
 
667
-7.3.  htable.sets htable key value
667
+7.3. htable.sets htable key value
668 668
 
669 669
    Set an item in hash table to string value.
670 670
 
... ...
@@ -681,7 +681,7 @@ kamcmd htable.get students anna
681 681
 kamcmd htable.sets test x abc
682 682
 ...
683 683
 
684
-7.4.  htable.seti htable key value
684
+7.4. htable.seti htable key value
685 685
 
686 686
    Set an item in hash table to integer value.
687 687
 
... ...
@@ -698,7 +698,7 @@ kamcmd htable.sets test x abc
698 698
 kamcmd htable.sets test x 123
699 699
 ...
700 700
 
701
-7.5.  htable.dump htable
701
+7.5. htable.dump htable
702 702
 
703 703
    Lists all the values in a hash table
704 704
 
... ...
@@ -712,7 +712,7 @@ kamcmd htable.sets test x 123
712 712
 kamcmd htable.dump ipban
713 713
 ...
714 714
 
715
-7.6.  htable.reload htable
715
+7.6. htable.reload htable
716 716
 
717 717
    Reload hash table from database.
718 718
 
... ...
@@ -726,7 +726,7 @@ kamcmd htable.dump ipban
726 726
 kamcmd htable.reload ipban
727 727
 ...
728 728
 
729
-7.7.  htable.listTables
729
+7.7. htable.listTables
730 730
 
731 731
    Lists all defined tables
732 732
 
... ...
@@ -740,7 +740,7 @@ kamcmd htable.reload ipban
740 740
 kamcmd htable.listTables
741 741
 ...
742 742
 
743
-7.8.  htable.stats
743
+7.8. htable.stats
744 744
 
745 745
    Get statistics for hash tables - name, number of slots, number of
746 746
    items, max number of items per slot, min number of items per slot.
... ...
@@ -759,7 +759,7 @@ kamcmd htable.stats
759 759
 
760 760
    8.1. htable:mod-init
761 761
 
762
-8.1.  htable:mod-init
762
+8.1. htable:mod-init
763 763
 
764 764
    When defined, the module calls event_route[htable:mod-init] after all
765 765
    modules have been initialized. A typical use case is to initialise
... ...
@@ -14,9 +14,9 @@ Edited by
14 14
 
15 15
 Juha Heinanen
16 16
 
17
-   Copyright © 2003 Miklos Tirpak
17
+   Copyright � 2003 Miklos Tirpak
18 18
 
19
-   Copyright © 2006-2008 Juha Heinanen
19
+   Copyright � 2006-2008 Juha Heinanen
20 20
      __________________________________________________________________
21 21
 
22 22
    Table of Contents
... ...
@@ -250,7 +250,7 @@ Chapter 1. Admin Guide
250 250
 
251 251
    Function for registration checking is called allow_register and the
252 252
    algorithm is very similar to the algorithm described in Section 1.1,
253
-   “Call Routing”. The only difference is in the way how pairs are
253
+   "Call Routing". The only difference is in the way how pairs are
254 254
    created.
255 255
 
256 256
    Instead of From header field the function uses To header field because
... ...
@@ -261,8 +261,8 @@ Chapter 1. Admin Guide
261 261
    Thus, pairs used in matching will look like this: (To, Contact 1), (To,
262 262
    Contact 2), (To, Contact 3), and so on..
263 263
 
264
-   The algorithm of matching is same as described in Section 1.1, “Call
265
-   Routing”.
264
+   The algorithm of matching is same as described in Section 1.1, "Call
265
+   Routing".
266 266
 
267 267
 1.3. URI Permissions
268 268
 
... ...
@@ -387,7 +387,7 @@ Chapter 1. Admin Guide
387 387
    specify full pathname then the directory in which is the main config
388 388
    file is located will be used.
389 389
 
390
-   Default value is “permissions.allow”.
390
+   Default value is "permissions.allow".
391 391
 
392 392
    Example 1.1. Set default_allow_file parameter
393 393
 ...
... ...
@@ -400,7 +400,7 @@ modparam("permissions", "default_allow_file", "/etc/permissions.allow")
400 400
    without parameters. If you don't specify full pathname then the
401 401
    directory in which the main config file is located will be used.
402 402
 
403
-   Default value is “permissions.deny”.
403
+   Default value is "permissions.deny".
404 404
 
405 405
    Example 1.2. Set default_deny_file parameter
406 406
 ...
... ...
@@ -435,7 +435,7 @@ Note
435 435
 
