summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorschwarze <>2018-03-21 01:41:03 +0000
committerschwarze <>2018-03-21 01:41:03 +0000
commit0528e843c6ea8c94fad65a17c0e7c6dc18fc091c (patch)
treedfdec63dccd2e33157cc1baa85987593f0cc36b5 /src
parent314915a8a7d594e75c9886c821dc181948df8564 (diff)
downloadopenbsd-0528e843c6ea8c94fad65a17c0e7c6dc18fc091c.tar.gz
openbsd-0528e843c6ea8c94fad65a17c0e7c6dc18fc091c.tar.bz2
openbsd-0528e843c6ea8c94fad65a17c0e7c6dc18fc091c.zip
stack.h HISTORY up to SSLeay 0.8.1b; researched from OpenSSL git
Diffstat (limited to 'src')
-rw-r--r--src/lib/libcrypto/man/OPENSSL_sk_new.334
1 files changed, 28 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/OPENSSL_sk_new.3 b/src/lib/libcrypto/man/OPENSSL_sk_new.3
index 5fe87b8fca..c8bbd5c1f8 100644
--- a/src/lib/libcrypto/man/OPENSSL_sk_new.3
+++ b/src/lib/libcrypto/man/OPENSSL_sk_new.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: OPENSSL_sk_new.3,v 1.1 2018/03/01 19:20:09 schwarze Exp $ 1.\" $OpenBSD: OPENSSL_sk_new.3,v 1.2 2018/03/21 01:41:03 schwarze Exp $
2.\" 2.\"
3.\" Copyright (c) 2018 Ingo Schwarze <schwarze@openbsd.org> 3.\" Copyright (c) 2018 Ingo Schwarze <schwarze@openbsd.org>
4.\" 4.\"
@@ -14,7 +14,7 @@
14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16.\" 16.\"
17.Dd $Mdocdate: March 1 2018 $ 17.Dd $Mdocdate: March 21 2018 $
18.Dt OPENSSL_SK_NEW 3 18.Dt OPENSSL_SK_NEW 3
19.Os 19.Os
20.Sh NAME 20.Sh NAME
@@ -203,7 +203,7 @@ on the other.
203frees the given 203frees the given
204.Fa stack . 204.Fa stack .
205It does not free any of the pointers stored on the stack. 205It does not free any of the pointers stored on the stack.
206Unless these pointers are merely copies of pointers owner by 206Unless these pointers are merely copies of pointers owned by
207other objects, they must be freed before calling 207other objects, they must be freed before calling
208.Fn sk_free , 208.Fn sk_free ,
209in order to avoid leaking memory. 209in order to avoid leaking memory.
@@ -397,9 +397,10 @@ pointer must not be
397removes all pointers from the 397removes all pointers from the
398.Fa stack . 398.Fa stack .
399It does not free any of the pointers. 399It does not free any of the pointers.
400Unless these pointers are merely copies of pointers owner by other 400Unless these pointers are merely copies of pointers owned by other
401objects, they must be freed before calling sk_zero(), in order to 401objects, they must be freed before calling
402avoid leaking memory. 402.Fn sk_zero ,
403in order to avoid leaking memory.
403If 404If
404.Fa stack 405.Fa stack
405is a 406is a
@@ -523,6 +524,27 @@ returns
523or 524or
524.Dv NULL 525.Dv NULL
525if it is not found. 526if it is not found.
527.Sh HISTORY
528.Fn sk_new_null ,
529.Fn sk_new ,
530.Fn sk_set_cmp_func ,
531.Fn sk_dup ,
532.Fn sk_free ,
533.Fn sk_pop_free ,
534.Fn sk_num ,
535.Fn sk_value ,
536.Fn sk_find ,
537.Fn sk_push ,
538.Fn sk_unshift ,
539.Fn sk_insert ,
540.Fn sk_pop ,
541.Fn sk_shift ,
542.Fn sk_delete ,
543.Fn sk_delete_ptr ,
544and
545.Fn sk_zero
546appeared in SSLeay 0.8.1b or earlier and have been available since
547.Ox 2.4 .
526.Sh BUGS 548.Sh BUGS
527.Fn sk_set 549.Fn sk_set
528does not set the state of the 550does not set the state of the