In order for makewhatis -M under IRIX 6.5.14m not to fail on
SSL_shutdown.3 as follows:

   nroff: Macro argument too long; line 170, file
     /usr/local/man/man3/SSL_shutdown.3
   stack: N"

I found it necessary (well, at least it was sufficient) to recast the
long

        .Ip "...\*(N"...\*(T"..." 4

lines as

        .Ip
        ...\*(L"...\*(R"...

The version is openssl-0.9.6c, in case that should matter.  I did not
have to change the corresponding .IX Item lines.  A context diff is
attached.

FWIW,
-- 
Rick Troxel, Helix Systems Staff     [EMAIL PROTECTED]     301/435-2983
*** ../SSL_shutdown.3.ORIG      Tue Mar 26 14:38:39 2002
--- SSL_shutdown.3      Thu May  9 15:58:29 2002
***************
*** 218,225 ****
  .PP
  \fISSL_shutdown()\fR supports both uni- and bidirectional shutdown by its 2 step
  behaviour.
! .Ip "When the application is the first party to send the \*(N"close notify\*(T" 
alert, SSL_shutdown() will only send the alert and the set the 
\s-1SSL_SENT_SHUTDOWN\s0 flag (so that the session is considered good and will be kept 
in cache). SSL_shutdown() will then return with 0. If a unidirectional shutdown is 
enough (the underlying connection shall be closed anyway), this first call to 
SSL_shutdown() is sufficient. In order to complete the bidirectional shutdown 
handshake, SSL_shutdown() must be called again. The second call will make 
SSL_shutdown() wait for the peer's \*(N"close notify\*(T" shutdown alert. On success, 
the second call to SSL_shutdown() will return with 1." 4
! .Ip "If the peer already sent the \*(N"close notify\*(T" alert \fBand\fR it was 
already processed implicitly inside another function (SSL_read(3)), the 
\s-1SSL_RECEIVED_SHUTDOWN\s0 flag is set. SSL_shutdown() will send the \*(N"close 
notify\*(T" alert, set the \s-1SSL_SENT_SHUTDOWN\s0 flag and will immediately return 
with 1. Whether \s-1SSL_RECEIVED_SHUTDOWN\s0 is already set can be checked using the 
SSL_get_shutdown() (see also SSL_set_shutdown(3) call." 4
  .PP
  It is therefore recommended, to check the return value of \fISSL_shutdown()\fR
  and call \fISSL_shutdown()\fR again, if the bidirectional shutdown is not yet
--- 218,227 ----
  .PP
  \fISSL_shutdown()\fR supports both uni- and bidirectional shutdown by its 2 step
  behaviour.
! .Ip
! When the application is the first party to send the \*(L"close notify\*(R" alert, 
SSL_shutdown() will only send the alert and the set the \s-1SSL_SENT_SHUTDOWN\s0 flag 
(so that the session is considered good and will be kept in cache). SSL_shutdown() 
will then return with 0. If a unidirectional shutdown is enough (the underlying 
connection shall be closed anyway), this first call to SSL_shutdown() is sufficient. 
In order to complete the bidirectional shutdown handshake, SSL_shutdown() must be 
called again. The second call will make SSL_shutdown() wait for the peer's \*(L"close 
notify\*(R" shutdown alert. On success, the second call to SSL_shutdown() will return 
with 1.
! .Ip
! If the peer already sent the \*(L"close notify\*(R" alert \fBand\fR it was already 
processed implicitly inside another function (SSL_read(3)), the 
\s-1SSL_RECEIVED_SHUTDOWN\s0 flag is set. SSL_shutdown() will send the \*(L"close 
notify\*(R" alert, set the \s-1SSL_SENT_SHUTDOWN\s0 flag and will immediately return 
with 1. Whether \s-1SSL_RECEIVED_SHUTDOWN\s0 is already set can be checked using the 
SSL_get_shutdown() (see also SSL_set_shutdown(3) call."
  .PP
  It is therefore recommended, to check the return value of \fISSL_shutdown()\fR
  and call \fISSL_shutdown()\fR again, if the bidirectional shutdown is not yet

Reply via email to