436 436
    Including leading dot.
437 437
 
438
-   Default value is “.allow”.
438
+   Default value is ".allow".
439 439
 
440 440
    Example 1.4. Set allow_suffix parameter
441 441
 ...
... ...
@@ -452,7 +452,7 @@ Note
452 452
 
453 453
    Including leading dot.
454 454
 
455
-   Default value is “.deny”.
455
+   Default value is ".deny".
456 456
 
457 457
    Example 1.5. Set deny_suffix parameter
458 458
 ...
... ...
@@ -464,7 +464,7 @@ modparam("permissions", "deny_suffix", ".deny")
464 464
    This is URL of the database to be used to store rules used by
465 465
    allow_trusted function.
466 466
 
467
-   Default value is “NULL”.
467
+   Default value is "NULL".
468 468
 
469 469
    Example 1.6. Set db_url parameter
470 470
 ...
... ...
@@ -476,7 +476,7 @@ modparam("permissions", "db_url", "dbdriver://username:password@dbhost/dbname")
476 476
    Name of database table containing IP subnets and DNS domain names used
477 477
    by allow_address and allow_source_address functions.
478 478
 
479
-   Default value is “address”.
479
+   Default value is "address".
480 480
 
481 481
    Example 1.7. Set address_table parameter
482 482
 ...
... ...
@@ -488,7 +488,7 @@ modparam("permissions", "address_table", "addr")
488 488
    Name of address table column containing group identifier of the
489 489
    address.
490 490
 
491
-   Default value is “grp”.
491
+   Default value is "grp".
492 492
 
493 493
    Example 1.8. Set grp_col parameter
494 494
 ...
... ...
@@ -499,7 +499,7 @@ modparam("permissions", "grp_col", "group_id")
499 499
 
500 500
    Name of address table column containing IP address part of the address.
501 501
 
502
-   Default value is “ip_addr”.
502
+   Default value is "ip_addr".
503 503
 
504 504
    Example 1.9. Set ip_addr_col parameter
505 505
 ...
... ...
@@ -511,7 +511,7 @@ modparam("permissions", "ip_addr_col", "ip_address")
511 511
    Name of address table column containing network mask of the address.
512 512
    Possible values are 0-32.
513 513
 
514
-   Default value is “mask”.
514
+   Default value is "mask".
515 515
 
516 516
    Example 1.10. Set mask_col parameter
517 517
 ...
... ...
@@ -522,7 +522,7 @@ modparam("permissions", "mask_col", "subnet_length")
522 522
 
523 523
    Name of address table column containing port part of the address.
524 524
 
525
-   Default value is “port”.
525
+   Default value is "port".
526 526
 
527 527
    Example 1.11. Set port_col parameter
528 528
 ...
... ...
@@ -546,7 +546,7 @@ modparam("permissions", "db_mode", 1)
546 546
    Name of database table containing matching rules used by allow_trusted
547 547
    function.
548 548
 
549
-   Default value is “trusted”.
549
+   Default value is "trusted".
550 550
 
551 551
    Example 1.13. Set trusted_table parameter
552 552
 ...
... ...
@@ -558,7 +558,7 @@ modparam("permissions", "trusted_table", "pbx")
558 558
    Name of trusted table column containing source IP address that is
559 559
    matched against source IP address of received request.
560 560
 
561
-   Default value is “src_ip”.
561
+   Default value is "src_ip".
562 562
 
563 563
    Example 1.14. Set source_col parameter
564 564
 ...
... ...
@@ -569,10 +569,10 @@ modparam("permissions", "source_col", "source_ip_address")
569 569
 
570 570
    Name of trusted table column containing transport protocol that is
571 571
    matched against transport protocol of received request. Possible values
572
-   that can be stored in proto_col are “any”, “udp”, “tcp”, “tls”, “sctp”,
573
-   and “none”. Value “any” matches always and value “none” never.
572
+   that can be stored in proto_col are "any", "udp", "tcp", "tls", "sctp",
573
+   and "none". Value "any" matches always and value "none" never.
574 574
 
575
-   Default value is “proto”.
575
+   Default value is "proto".
576 576
 
577 577
    Example 1.15. Set proto_col parameter
578 578
 ...
... ...
@@ -584,7 +584,7 @@ modparam("permissions", "proto_col", "transport")
584 584
    Name of trusted table column containing regular expression that is
585 585
    matched against From URI.
586 586
 
587
-   Default value is “from_pattern”.
587
+   Default value is "from_pattern".
588 588
 
