1 1.14 mrg /* $NetBSD: string.h,v 1.14 2020/09/05 13:37:59 mrg Exp $ */ 2 1.1 tls 3 1.1 tls /*- 4 1.1 tls * Copyright (c) 2006 The NetBSD Foundation, Inc. 5 1.1 tls * All rights reserved. 6 1.1 tls * 7 1.1 tls * This code is derived from software contributed to The NetBSD Foundation 8 1.1 tls * by Christos Zoulas. 9 1.1 tls * 10 1.1 tls * Redistribution and use in source and binary forms, with or without 11 1.1 tls * modification, are permitted provided that the following conditions 12 1.1 tls * are met: 13 1.1 tls * 1. Redistributions of source code must retain the above copyright 14 1.1 tls * notice, this list of conditions and the following disclaimer. 15 1.1 tls * 2. Redistributions in binary form must reproduce the above copyright 16 1.1 tls * notice, this list of conditions and the following disclaimer in the 17 1.1 tls * documentation and/or other materials provided with the distribution. 18 1.1 tls * 19 1.1 tls * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 1.1 tls * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 1.1 tls * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 1.1 tls * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 1.1 tls * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 1.1 tls * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 1.1 tls * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 1.1 tls * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 1.1 tls * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 1.1 tls * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 1.1 tls * POSSIBILITY OF SUCH DAMAGE. 30 1.1 tls */ 31 1.1 tls #ifndef _SSP_STRING_H_ 32 1.1 tls #define _SSP_STRING_H_ 33 1.1 tls 34 1.11 pooka #include <sys/cdefs.h> 35 1.2 tls #include <ssp/ssp.h> 36 1.1 tls 37 1.5 joerg __BEGIN_DECLS 38 1.5 joerg void *__memcpy_chk(void *, const void *, size_t, size_t); 39 1.14 mrg void *__memmove_chk(void *, const void *, size_t, size_t); 40 1.5 joerg void *__memset_chk(void *, int, size_t, size_t); 41 1.6 christos char *__stpcpy_chk(char *, const char *, size_t); 42 1.5 joerg char *__strcat_chk(char *, const char *, size_t); 43 1.5 joerg char *__strcpy_chk(char *, const char *, size_t); 44 1.5 joerg char *__strncat_chk(char *, const char *, size_t, size_t); 45 1.5 joerg char *__strncpy_chk(char *, const char *, size_t, size_t); 46 1.5 joerg __END_DECLS 47 1.5 joerg 48 1.1 tls #if __SSP_FORTIFY_LEVEL > 0 49 1.1 tls 50 1.1 tls #define __ssp_bos_check3(fun, dst, src, len) \ 51 1.1 tls ((__ssp_bos0(dst) != (size_t)-1) ? \ 52 1.1 tls __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)) : \ 53 1.1 tls __ ## fun ## _ichk(dst, src, len)) 54 1.1 tls 55 1.1 tls #define __ssp_bos_check2(fun, dst, src) \ 56 1.1 tls ((__ssp_bos0(dst) != (size_t)-1) ? \ 57 1.1 tls __builtin___ ## fun ## _chk(dst, src, __ssp_bos0(dst)) : \ 58 1.1 tls __ ## fun ## _ichk(dst, src)) 59 1.1 tls 60 1.1 tls #define __ssp_bos_icheck3_restrict(fun, type1, type2) \ 61 1.1 tls static __inline type1 __ ## fun ## _ichk(type1 __restrict, type2 __restrict, size_t); \ 62 1.1 tls static __inline __attribute__((__always_inline__)) type1 \ 63 1.1 tls __ ## fun ## _ichk(type1 __restrict dst, type2 __restrict src, size_t len) { \ 64 1.1 tls return __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)); \ 65 1.1 tls } 66 1.1 tls 67 1.1 tls #define __ssp_bos_icheck3(fun, type1, type2) \ 68 1.1 tls static __inline type1 __ ## fun ## _ichk(type1, type2, size_t); \ 69 1.1 tls static __inline __attribute__((__always_inline__)) type1 \ 70 1.1 tls __ ## fun ## _ichk(type1 dst, type2 src, size_t len) { \ 71 1.1 tls return __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)); \ 72 1.1 tls } 73 1.1 tls 74 1.1 tls #define __ssp_bos_icheck2_restrict(fun, type1, type2) \ 75 1.1 tls static __inline type1 __ ## fun ## _ichk(type1, type2); \ 76 1.1 tls static __inline __attribute__((__always_inline__)) type1 \ 77 1.1 tls __ ## fun ## _ichk(type1 __restrict dst, type2 __restrict src) { \ 78 1.1 tls return __builtin___ ## fun ## _chk(dst, src, __ssp_bos0(dst)); \ 79 1.1 tls } 80 1.1 tls 81 1.1 tls __BEGIN_DECLS 82 1.1 tls __ssp_bos_icheck3_restrict(memcpy, void *, const void *) 83 1.1 tls __ssp_bos_icheck3(memmove, void *, const void *) 84 1.1 tls __ssp_bos_icheck3(memset, void *, int) 85 1.9 christos __ssp_bos_icheck2_restrict(stpcpy, char *, const char *) 86 1.13 pooka #if __GNUC_PREREQ__(4,8) || defined(__clang__) 87 1.10 christos __ssp_bos_icheck3_restrict(stpncpy, char *, const char *) 88 1.13 pooka #endif 89 1.1 tls __ssp_bos_icheck2_restrict(strcpy, char *, const char *) 90 1.1 tls __ssp_bos_icheck2_restrict(strcat, char *, const char *) 91 1.1 tls __ssp_bos_icheck3_restrict(strncpy, char *, const char *) 92 1.1 tls __ssp_bos_icheck3_restrict(strncat, char *, const char *) 93 1.1 tls __END_DECLS 94 1.1 tls 95 1.1 tls #define memcpy(dst, src, len) __ssp_bos_check3(memcpy, dst, src, len) 96 1.1 tls #define memmove(dst, src, len) __ssp_bos_check3(memmove, dst, src, len) 97 1.1 tls #define memset(dst, val, len) __ssp_bos_check3(memset, dst, val, len) 98 1.6 christos #define stpcpy(dst, src) __ssp_bos_check2(stpcpy, dst, src) 99 1.12 pooka #if __GNUC_PREREQ__(4,8) || defined(__clang__) 100 1.10 christos #define stpncpy(dst, src, len) __ssp_bos_check3(stpncpy, dst, src, len) 101 1.11 pooka #endif 102 1.1 tls #define strcpy(dst, src) __ssp_bos_check2(strcpy, dst, src) 103 1.1 tls #define strcat(dst, src) __ssp_bos_check2(strcat, dst, src) 104 1.1 tls #define strncpy(dst, src, len) __ssp_bos_check3(strncpy, dst, src, len) 105 1.1 tls #define strncat(dst, src, len) __ssp_bos_check3(strncat, dst, src, len) 106 1.1 tls 107 1.1 tls #endif /* __SSP_FORTIFY_LEVEL > 0 */ 108 1.1 tls #endif /* _SSP_STRING_H_ */ 109