From: Emilia Kasper Date: Thu, 17 Sep 2015 11:55:09 +0000 (+0200) Subject: Document BUF_strnlen X-Git-Tag: OpenSSL_1_1_0-pre1~542 X-Git-Url: https://git.openssl.org/?p=openssl.git;a=commitdiff_plain;h=21b0fa91186ff1c1c3d956c0593ef4ac02521695 Document BUF_strnlen Reviewed-by: Matt Caswell --- diff --git a/doc/crypto/buffer.pod b/doc/crypto/buffer.pod index d4cb8a8cbd..d43518a49a 100644 --- a/doc/crypto/buffer.pod +++ b/doc/crypto/buffer.pod @@ -32,6 +32,8 @@ standard C library equivalents size_t BUF_strlcat(char *dst, const char *src, size_t size); + size_t BUF_strnlen(const char *str, size_t maxlen); + =head1 DESCRIPTION The buffer library handles simple character arrays. Buffers are used for @@ -50,11 +52,11 @@ BUF_MEM_grow() changes the size of an already existing buffer to B. Any data already in the buffer is preserved if it increases in size. -BUF_strdup(), BUF_strndup(), BUF_memdup(), BUF_strlcpy() and -BUF_strlcat() are equivalents of the standard C library functions. The -dup() functions use OPENSSL_malloc() underneath and so should be used -in preference to the standard library for memory leak checking or -replacing the malloc() function. +BUF_strdup(), BUF_strndup(), BUF_memdup(), BUF_strlcpy(), +BUF_strlcat() and BUF_strnlen are equivalents of the standard C +library functions. The dup() functions use OPENSSL_malloc() underneath +and so should be used in preference to the standard library for memory +leak checking or replacing the malloc() function. Memory allocated from these functions should be freed up using the OPENSSL_free() function.