2000-01-30 22:16:47 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
BUF_MEM_new, BUF_MEM_new_ex, BUF_MEM_free, BUF_MEM_grow - simple
|
|
|
|
character array structure
|
|
|
|
|
|
|
|
BUF_strdup, BUF_strndup, BUF_memdup, BUF_strlcpy, BUF_strlcat -
|
|
|
|
standard C library equivalents
|
2000-01-30 22:16:47 +00:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/buffer.h>
|
|
|
|
|
|
|
|
BUF_MEM *BUF_MEM_new(void);
|
|
|
|
|
2015-04-24 20:39:40 +00:00
|
|
|
#define BUF_MEM_FLAG_SECURE
|
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
BUF_MEM *BUF_MEM_new_ex(unsigned long flags);
|
2015-04-24 20:39:40 +00:00
|
|
|
|
2000-01-30 22:16:47 +00:00
|
|
|
void BUF_MEM_free(BUF_MEM *a);
|
|
|
|
|
|
|
|
int BUF_MEM_grow(BUF_MEM *str, int len);
|
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
char *BUF_strdup(const char *str);
|
2000-01-30 22:16:47 +00:00
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
char *BUF_strndup(const char *str, size_t siz);
|
2000-01-30 22:16:47 +00:00
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
void *BUF_memdup(const void *data, size_t siz);
|
2000-01-30 22:16:47 +00:00
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
size_t BUF_strlcpy(char *dst, const char *src, size_t size);
|
2000-01-30 22:16:47 +00:00
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
size_t BUF_strlcat(char *dst, const char *src, size_t size);
|
2000-01-30 22:16:47 +00:00
|
|
|
|
2015-09-17 11:55:09 +00:00
|
|
|
size_t BUF_strnlen(const char *str, size_t maxlen);
|
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
The buffer library handles simple character arrays. Buffers are used for
|
|
|
|
various purposes in the library, most notably memory BIOs.
|
2000-01-30 22:16:47 +00:00
|
|
|
|
|
|
|
BUF_MEM_new() allocates a new buffer of zero size.
|
|
|
|
|
2015-04-24 20:39:40 +00:00
|
|
|
BUF_MEM_new_ex() allocates a buffer with the specified flags.
|
|
|
|
The flag B<BUF_MEM_FLAG_SECURE> specifies that the B<data> pointer
|
|
|
|
should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>.
|
|
|
|
|
2000-01-30 22:16:47 +00:00
|
|
|
BUF_MEM_free() frees up an already existing buffer. The data is zeroed
|
|
|
|
before freeing up in case the buffer contains sensitive data.
|
|
|
|
|
|
|
|
BUF_MEM_grow() changes the size of an already existing buffer to
|
|
|
|
B<len>. Any data already in the buffer is preserved if it increases in
|
|
|
|
size.
|
|
|
|
|
2015-09-17 11:55:09 +00:00
|
|
|
BUF_strdup(), BUF_strndup(), BUF_memdup(), BUF_strlcpy(),
|
|
|
|
BUF_strlcat() and BUF_strnlen are equivalents of the standard C
|
|
|
|
library functions. The dup() functions use OPENSSL_malloc() underneath
|
|
|
|
and so should be used in preference to the standard library for memory
|
|
|
|
leak checking or replacing the malloc() function.
|
2015-09-17 11:50:34 +00:00
|
|
|
|
|
|
|
Memory allocated from these functions should be freed up using the
|
|
|
|
OPENSSL_free() function.
|
2000-01-30 22:16:47 +00:00
|
|
|
|
2015-09-17 11:50:34 +00:00
|
|
|
BUF_strndup makes the explicit guarantee that it will never read past
|
|
|
|
the first B<siz> bytes of B<str>.
|
2000-01-30 22:16:47 +00:00
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
BUF_MEM_new() returns the buffer or NULL on error.
|
|
|
|
|
|
|
|
BUF_MEM_free() has no return value.
|
|
|
|
|
|
|
|
BUF_MEM_grow() returns zero on error or the new size (i.e. B<len>).
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-17 19:21:33 +00:00
|
|
|
L<bio(3)>,
|
2015-04-24 20:39:40 +00:00
|
|
|
L<CRYPTO_secure_malloc(3)>.
|
2000-01-30 22:16:47 +00:00
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
2015-10-27 17:40:11 +00:00
|
|
|
BUF_MEM_new_ex() was added in OpenSSL 1.1.0.
|
2015-04-24 20:39:40 +00:00
|
|
|
|
2000-01-30 22:16:47 +00:00
|
|
|
=cut
|