589 589
    Example 1.16. Set from_col parameter
590 590
 ...
... ...
@@ -597,7 +597,7 @@ modparam("permissions", "from_col", "regexp")
597 597
    added as value to peer_tag AVP if peer_tag AVP has been defined and if
598 598
    the address or peer matches.
599 599
 
600
-   Default value is “tag”.
600
+   Default value is "tag".
601 601
 
602 602
    Example 1.17. Set tag_col parameter
603 603
 ...
... ...
@@ -609,7 +609,7 @@ modparam("permissions", "tag_col", "peer_tag")
609 609
    If defined, the AVP will be set as side effect of allow_trusted() call
610 610
    to not NULL tag column value of the matching peer.
611 611
 
612
-   Default value is “undefined”.
612
+   Default value is "undefined".
613 613
 
614 614
    Example 1.18. Set peer_tag_avp parameter
615 615
 ...
... ...
@@ -620,9 +620,10 @@ modparam("permissions", "peer_tag_avp", "$avp(i:707)")
620 620
 
621 621
    Tag mode for allow_trusted(). 0 sets only the tag of the first match. 1
622 622
    adds the tags of all matches to the avp. In addition the return value
623
-   of allow_trusted() is the number of matches.
623
+   of allow_trusted() is the number of matches. This parameter is not used
624
+   for address table matching functions.
624 625
 
625
-   Default value is “0”.
626
+   Default value is "0".
626 627
 
627 628
    Example 1.19. Set peer_tag_mode parameter
628 629
 ...
... ...
@@ -643,10 +644,10 @@ modparam("permissions", "peer_tag_mode", "1")
643 643
    4.10. allow_address_group(addr, port)
644 644
    4.11. allow_trusted([src_ip_pvar, proto_pvar])
645 645
 
646
-4.1.  allow_routing()
646
+4.1. allow_routing()
647 647
 
648 648
    Returns true if all pairs constructed as described in Section 1.1,
649
-   “Call Routing” have appropriate permissions according to the
649
+   "Call Routing" have appropriate permissions according to the
650 650
    configuration files. This function uses default configuration files
651 651
    specified in default_allow_file and default_deny_file.
652 652
 
... ...
@@ -659,10 +660,10 @@ if (allow_routing()) {
659 659
 };
660 660
 ...
661 661
 
662
-4.2.  allow_routing(basename)
662
+4.2. allow_routing(basename)
663 663
 
664 664
    Returns true if all pairs constructed as described in Section 1.1,
665
-   “Call Routing” have appropriate permissions according to the
665
+   "Call Routing" have appropriate permissions according to the
666 666
    configuration files given as parameters.
667 667
 
668 668
    Meaning of the parameters is as follows:
... ...
@@ -682,10 +683,10 @@ if (allow_routing("basename")) {
682 682
 };
683 683
 ...
684 684
 
685
-4.3.  allow_routing(allow_file,deny_file)
685
+4.3. allow_routing(allow_file,deny_file)
686 686
 
687 687
    Returns true if all pairs constructed as described in Section 1.1,
688
-   “Call Routing” have appropriate permissions according to the
688
+   "Call Routing" have appropriate permissions according to the
689 689
    configuration files given as parameters.
690 690
 
691 691
    Meaning of the parameters is as follows:
... ...
@@ -707,10 +708,10 @@ if (allow_routing("rules.allow", "rules.deny")) {
707 707
 };
708 708
 ...
709 709
 
710
-4.4.  allow_register(basename)
710
+4.4. allow_register(basename)
711 711
 
712 712
    The function returns true if all pairs constructed as described in
713
-   Section 1.2, “Registration Permissions” have appropriate permissions
713
+   Section 1.2, "Registration Permissions" have appropriate permissions
714 714
    according to the configuration files given as parameters.
715 715
 
716 716
    Meaning of the parameters is as follows:
... ...
@@ -735,10 +736,10 @@ if (method=="REGISTER") {
735 735
 };
736 736
 ...
737 737
 
738
-4.5.  allow_register(allow_file, deny_file)
738
+4.5. allow_register(allow_file, deny_file)
739 739
 
740 740
    The function returns true if all pairs constructed as described in
741
-   Section 1.2, “Registration Permissions” have appropriate permissions
741
+   Section 1.2, "Registration Permissions" have appropriate permissions
742 742
    according to the configuration files given as parameters.
743 743
 
744 744
    Meaning of the parameters is as follows:
... ...
@@ -765,10 +766,10 @@ if (method=="REGISTER") {
765 765
 };
766 766
 ...
767 767
 
