From 8bd1cfa5a060d50f15c99753917e33945e8b4bd7 Mon Sep 17 00:00:00 2001 From: Anas Nashif Date: Sun, 21 Feb 2016 07:54:30 -0500 Subject: [PATCH] docs: fixed crypto headline and bullet indentation Change-Id: I65449b80e95430e303bbcc32baf161f95f5db512 Signed-off-by: Anas Nashif --- doc/crypto/crypto.rst | 9 ++++----- doc/crypto/tinycrypt.rst | 14 +++++++------- 2 files changed, 11 insertions(+), 12 deletions(-) diff --git a/doc/crypto/crypto.rst b/doc/crypto/crypto.rst index a53aaa8d43f..77d77382d27 100644 --- a/doc/crypto/crypto.rst +++ b/doc/crypto/crypto.rst @@ -1,10 +1,9 @@ Cryptography -########### +############ -The crypto section contains information regarding the cryptographic -primitives supported by the Zephyr kernel. Use the information to -understand the principles behind the operation of the different -algorithms and how they were implemented. +The crypto section contains information regarding the cryptographic primitives +supported by the Zephyr kernel. Use the information to understand the principles +behind the operation of the different algorithms and how they were implemented. The following crypto libraries have been included: diff --git a/doc/crypto/tinycrypt.rst b/doc/crypto/tinycrypt.rst index cb2d7847657..96b79e6f44c 100644 --- a/doc/crypto/tinycrypt.rst +++ b/doc/crypto/tinycrypt.rst @@ -81,15 +81,15 @@ Design Goals ************ * Minimize the code size of each cryptographic primitive. This means minimize - the size of a platform-independent implementation, as presented in TinyCrypt. - Note that various applications may require further features, optimizations with - respect to other metrics and countermeasures for particular threats. These - peculiarities would increase the code size and thus are not considered here. + the size of a platform-independent implementation, as presented in TinyCrypt. + Note that various applications may require further features, optimizations with + respect to other metrics and countermeasures for particular threats. These + peculiarities would increase the code size and thus are not considered here. * Minimize the dependencies among the cryptographic primitives. This means - that it is unnecessary to build and allocate object code for more primitives - than the ones strictly required by the intended application. In other words, - one can select and compile only the primitives required by the application. + that it is unnecessary to build and allocate object code for more primitives + than the ones strictly required by the intended application. In other words, + one can select and compile only the primitives required by the application. Important Remarks