mirror of https://github.com/openssl/openssl.git
Doc: replace `NULL` terminated with `NUL`
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Ben Kaduk <kaduk@mit.edu> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16885)
This commit is contained in:
parent
1e4cef5fde
commit
089df6f135
|
@ -22,10 +22,10 @@ PUNYCODE encoding introduced in RFCs 3490-3492 is widely used for
|
|||
representation of host names in ASCII-only format. Some specifications,
|
||||
such as RFC 8398, require comparison of host names encoded in UTF-8 charset.
|
||||
|
||||
ossl_a2ulabel() decodes NULL-terminated hostname from PUNYCODE to UTF-8,
|
||||
ossl_a2ulabel() decodes NUL-terminated hostname from PUNYCODE to UTF-8,
|
||||
using a provided buffer for output.
|
||||
|
||||
ossl_a2ucompare() accepts two NULL-terminated hostnames, decodes the 1st
|
||||
ossl_a2ucompare() accepts two NUL-terminated hostnames, decodes the 1st
|
||||
from PUNYCODE to UTF-8 and compares it with the 2nd one as is.
|
||||
|
||||
ossl_punycode_decode() decodes one label (one dot-separated part) from
|
||||
|
|
|
@ -94,7 +94,7 @@ BN_bin2bn() returns the B<BIGNUM>, NULL on error.
|
|||
BN_bn2binpad() returns the number of bytes written or -1 if the supplied
|
||||
buffer is too small.
|
||||
|
||||
BN_bn2hex() and BN_bn2dec() return a null-terminated string, or NULL
|
||||
BN_bn2hex() and BN_bn2dec() return a NUL-terminated string, or NULL
|
||||
on error. BN_hex2bn() and BN_dec2bn() return the number of characters
|
||||
used in parsing, or 0 on error, in which
|
||||
case no new B<BIGNUM> will be created.
|
||||
|
|
|
@ -31,7 +31,7 @@ beforehand in order to set the validation status of an SCT first.
|
|||
|
||||
=head1 RETURN VALUES
|
||||
|
||||
SCT_validation_status_string() returns a null-terminated string representing
|
||||
SCT_validation_status_string() returns a NUL-terminated string representing
|
||||
the validation status of an B<SCT> object.
|
||||
|
||||
=head1 SEE ALSO
|
||||
|
|
|
@ -157,7 +157,7 @@ Some examples for the output of SSL_CIPHER_description():
|
|||
|
||||
SSL_CIPHER_get_name(), SSL_CIPHER_standard_name(), OPENSSL_cipher_name(),
|
||||
SSL_CIPHER_get_version() and SSL_CIPHER_description() return the corresponding
|
||||
value in a null-terminated string for a specific cipher or "(NONE)"
|
||||
value in a NUL-terminated string for a specific cipher or "(NONE)"
|
||||
if the cipher is not found.
|
||||
|
||||
SSL_CIPHER_get_bits() returns a positive integer representing the number of
|
||||
|
|
|
@ -29,7 +29,7 @@ The key logging callback is called with two items: the B<ssl> object associated
|
|||
with the connection, and B<line>, a string containing the key material in the
|
||||
format used by NSS for its B<SSLKEYLOGFILE> debugging output. To recreate that
|
||||
file, the key logging callback should log B<line>, followed by a newline.
|
||||
B<line> will always be a NULL-terminated string.
|
||||
B<line> will always be a NUL-terminated string.
|
||||
|
||||
=head1 RETURN VALUES
|
||||
|
||||
|
|
|
@ -20,7 +20,7 @@ or SSL_get_shared_group().
|
|||
=head1 RETURN VALUES
|
||||
|
||||
If non-NULL, SSL_group_to_name() returns the TLS group name
|
||||
corresponding to the given I<id> as a NULL-terminated string.
|
||||
corresponding to the given I<id> as a NUL-terminated string.
|
||||
If SSL_group_to_name() returns NULL, an error occurred; possibly no
|
||||
corresponding tlsname was registered during provider initialisation.
|
||||
|
||||
|
|
Loading…
Reference in New Issue