string.h revision 1.6 1 1.6 christos /* $NetBSD: string.h,v 1.6 2013/11/06 16:31:24 christos Exp $ */
2 1.1 tls
3 1.1 tls /*-
4 1.1 tls * Copyright (c) 2006 The NetBSD Foundation, Inc.
5 1.1 tls * All rights reserved.
6 1.1 tls *
7 1.1 tls * This code is derived from software contributed to The NetBSD Foundation
8 1.1 tls * by Christos Zoulas.
9 1.1 tls *
10 1.1 tls * Redistribution and use in source and binary forms, with or without
11 1.1 tls * modification, are permitted provided that the following conditions
12 1.1 tls * are met:
13 1.1 tls * 1. Redistributions of source code must retain the above copyright
14 1.1 tls * notice, this list of conditions and the following disclaimer.
15 1.1 tls * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 tls * notice, this list of conditions and the following disclaimer in the
17 1.1 tls * documentation and/or other materials provided with the distribution.
18 1.1 tls *
19 1.1 tls * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 tls * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 tls * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 tls * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 tls * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 tls * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 tls * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 tls * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 tls * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 tls * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 tls * POSSIBILITY OF SUCH DAMAGE.
30 1.1 tls */
31 1.1 tls #ifndef _SSP_STRING_H_
32 1.1 tls #define _SSP_STRING_H_
33 1.1 tls
34 1.2 tls #include <ssp/ssp.h>
35 1.1 tls
36 1.5 joerg __BEGIN_DECLS
37 1.5 joerg void *__memcpy_chk(void *, const void *, size_t, size_t);
38 1.5 joerg void *__memmove_chk(void *, void *, size_t, size_t);
39 1.5 joerg void *__memset_chk(void *, int, size_t, size_t);
40 1.6 christos char *__stpcpy_chk(char *, const char *, size_t);
41 1.6 christos char *__stpncpy_chk(char *, const char *, size_t, size_t);
42 1.5 joerg char *__strcat_chk(char *, const char *, size_t);
43 1.5 joerg char *__strcpy_chk(char *, const char *, size_t);
44 1.5 joerg char *__strncat_chk(char *, const char *, size_t, size_t);
45 1.5 joerg char *__strncpy_chk(char *, const char *, size_t, size_t);
46 1.5 joerg __END_DECLS
47 1.5 joerg
48 1.1 tls #if __SSP_FORTIFY_LEVEL > 0
49 1.1 tls
50 1.1 tls #define __ssp_bos_check3(fun, dst, src, len) \
51 1.1 tls ((__ssp_bos0(dst) != (size_t)-1) ? \
52 1.1 tls __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)) : \
53 1.1 tls __ ## fun ## _ichk(dst, src, len))
54 1.1 tls
55 1.1 tls #define __ssp_bos_check2(fun, dst, src) \
56 1.1 tls ((__ssp_bos0(dst) != (size_t)-1) ? \
57 1.1 tls __builtin___ ## fun ## _chk(dst, src, __ssp_bos0(dst)) : \
58 1.1 tls __ ## fun ## _ichk(dst, src))
59 1.1 tls
60 1.1 tls #define __ssp_bos_icheck3_restrict(fun, type1, type2) \
61 1.1 tls static __inline type1 __ ## fun ## _ichk(type1 __restrict, type2 __restrict, size_t); \
62 1.1 tls static __inline __attribute__((__always_inline__)) type1 \
63 1.1 tls __ ## fun ## _ichk(type1 __restrict dst, type2 __restrict src, size_t len) { \
64 1.1 tls return __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)); \
65 1.1 tls }
66 1.1 tls
67 1.1 tls #define __ssp_bos_icheck3(fun, type1, type2) \
68 1.1 tls static __inline type1 __ ## fun ## _ichk(type1, type2, size_t); \
69 1.1 tls static __inline __attribute__((__always_inline__)) type1 \
70 1.1 tls __ ## fun ## _ichk(type1 dst, type2 src, size_t len) { \
71 1.1 tls return __builtin___ ## fun ## _chk(dst, src, len, __ssp_bos0(dst)); \
72 1.1 tls }
73 1.1 tls
74 1.1 tls #define __ssp_bos_icheck2_restrict(fun, type1, type2) \
75 1.1 tls static __inline type1 __ ## fun ## _ichk(type1, type2); \
76 1.1 tls static __inline __attribute__((__always_inline__)) type1 \
77 1.1 tls __ ## fun ## _ichk(type1 __restrict dst, type2 __restrict src) { \
78 1.1 tls return __builtin___ ## fun ## _chk(dst, src, __ssp_bos0(dst)); \
79 1.1 tls }
80 1.1 tls
81 1.1 tls __BEGIN_DECLS
82 1.1 tls __ssp_bos_icheck3_restrict(memcpy, void *, const void *)
83 1.1 tls __ssp_bos_icheck3(memmove, void *, const void *)
84 1.1 tls __ssp_bos_icheck3(memset, void *, int)
85 1.1 tls __ssp_bos_icheck2_restrict(strcpy, char *, const char *)
86 1.1 tls __ssp_bos_icheck2_restrict(strcat, char *, const char *)
87 1.1 tls __ssp_bos_icheck3_restrict(strncpy, char *, const char *)
88 1.1 tls __ssp_bos_icheck3_restrict(strncat, char *, const char *)
89 1.1 tls __END_DECLS
90 1.1 tls
91 1.1 tls #define memcpy(dst, src, len) __ssp_bos_check3(memcpy, dst, src, len)
92 1.1 tls #define memmove(dst, src, len) __ssp_bos_check3(memmove, dst, src, len)
93 1.1 tls #define memset(dst, val, len) __ssp_bos_check3(memset, dst, val, len)
94 1.6 christos #define stpcpy(dst, src) __ssp_bos_check2(stpcpy, dst, src)
95 1.6 christos #define stpncpy(dst, src, len) __ssp_bos_check3(stpncpy, dst, src, len)
96 1.1 tls #define strcpy(dst, src) __ssp_bos_check2(strcpy, dst, src)
97 1.1 tls #define strcat(dst, src) __ssp_bos_check2(strcat, dst, src)
98 1.1 tls #define strncpy(dst, src, len) __ssp_bos_check3(strncpy, dst, src, len)
99 1.1 tls #define strncat(dst, src, len) __ssp_bos_check3(strncat, dst, src, len)
100 1.1 tls
101 1.1 tls #endif /* __SSP_FORTIFY_LEVEL > 0 */
102 1.1 tls #endif /* _SSP_STRING_H_ */
103