Docbook validation fixes

git-svn-id: https://www.opensc-project.org/svnp/opensc/trunk@2203 c6295689-39f2-0310-b995-f0e70906c6a9
This commit is contained in:
bert 2005-02-25 23:56:11 +00:00
parent 6f1f3f6894
commit d8eff12521
3 changed files with 13 additions and 13 deletions

View File

@ -28,7 +28,7 @@ int sc_asn1_decode(struct sc_context *ctx, struct sc_asn1_entry *asn1,
<para>
This function extracts information from the ASN.1 stream pointed to by <emphasis>inbuf</emphasis>
(which is <emphasis>len</emphasis> bytes in size) and stores it into the array of
<structname><link linkend="scasn1">struct sc_asn_1</link></structname> entries pointed to by
<link linkend="scasn1entry"><structname>struct sc_asn_1</structname></link> entries pointed to by
<emphasis>asn1</emphasis>. The array must be big enough to contain all the entries that will be
found, or an error will be flagged. The last entry in the array must be a NULL entry, i.e. the
<structfield>name</structfield> field must be set to NULL.
@ -40,16 +40,16 @@ int sc_asn1_decode(struct sc_context *ctx, struct sc_asn1_entry *asn1,
<structfield>type</structfield>, <structfield>tag</structfield> and
<structfield>flags</structfield> fields must be filled in.
</para>
</refsect1>
<para>
The function will then scan the stream and fill in the remaining fields.
<emphasis>newbuf</emphasis> will point to the byte immediately following the extracted record, and
<emphasis>len_left</emphasis> will contain the number of bytes left in the buffer. Thus, the
<emphasis>newbuf</emphasis> and <emphasis>len_left</emphasis> fields may be passed in to
sc_asn1_decode() again, as the <emphasis>inbuf</emphasis> and <emphasis>len</emphasis> parameters,
until <emphasis>len</emphasis> reaches 0.
</para>
<para>
The function will then scan the stream and fill in the remaining fields.
<emphasis>newbuf</emphasis> will point to the byte immediately following the extracted record, and
<emphasis>len_left</emphasis> will contain the number of bytes left in the buffer. Thus, the
<emphasis>newbuf</emphasis> and <emphasis>len_left</emphasis> fields may be passed in to
sc_asn1_decode() again, as the <emphasis>inbuf</emphasis> and <emphasis>len</emphasis> parameters,
until <emphasis>len</emphasis> reaches 0.
</para>
</refsect1>
<refsect1>
<title>Return value</title>

View File

@ -24,8 +24,8 @@ void sc_copy_asn1_entry(const struct sc_asn1_entry *src, struct sc_asn1_entry *d
<refsect1>
<title>Description</title>
<para>
This function copies an array of <structname><link linkend="scasn1">struct
sc_asn1_entry</link></structname> entries pointed to be <emphasis>src</emphasis> to
This function copies an array of <link linkend="scasn1entry"><structname>struct
sc_asn1_entry</structname></link> entries pointed to be <emphasis>src</emphasis> to
<emphasis>dest</emphasis>. The array must be NULL-terminated (that is, the last entry must have
its <structfield>name</structfield> field set to NULL). There must be enough space available in
<emphasis>dest</emphasis>.

View File

@ -25,7 +25,7 @@ void sc_format_asn1_entry(struct sc_asn1_entry *entry, void *parm, void *arg, in
<title>Description</title>
<para>
This function stores the <emphasis>parm</emphasis> and <emphasis>arg</emphasis> pointers in the
<structname><link linkend="scasn1">struct sc_asn1_entry</link></structname>
<link linkend="scasn1entry"><structname>struct sc_asn1_entry</structname></link>
<emphasis>entry</emphasis>. No checking is done. Since the pointers are copied directly, the
storage they point to must not be freed by the calling application until the entry itself is
destroyed.