Loading doc/crypto/BN_bn2bin.pod +1 −1 Original line number Diff line number Diff line Loading @@ -36,7 +36,7 @@ NULL, a new B<BIGNUM> is created. BN_bn2hex() and BN_bn2dec() return printable strings containing the hexadecimal and decimal encoding of B<a> respectively. For negative numbers, the string is prefaced with a leading '-'. The string must be Free()d later. freed later using OPENSSL_free(). BN_hex2bn() converts the string B<str> containing a hexadecimal number to a B<BIGNUM> and stores it in **B<bn>. If *B<bn> is NULL, a new Loading doc/crypto/ERR_get_error.pod +1 −1 Original line number Diff line number Diff line Loading @@ -41,7 +41,7 @@ the error occurred in *B<file> and *B<line>, unless these are B<NULL>. ERR_get_error_line_data() and ERR_peek_error_line_data() store additional data and flags associated with the error code in *B<data> and *B<flags>, unless these are B<NULL>. *B<data> contains a string if *B<flags>&B<ERR_TXT_STRING>. If it has been allocated by Malloc(), if *B<flags>&B<ERR_TXT_STRING>. If it has been allocated by OPENSSL_malloc(), *B<flags>&B<ERR_TXT_MALLOCED> is true. =head1 RETURN VALUES Loading doc/crypto/buffer.pod +2 −2 Original line number Diff line number Diff line Loading @@ -46,11 +46,11 @@ size. BUF_strdup() copies a null terminated string into a block of allocated memory and returns a pointer to the allocated block. Unlike the standard C library strdup() this function uses Malloc() and so Unlike the standard C library strdup() this function uses OPENSSL_malloc() and so should be used in preference to the standard library strdup() because it can be used for memory leak checking or replacing the malloc() function. The memory allocated from BUF_strdup() should be freed up using the Free() The memory allocated from BUF_strdup() should be freed up using the OPENSSL_free() function. =head1 RETURN VALUES Loading doc/crypto/lhash.pod +1 −1 Original line number Diff line number Diff line Loading @@ -102,7 +102,7 @@ The following description is based on the SSLeay documentation: The B<lhash> library implements a hash table described in the I<Communications of the ACM> in 1991. What makes this hash table different is that as the table fills, the hash table is increased (or decreased) in size via Realloc(). When a 'resize' is done, instead of decreased) in size via OPENSSL_realloc(). When a 'resize' is done, instead of all hashes being redistributed over twice as many 'buckets', one bucket is split. So when an 'expand' is done, there is only a minimal cost to redistribute some values. Subsequent inserts will cause more Loading Loading
doc/crypto/BN_bn2bin.pod +1 −1 Original line number Diff line number Diff line Loading @@ -36,7 +36,7 @@ NULL, a new B<BIGNUM> is created. BN_bn2hex() and BN_bn2dec() return printable strings containing the hexadecimal and decimal encoding of B<a> respectively. For negative numbers, the string is prefaced with a leading '-'. The string must be Free()d later. freed later using OPENSSL_free(). BN_hex2bn() converts the string B<str> containing a hexadecimal number to a B<BIGNUM> and stores it in **B<bn>. If *B<bn> is NULL, a new Loading
doc/crypto/ERR_get_error.pod +1 −1 Original line number Diff line number Diff line Loading @@ -41,7 +41,7 @@ the error occurred in *B<file> and *B<line>, unless these are B<NULL>. ERR_get_error_line_data() and ERR_peek_error_line_data() store additional data and flags associated with the error code in *B<data> and *B<flags>, unless these are B<NULL>. *B<data> contains a string if *B<flags>&B<ERR_TXT_STRING>. If it has been allocated by Malloc(), if *B<flags>&B<ERR_TXT_STRING>. If it has been allocated by OPENSSL_malloc(), *B<flags>&B<ERR_TXT_MALLOCED> is true. =head1 RETURN VALUES Loading
doc/crypto/buffer.pod +2 −2 Original line number Diff line number Diff line Loading @@ -46,11 +46,11 @@ size. BUF_strdup() copies a null terminated string into a block of allocated memory and returns a pointer to the allocated block. Unlike the standard C library strdup() this function uses Malloc() and so Unlike the standard C library strdup() this function uses OPENSSL_malloc() and so should be used in preference to the standard library strdup() because it can be used for memory leak checking or replacing the malloc() function. The memory allocated from BUF_strdup() should be freed up using the Free() The memory allocated from BUF_strdup() should be freed up using the OPENSSL_free() function. =head1 RETURN VALUES Loading
doc/crypto/lhash.pod +1 −1 Original line number Diff line number Diff line Loading @@ -102,7 +102,7 @@ The following description is based on the SSLeay documentation: The B<lhash> library implements a hash table described in the I<Communications of the ACM> in 1991. What makes this hash table different is that as the table fills, the hash table is increased (or decreased) in size via Realloc(). When a 'resize' is done, instead of decreased) in size via OPENSSL_realloc(). When a 'resize' is done, instead of all hashes being redistributed over twice as many 'buckets', one bucket is split. So when an 'expand' is done, there is only a minimal cost to redistribute some values. Subsequent inserts will cause more Loading