diff options
author | schwarze <> | 2018-03-21 01:41:03 +0000 |
---|---|---|
committer | schwarze <> | 2018-03-21 01:41:03 +0000 |
commit | 0528e843c6ea8c94fad65a17c0e7c6dc18fc091c (patch) | |
tree | dfdec63dccd2e33157cc1baa85987593f0cc36b5 /src | |
parent | 314915a8a7d594e75c9886c821dc181948df8564 (diff) | |
download | openbsd-0528e843c6ea8c94fad65a17c0e7c6dc18fc091c.tar.gz openbsd-0528e843c6ea8c94fad65a17c0e7c6dc18fc091c.tar.bz2 openbsd-0528e843c6ea8c94fad65a17c0e7c6dc18fc091c.zip |
stack.h HISTORY up to SSLeay 0.8.1b; researched from OpenSSL git
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/man/OPENSSL_sk_new.3 | 34 |
1 files changed, 28 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/OPENSSL_sk_new.3 b/src/lib/libcrypto/man/OPENSSL_sk_new.3 index 5fe87b8fca..c8bbd5c1f8 100644 --- a/src/lib/libcrypto/man/OPENSSL_sk_new.3 +++ b/src/lib/libcrypto/man/OPENSSL_sk_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: OPENSSL_sk_new.3,v 1.1 2018/03/01 19:20:09 schwarze Exp $ | 1 | .\" $OpenBSD: OPENSSL_sk_new.3,v 1.2 2018/03/21 01:41:03 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2018 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2018 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: March 1 2018 $ | 17 | .Dd $Mdocdate: March 21 2018 $ |
18 | .Dt OPENSSL_SK_NEW 3 | 18 | .Dt OPENSSL_SK_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -203,7 +203,7 @@ on the other. | |||
203 | frees the given | 203 | frees the given |
204 | .Fa stack . | 204 | .Fa stack . |
205 | It does not free any of the pointers stored on the stack. | 205 | It does not free any of the pointers stored on the stack. |
206 | Unless these pointers are merely copies of pointers owner by | 206 | Unless these pointers are merely copies of pointers owned by |
207 | other objects, they must be freed before calling | 207 | other objects, they must be freed before calling |
208 | .Fn sk_free , | 208 | .Fn sk_free , |
209 | in order to avoid leaking memory. | 209 | in order to avoid leaking memory. |
@@ -397,9 +397,10 @@ pointer must not be | |||
397 | removes all pointers from the | 397 | removes all pointers from the |
398 | .Fa stack . | 398 | .Fa stack . |
399 | It does not free any of the pointers. | 399 | It does not free any of the pointers. |
400 | Unless these pointers are merely copies of pointers owner by other | 400 | Unless these pointers are merely copies of pointers owned by other |
401 | objects, they must be freed before calling sk_zero(), in order to | 401 | objects, they must be freed before calling |
402 | avoid leaking memory. | 402 | .Fn sk_zero , |
403 | in order to avoid leaking memory. | ||
403 | If | 404 | If |
404 | .Fa stack | 405 | .Fa stack |
405 | is a | 406 | is a |
@@ -523,6 +524,27 @@ returns | |||
523 | or | 524 | or |
524 | .Dv NULL | 525 | .Dv NULL |
525 | if it is not found. | 526 | if it is not found. |
527 | .Sh HISTORY | ||
528 | .Fn sk_new_null , | ||
529 | .Fn sk_new , | ||
530 | .Fn sk_set_cmp_func , | ||
531 | .Fn sk_dup , | ||
532 | .Fn sk_free , | ||
533 | .Fn sk_pop_free , | ||
534 | .Fn sk_num , | ||
535 | .Fn sk_value , | ||
536 | .Fn sk_find , | ||
537 | .Fn sk_push , | ||
538 | .Fn sk_unshift , | ||
539 | .Fn sk_insert , | ||
540 | .Fn sk_pop , | ||
541 | .Fn sk_shift , | ||
542 | .Fn sk_delete , | ||
543 | .Fn sk_delete_ptr , | ||
544 | and | ||
545 | .Fn sk_zero | ||
546 | appeared in SSLeay 0.8.1b or earlier and have been available since | ||
547 | .Ox 2.4 . | ||
526 | .Sh BUGS | 548 | .Sh BUGS |
527 | .Fn sk_set | 549 | .Fn sk_set |
528 | does not set the state of the | 550 | does not set the state of the |