From fe1ce55be7ab2b07718a810dc728e69a7e426c81 Mon Sep 17 00:00:00 2001 From: chris Date: Sat, 5 Jan 2002 20:36:47 +0000 Subject: Include a section cross-reference to `EXAMPLES' in `SECURITY CONSIDERATIONS' as a source for relevant sample code. Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs --- lib/libc/string/strcpy.3 | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) (limited to 'lib/libc/string') diff --git a/lib/libc/string/strcpy.3 b/lib/libc/string/strcpy.3 index f74f8b8..bb1d948 100644 --- a/lib/libc/string/strcpy.3 +++ b/lib/libc/string/strcpy.3 @@ -156,7 +156,9 @@ function is easily misused in a manner which enables malicious users to arbitrarily change a running program's functionality through a buffer overflow attack. (See -the FSA.) +the FSA +and +.Sx EXAMPLES . ) .Sh SEE ALSO .Xr bcopy 3 , .Xr memccpy 3 , -- cgit v1.1