The branch master has been updated via 681acb311bb7c68c9310d2e96bf2cf0e35443a22 (commit) from af3e5e1bda6fa59b5637ca31c0c80a17b29a3787 (commit)
- Log ----------------------------------------------------------------- commit 681acb311bb7c68c9310d2e96bf2cf0e35443a22 Author: Hubert Kario <hka...@redhat.com> Date: Fri Sep 29 13:10:34 2017 +0200 doc: note that the BN_new() initialises the BIGNUM BN_new() and BN_secure_new() not only allocate memory, but also initialise it to deterministic value - 0. Document that behaviour to make it explicit Reviewed-by: Richard Levitte <levi...@openssl.org> Reviewed-by: Rich Salz <rs...@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4438) ----------------------------------------------------------------------- Summary of changes: doc/man3/BN_new.pod | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/doc/man3/BN_new.pod b/doc/man3/BN_new.pod index 36bd00d..08aae5e 100644 --- a/doc/man3/BN_new.pod +++ b/doc/man3/BN_new.pod @@ -36,7 +36,8 @@ If B<a> is NULL, nothing is done. =head1 RETURN VALUES BN_new() and BN_secure_new() -return a pointer to the B<BIGNUM>. If the allocation fails, +return a pointer to the B<BIGNUM> initialised to the value 0. +If the allocation fails, they return B<NULL> and set an error code that can be obtained by L<ERR_get_error(3)>. _____ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits