From d9a38e859dfe30a112c421dc7b32821370efd805 Mon Sep 17 00:00:00 2001 From: Hubert Kario Date: Fri, 29 Sep 2017 15:40:43 +0200 Subject: [PATCH] doc: note that the BN_new() initialises the BIGNUM BN_new() and BN_secure_new() not only allocate memory, but also initialise it to deterministic value - 0. Document that behaviour to make it explicit backport from #4438 Reviewed-by: Richard Levitte Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/4443) --- doc/crypto/BN_new.pod | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/doc/crypto/BN_new.pod b/doc/crypto/BN_new.pod index 413a1ea842..d446603191 100644 --- a/doc/crypto/BN_new.pod +++ b/doc/crypto/BN_new.pod @@ -34,7 +34,8 @@ If B is NULL, nothing is done. =head1 RETURN VALUES -BN_new() returns a pointer to the B. If the allocation fails, +BN_new() returns a pointer to the B initialised to the value 0. +If the allocation fails, it returns B and sets an error code that can be obtained by L. -- 2.25.1