2000-01-31 06:16:47 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2000-02-24 19:55:57 +08:00
|
|
|
BUF_MEM_new, BUF_MEM_free, BUF_MEM_grow, BUF_strdup - simple
|
2000-01-31 06:16:47 +08:00
|
|
|
character arrays structure
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/buffer.h>
|
|
|
|
|
|
|
|
BUF_MEM *BUF_MEM_new(void);
|
|
|
|
|
2015-04-25 04:39:40 +08:00
|
|
|
#define BUF_MEM_FLAG_SECURE
|
|
|
|
|
|
|
|
BUF_MEM * BUF_MEM_new_ex(unsigned long flags);
|
|
|
|
|
2000-01-31 06:16:47 +08:00
|
|
|
void BUF_MEM_free(BUF_MEM *a);
|
|
|
|
|
|
|
|
int BUF_MEM_grow(BUF_MEM *str, int len);
|
|
|
|
|
|
|
|
char * BUF_strdup(const char *str);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
The buffer library handles simple character arrays. Buffers are used for
|
|
|
|
various purposes in the library, most notably memory BIOs.
|
|
|
|
|
|
|
|
The library uses the BUF_MEM structure defined in buffer.h:
|
|
|
|
|
|
|
|
typedef struct buf_mem_st
|
|
|
|
{
|
|
|
|
int length; /* current number of bytes */
|
|
|
|
char *data;
|
|
|
|
int max; /* size of buffer */
|
|
|
|
} BUF_MEM;
|
|
|
|
|
|
|
|
B<length> is the current size of the buffer in bytes, B<max> is the amount of
|
|
|
|
memory allocated to the buffer. There are three functions which handle these
|
|
|
|
and one "miscellaneous" function.
|
|
|
|
|
|
|
|
BUF_MEM_new() allocates a new buffer of zero size.
|
|
|
|
|
2015-04-25 04:39:40 +08:00
|
|
|
BUF_MEM_new_ex() allocates a buffer with the specified flags.
|
|
|
|
The flag B<BUF_MEM_FLAG_SECURE> specifies that the B<data> pointer
|
|
|
|
should be allocated on the secure heap; see L<CRYPTO_secure_malloc(3)>.
|
|
|
|
|
2000-01-31 06:16:47 +08:00
|
|
|
BUF_MEM_free() frees up an already existing buffer. The data is zeroed
|
|
|
|
before freeing up in case the buffer contains sensitive data.
|
|
|
|
|
|
|
|
BUF_MEM_grow() changes the size of an already existing buffer to
|
|
|
|
B<len>. Any data already in the buffer is preserved if it increases in
|
|
|
|
size.
|
|
|
|
|
|
|
|
BUF_strdup() copies a null terminated string into a block of allocated
|
|
|
|
memory and returns a pointer to the allocated block.
|
2000-09-20 11:28:54 +08:00
|
|
|
Unlike the standard C library strdup() this function uses OPENSSL_malloc() and so
|
2000-01-31 06:16:47 +08:00
|
|
|
should be used in preference to the standard library strdup() because it can
|
|
|
|
be used for memory leak checking or replacing the malloc() function.
|
|
|
|
|
2000-09-20 11:28:54 +08:00
|
|
|
The memory allocated from BUF_strdup() should be freed up using the OPENSSL_free()
|
2000-01-31 06:16:47 +08:00
|
|
|
function.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
BUF_MEM_new() returns the buffer or NULL on error.
|
|
|
|
|
|
|
|
BUF_MEM_free() has no return value.
|
|
|
|
|
|
|
|
BUF_MEM_grow() returns zero on error or the new size (i.e. B<len>).
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-18 03:21:33 +08:00
|
|
|
L<bio(3)>,
|
2015-04-25 04:39:40 +08:00
|
|
|
L<CRYPTO_secure_malloc(3)>.
|
2000-01-31 06:16:47 +08:00
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
BUF_MEM_new(), BUF_MEM_free() and BUF_MEM_grow() are available in all
|
2000-09-20 11:24:36 +08:00
|
|
|
versions of SSLeay and OpenSSL. BUF_strdup() was added in SSLeay 0.8.
|
2000-01-31 06:16:47 +08:00
|
|
|
|
2015-04-25 04:39:40 +08:00
|
|
|
BUF_MEM_new_ex() was contributed to OpenSSL by Akamai Technologies
|
|
|
|
in May, 2014.
|
|
|
|
|
2000-01-31 06:16:47 +08:00
|
|
|
=cut
|