提交 c9a8abcf 编写于 作者: G Guanqun Lu 提交者: Junio C Hamano

fix typo in Documentation

Signed-off-by: NGuanqun Lu <guanqun.lu@gmail.com>
Signed-off-by: NJunio C Hamano <gitster@pobox.com>
上级 e1e43898
......@@ -21,7 +21,7 @@ allocated memory or not), use `strbuf_detach()` to unwrap a memory
buffer from its strbuf shell in a safe way. That is the sole supported
way. This will give you a malloced buffer that you can later `free()`.
+
However, it it totally safe to modify anything in the string pointed by
However, it is totally safe to modify anything in the string pointed by
the `buf` member, between the indices `0` and `len-1` (inclusive).
. The `buf` member is a byte array that has at least `len + 1` bytes
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册