diff options
author | uqs <uqs@FreeBSD.org> | 2010-05-13 12:07:55 +0000 |
---|---|---|
committer | uqs <uqs@FreeBSD.org> | 2010-05-13 12:07:55 +0000 |
commit | 1ab3783e1a2e5231321a0fc5399736ddc70407f0 (patch) | |
tree | c699822393a0ad4134098c013ca4b4ea4e2f3108 /lib/libc/string | |
parent | 43b7e87f4317ace45532f012cea993a4d9d418f0 (diff) | |
download | FreeBSD-src-1ab3783e1a2e5231321a0fc5399736ddc70407f0.zip FreeBSD-src-1ab3783e1a2e5231321a0fc5399736ddc70407f0.tar.gz |
mdoc: move CAVEATS, BUGS and SECURITY CONSIDERATIONS sections to the
bottom of the manpages and order them consistently.
GNU groff doesn't care about the ordering, and doesn't even mention
CAVEATS and SECURITY CONSIDERATIONS as common sections and where to put
them.
Found by: mdocml lint run
Reviewed by: ru
Diffstat (limited to 'lib/libc/string')
-rw-r--r-- | lib/libc/string/strcat.3 | 34 | ||||
-rw-r--r-- | lib/libc/string/strcpy.3 | 20 |
2 files changed, 27 insertions, 27 deletions
diff --git a/lib/libc/string/strcat.3 b/lib/libc/string/strcat.3 index 4c9fec9..dfa55a4 100644 --- a/lib/libc/string/strcat.3 +++ b/lib/libc/string/strcat.3 @@ -80,6 +80,23 @@ and functions return the pointer .Fa s . +.Sh SEE ALSO +.Xr bcopy 3 , +.Xr memccpy 3 , +.Xr memcpy 3 , +.Xr memmove 3 , +.Xr strcpy 3 , +.Xr strlcat 3 , +.Xr strlcpy 3 , +.Xr wcscat 3 +.Sh STANDARDS +The +.Fn strcat +and +.Fn strncat +functions +conform to +.St -isoC . .Sh SECURITY CONSIDERATIONS The .Fn strcat @@ -138,20 +155,3 @@ foo(const char *arbitrary_string) #endif } .Ed -.Sh SEE ALSO -.Xr bcopy 3 , -.Xr memccpy 3 , -.Xr memcpy 3 , -.Xr memmove 3 , -.Xr strcpy 3 , -.Xr strlcat 3 , -.Xr strlcpy 3 , -.Xr wcscat 3 -.Sh STANDARDS -The -.Fn strcat -and -.Fn strncat -functions -conform to -.St -isoC . diff --git a/lib/libc/string/strcpy.3 b/lib/libc/string/strcpy.3 index 157abcc..395e2f9 100644 --- a/lib/libc/string/strcpy.3 +++ b/lib/libc/string/strcpy.3 @@ -174,16 +174,6 @@ Note that because .Xr strlcpy 3 is not defined in any standards, it should only be used when portability is not a concern. -.Sh SECURITY CONSIDERATIONS -The -.Fn strcpy -function is easily misused in a manner which enables malicious users -to arbitrarily change a running program's functionality through a -buffer overflow attack. -(See -the FSA -and -.Sx EXAMPLES . ) .Sh SEE ALSO .Xr bcopy 3 , .Xr memccpy 3 , @@ -214,3 +204,13 @@ and .Fn stpncpy was added in .Fx 8.0 . +.Sh SECURITY CONSIDERATIONS +The +.Fn strcpy +function is easily misused in a manner which enables malicious users +to arbitrarily change a running program's functionality through a +buffer overflow attack. +(See +the FSA +and +.Sx EXAMPLES . ) |