768
-4.6.  allow_uri(basename, pvar)
768
+4.6. allow_uri(basename, pvar)
769 769
 
770
-   Returns true if the pair constructed as described in Section 1.3, “URI
771
-   Permissions” have appropriate permissions according to the
770
+   Returns true if the pair constructed as described in Section 1.3, "URI
771
+   Permissions" have appropriate permissions according to the
772 772
    configuration files specified by the parameter.
773 773
 
774 774
    Meaning of the parameter is as follows:
... ...
@@ -792,7 +793,7 @@ if (allow_uri("basename", "$avp(i:705)") {  // Check URI stored in $avp(i:705)
792 792
 };
793 793
 ...
794 794
 
795
-4.7.  allow_address(group_id, ip_addr_pvar, port_pvar)
795
+4.7. allow_address(group_id, ip_addr_pvar, port_pvar)
796 796
 
797 797
    Returns true if address and port given as values of pvar arguments
798 798
    belonging to a group given as group_id argument matches an IP subnet or
... ...
@@ -821,7 +822,7 @@ if (!allow_address("2", "$avp(dst_adr)", "$avp(dst_port)") {
821 821
 };
822 822
 ...
823 823
 
824
-4.8.  allow_source_address([group_id])
824
+4.8. allow_source_address([group_id])
825 825
 
826 826
    Equal to allow_address(group_id, "$si", "$sp"). If 'group_id' is
827 827
    missing, the function is equal to allow_address("1", "$si", "$sp").
... ...
@@ -837,7 +838,7 @@ if (!allow_source_address("1")) {
837 837
 };
838 838
 ...
839 839
 
840
-4.9.  allow_source_address_group()
840
+4.9. allow_source_address_group()
841 841
 
842 842
    Checks if source address/port is found in cached address or subnet
843 843
    table in any group. If yes, returns that group. If not returns -1. Port
... ...
@@ -854,7 +855,7 @@ if ($var(group) != -1) {
854 854
 };
855 855
 ...
856 856
 
857
-4.10.  allow_address_group(addr, port)
857
+4.10. allow_address_group(addr, port)
858 858
 
859 859
    Checks if address/port is found in cached address or subnet table in
860 860
    any group. If yes, returns that group. If not returns -1. Port value 0
... ...
@@ -872,19 +873,19 @@ if ($var(group) != -1) {
872 872
 };
873 873
 ...
874 874
 
875
-4.11.  allow_trusted([src_ip_pvar, proto_pvar])
875
+4.11. allow_trusted([src_ip_pvar, proto_pvar])
876 876
 
877 877
    Checks based either on request's source address and transport protocol
878 878
    or source address and transport protocol given in pvar arguments, and
879 879
    From URI of request if request can be trusted without authentication.
880
-   Returns 1 if a match is found as described in Section 1.5, “Trusted
881
-   Requests” and -1 otherwise. If a match is found and peer_tag_avp has
880
+   Returns 1 if a match is found as described in Section 1.5, "Trusted
881
+   Requests" and -1 otherwise. If a match is found and peer_tag_avp has
882 882
    been defined, adds a non-NULL tag column value of the matching peer to
883 883
    AVP peer_tag_avp.
884 884
 
885 885
    Source address and transport protocol given in pvar arguments must be
886 886
    in string format. Valid transport protocol values are (ignoring case)
887
-   "any", "udp, "tcp", "tls", and "sctp".
887
+   "any", "udp, "tcp", "tls", "ws", "wss" and "sctp".
888 888
 
889 889
    This function can be used from REQUEST_ROUTE, FAILURE_ROUTE.
890 890
 
... ...
@@ -908,7 +909,7 @@ if (allow_trusted("$si", "$proto")) {
908 908
    5.5. trusted_dump
909 909
    5.6. allow_uri
910 910
 
911
-5.1.  address_reload
911
+5.1. address_reload
912 912
 
913 913
    Causes permissions module to re-read the contents of address database
914 914
    table into cache memory. In cache memory the entries are for
... ...
@@ -917,35 +918,35 @@ if (allow_trusted("$si", "$proto")) {
917 917
 
918 918
    Parameters: none
919 919
 
920
-5.2.  address_dump
920
+5.2. address_dump
921 921
 
922 922
    Causes permissions module to dump contents of cache memory address
923 923
    table.
924 924
 
925 925
    Parameters: none
926 926
 
927
-5.3.  subnet_dump
927
+5.3. subnet_dump
928 928
 
929 929
    Causes permissions module to dump contents of cache memory subnet
930 930
    table.
931 931
 
