1 | /* $NetBSD: string.h,v 1.13 2014/11/29 13:23:48 pooka Exp $ */ |
---|
2 | |
---|
3 | /*- |
---|
4 | * Copyright (c) 2006 The NetBSD Foundation, Inc. |
---|
5 | * All rights reserved. |
---|
6 | * |
---|
7 | * This code is derived from software contributed to The NetBSD Foundation |
---|
8 | * by Christos Zoulas. |
---|
9 | * |
---|
10 | * Redistribution and use in source and binary forms, with or without |
---|
11 | * modification, are permitted provided that the following conditions |
---|
12 | * are met: |
---|
13 | * 1. Redistributions of source code must retain the above copyright |
---|
14 | * notice, this list of conditions and the following disclaimer. |
---|
15 | * 2. Redistributions in binary form must reproduce the above copyright |
---|
16 | * notice, this list of conditions and the following disclaimer in the |
---|
17 | * documentation and/or other materials provided with the distribution. |
---|
18 | * |
---|
19 | * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS |
---|
20 | * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED |
---|
21 | * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
---|
22 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS |
---|
23 | * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
---|
24 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
---|
25 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
---|
26 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
---|
27 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
---|
28 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
---|
29 | * POSSIBILITY OF SUCH DAMAGE. |
---|
30 | */ |
---|
31 | #ifndef _SSP_STRING_H_ |
---|
32 | #define _SSP_STRING_H_ |
---|
33 | |
---|
34 | #include <sys/cdefs.h> |
---|
35 | #include <ssp/ssp.h> |
---|
36 | |
---|
37 | __BEGIN_DECLS |
---|
38 | void *__memcpy_chk(void *, const void *, size_t, size_t); |
---|
39 | void *__memmove_chk(void *, void *, size_t, size_t); |
---|
40 | void *__mempcpy_chk(void *, const void *, size_t, size_t); |
---|
41 | void *__memset_chk(void *, int, size_t, size_t); |
---|
42 | char *__stpcpy_chk(char *, const char *, size_t); |
---|
43 | char *__strcat_chk(char *, const char *, size_t); |
---|
44 | char *__strcpy_chk(char *, const char *, size_t); |
---|
45 | char *__strncat_chk(char *, const char *, size_t, size_t); |
---|
46 | char *__strncpy_chk(char *, const char *, size_t, size_t); |
---|
47 | __END_DECLS |
---|
48 | |
---|
49 | #if __SSP_FORTIFY_LEVEL > 0 |
---|
50 | |
---|
51 | #define __ssp_bos_check3(fun, dst, src, len) \ |
---|
52 | ((__ssp_bos0(dst) != (size_t)-1) ? \ |
---|
53 | __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)) : \ |
---|
54 | __ ## fun ## _ichk(dst, src, len)) |
---|
55 | |
---|
56 | #define __ssp_bos_check2(fun, dst, src) \ |
---|
57 | ((__ssp_bos0(dst) != (size_t)-1) ? \ |
---|
58 | __builtin___ ## fun ## _chk(dst, src, __ssp_bos0(dst)) : \ |
---|
59 | __ ## fun ## _ichk(dst, src)) |
---|
60 | |
---|
61 | #define __ssp_bos_icheck3_restrict(fun, type1, type2) \ |
---|
62 | __ssp_inline type1 __ ## fun ## _ichk(type1 __restrict, type2 __restrict, size_t); \ |
---|
63 | __ssp_inline type1 \ |
---|
64 | __ ## fun ## _ichk(type1 __restrict dst, type2 __restrict src, size_t len) { \ |
---|
65 | return __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)); \ |
---|
66 | } |
---|
67 | |
---|
68 | #define __ssp_bos_icheck3(fun, type1, type2) \ |
---|
69 | __ssp_inline type1 __ ## fun ## _ichk(type1, type2, size_t); \ |
---|
70 | __ssp_inline type1 \ |
---|
71 | __ ## fun ## _ichk(type1 dst, type2 src, size_t len) { \ |
---|
72 | return __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)); \ |
---|
73 | } |
---|
74 | |
---|
75 | #define __ssp_bos_icheck2_restrict(fun, type1, type2) \ |
---|
76 | __ssp_inline type1 __ ## fun ## _ichk(type1, type2); \ |
---|
77 | __ssp_inline type1 \ |
---|
78 | __ ## fun ## _ichk(type1 __restrict dst, type2 __restrict src) { \ |
---|
79 | return __builtin___ ## fun ## _chk(dst, src, __ssp_bos0(dst)); \ |
---|
80 | } |
---|
81 | |
---|
82 | __BEGIN_DECLS |
---|
83 | __ssp_bos_icheck3_restrict(memcpy, void *, const void *) |
---|
84 | __ssp_bos_icheck3(memmove, void *, const void *) |
---|
85 | __ssp_bos_icheck3_restrict(mempcpy, void *, const void *) |
---|
86 | __ssp_bos_icheck3(memset, void *, int) |
---|
87 | __ssp_bos_icheck2_restrict(stpcpy, char *, const char *) |
---|
88 | #if __GNUC_PREREQ__(4,8) || defined(__clang__) |
---|
89 | __ssp_bos_icheck3_restrict(stpncpy, char *, const char *) |
---|
90 | #endif |
---|
91 | __ssp_bos_icheck2_restrict(strcpy, char *, const char *) |
---|
92 | __ssp_bos_icheck2_restrict(strcat, char *, const char *) |
---|
93 | __ssp_bos_icheck3_restrict(strncpy, char *, const char *) |
---|
94 | __ssp_bos_icheck3_restrict(strncat, char *, const char *) |
---|
95 | __END_DECLS |
---|
96 | |
---|
97 | #define memcpy(dst, src, len) __ssp_bos_check3(memcpy, dst, src, len) |
---|
98 | #define memmove(dst, src, len) __ssp_bos_check3(memmove, dst, src, len) |
---|
99 | #if __GNU_VISIBLE |
---|
100 | #define mempcpy(dst, src, len) __ssp_bos_check3(mempcpy, dst, src, len) |
---|
101 | #endif |
---|
102 | #define memset(dst, val, len) __ssp_bos_check3(memset, dst, val, len) |
---|
103 | #if __POSIX_VISIBLE >= 200809 |
---|
104 | #define stpcpy(dst, src) __ssp_bos_check2(stpcpy, dst, src) |
---|
105 | #if __GNUC_PREREQ__(4,8) || defined(__clang__) |
---|
106 | #define stpncpy(dst, src, len) __ssp_bos_check3(stpncpy, dst, src, len) |
---|
107 | #endif |
---|
108 | #endif |
---|
109 | #define strcpy(dst, src) __ssp_bos_check2(strcpy, dst, src) |
---|
110 | #define strcat(dst, src) __ssp_bos_check2(strcat, dst, src) |
---|
111 | #define strncpy(dst, src, len) __ssp_bos_check3(strncpy, dst, src, len) |
---|
112 | #define strncat(dst, src, len) __ssp_bos_check3(strncat, dst, src, len) |
---|
113 | |
---|
114 | #endif /* __SSP_FORTIFY_LEVEL > 0 */ |
---|
115 | #endif /* _SSP_STRING_H_ */ |
---|