932 932
    Parameters: none
933 933
 
934
-5.4.  trusted_reload
934
+5.4. trusted_reload
935 935
 
936 936
    Causes permissions module to re-read the contents of trusted table into
937 937
    cache memory.
938 938
 
939 939
    Parameters: none
940 940
 
941
-5.5.  trusted_dump
941
+5.5. trusted_dump
942 942
 
943 943
    Causes permissions module to dump contents of trusted table from cache
944 944
    memory.
945 945
 
946 946
    Parameters: none
947 947
 
948
-5.6.  allow_uri
948
+5.6. allow_uri
949 949
 
950 950
    Tests if (URI, Contact) pair is allowed according to allow/deny files.
951 951
    The files must already have been loaded by Kamailio.
... ...
@@ -966,7 +967,7 @@ if (allow_trusted("$si", "$proto")) {
966 966
    6.5. trustedReload
967 967
    6.6. trustedDump
968 968
 
969
-6.1.  addressReload
969
+6.1. addressReload
970 970
 
971 971
    Causes permissions module to re-read the contents of address database
972 972
    table into cache memory. In cache memory the entries are for
... ...
@@ -975,21 +976,21 @@ if (allow_trusted("$si", "$proto")) {
975 975
 
976 976
    Parameters: none
977 977
 
978
-6.2.  addressDump
978
+6.2. addressDump
979 979
 
980 980
    Causes permissions module to dump contents of cache memory address
981 981
    table. (Not the subnet table).
982 982
 
983 983
    Parameters: none
984 984
 
985
-6.3.  subnetDump
985
+6.3. subnetDump
986 986
 
987 987
    Causes permissions module to dump contents of cache memory subnet
988 988
    table.
989 989
 
990 990
    Parameters: none
991 991
 
992
-6.4.  testUri basename uri contact
992
+6.4. testUri basename uri contact
993 993
 
994 994
    Tests if (URI, Contact) pair is allowed according to allow/deny files.
995 995
    The files must already have been loaded by Kamailio.
... ...
@@ -1001,14 +1002,14 @@ if (allow_trusted("$si", "$proto")) {
1001 1001
      * URI - URI to be tested
1002 1002
      * Contact - Contact to be tested
1003 1003
 
1004
-6.5.  trustedReload
1004
+6.5. trustedReload
1005 1005
 
1006 1006
    Causes permissions module to re-read the contents of trusted table into
1007 1007
    cache memory.
1008 1008
 
1009 1009
    Parameters: none
1010 1010
 
1011
-6.6.  trustedDump
1011
+6.6. trustedDump
1012 1012
 
1013 1013
    Causes permissions module to dump contents of trusted table from cache
1014 1014
    memory.
... ...
@@ -1,4 +1,3 @@
1
-
2 1
 Print Module
3 2
 
4 3
 Andrei Pelinescu-Onciul
... ...
@@ -6,7 +5,7 @@ Andrei Pelinescu-Onciul
6 6
    FhG FOKUS
7 7
 
8 8
    Copyright � 2003 FhG FOKUS
9
-     _________________________________________________________________
9
+     __________________________________________________________________
10 10
 
11 11
    Table of Contents
12 12
 
... ...
@@ -20,7 +19,7 @@ Andrei Pelinescu-Onciul
20 20
 
21 21
         3. Functions
22 22
 
23
-              3.1. print(txt) 
23
+              3.1. print(txt)
24 24
 
25 25
    List of Examples
26 26
 
... ...
@@ -40,12 +39,12 @@ Chapter 1. Admin Guide
40 40
 
41 41
    3. Functions
42 42
 
43
-        3.1. print(txt) 
43
+        3.1. print(txt)
44 44
 
45 45
 1. Overview
46 46
 
47 47
    This is an example module. It implements only one function that prints
48
-   its  string  parameter  to  stdout (it won't work if ser is started in
48
+   its string parameter to stdout (it won't work if ser is started in
49 49
    daemon mode). It also shows how module parameters can be declared.
50 50
 
51 51
 2. Parameters
... ...
@@ -77,9 +76,9 @@ modparam("print", "int_param", 42)
77 77
 
78 78
 3. Functions
79 79
 
80
-   3.1. print(txt) 
80
+   3.1. print(txt)
81 81
 
82
-3.1.  print(txt)
82
+3.1. print(txt)
83 83
 
84 84
    Prints string to stdout.
85 85