mirror of
https://sourceware.org/git/glibc.git
synced 2024-11-25 06:20:06 +00:00
39ca997ab3
Rename the identifier sz to __sz everywhere.
Fixes: a643f60c53
("Make sure that the fortified function conditionals are constant")
361 lines
13 KiB
C
361 lines
13 KiB
C
/* Checking macros for wchar functions.
|
|
Copyright (C) 2005-2024 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#ifndef _WCHAR_H
|
|
# error "Never include <bits/wchar2.h> directly; use <wchar.h> instead."
|
|
#endif
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wmemcpy (__fortify_clang_overload_arg (wchar_t *, __restrict, __s1),
|
|
const wchar_t *__restrict __s2, size_t __n))
|
|
__fortify_clang_warning_only_if_bos0_lt2 (__n, __s1, sizeof (wchar_t),
|
|
"wmemcpy called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify_n (wmemcpy, __n, sizeof (wchar_t),
|
|
__glibc_objsize0 (__s1),
|
|
__s1, __s2, __n);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wmemmove (__fortify_clang_overload_arg (wchar_t *, ,__s1),
|
|
const wchar_t *__s2, size_t __n))
|
|
__fortify_clang_warning_only_if_bos0_lt2 (__n, __s1, sizeof (wchar_t),
|
|
"wmemmove called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify_n (wmemmove, __n, sizeof (wchar_t),
|
|
__glibc_objsize0 (__s1),
|
|
__s1, __s2, __n);
|
|
}
|
|
|
|
#ifdef __USE_GNU
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wmempcpy (__fortify_clang_overload_arg (wchar_t *, __restrict, __s1),
|
|
const wchar_t *__restrict __s2, size_t __n))
|
|
__fortify_clang_warning_only_if_bos0_lt2 (__n, __s1, sizeof (wchar_t),
|
|
"wmempcpy called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify_n (wmempcpy, __n, sizeof (wchar_t),
|
|
__glibc_objsize0 (__s1),
|
|
__s1, __s2, __n);
|
|
}
|
|
#endif
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wmemset (__fortify_clang_overload_arg (wchar_t *, ,__s), wchar_t __c,
|
|
size_t __n))
|
|
__fortify_clang_warning_only_if_bos0_lt2 (__n, __s, sizeof (wchar_t),
|
|
"wmemset called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify_n (wmemset, __n, sizeof (wchar_t),
|
|
__glibc_objsize0 (__s),
|
|
__s, __c, __n);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wcscpy (__fortify_clang_overload_arg (wchar_t *, __restrict, __dest),
|
|
const wchar_t *__restrict __src))
|
|
{
|
|
size_t __sz = __glibc_objsize (__dest);
|
|
if (__sz != (size_t) -1)
|
|
return __wcscpy_chk (__dest, __src, __sz / sizeof (wchar_t));
|
|
return __wcscpy_alias (__dest, __src);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wcpcpy (__fortify_clang_overload_arg (wchar_t *, __restrict, __dest),
|
|
const wchar_t *__restrict __src))
|
|
{
|
|
size_t __sz = __glibc_objsize (__dest);
|
|
if (__sz != (size_t) -1)
|
|
return __wcpcpy_chk (__dest, __src, __sz / sizeof (wchar_t));
|
|
return __wcpcpy_alias (__dest, __src);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wcsncpy (__fortify_clang_overload_arg (wchar_t *, __restrict, __dest),
|
|
const wchar_t *__restrict __src, size_t __n))
|
|
__fortify_clang_warning_only_if_bos0_lt2 (__n, __dest, sizeof (wchar_t),
|
|
"wcsncpy called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify_n (wcsncpy, __n, sizeof (wchar_t),
|
|
__glibc_objsize (__dest),
|
|
__dest, __src, __n);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wcpncpy (__fortify_clang_overload_arg (wchar_t *, __restrict, __dest),
|
|
const wchar_t *__restrict __src, size_t __n))
|
|
__fortify_clang_warning_only_if_bos0_lt2 (__n, __dest, sizeof (wchar_t),
|
|
"wcpncpy called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
return __glibc_fortify_n (wcpncpy, __n, sizeof (wchar_t),
|
|
__glibc_objsize (__dest),
|
|
__dest, __src, __n);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wcscat (__fortify_clang_overload_arg (wchar_t *, __restrict, __dest),
|
|
const wchar_t *__restrict __src))
|
|
{
|
|
size_t __sz = __glibc_objsize (__dest);
|
|
if (__sz != (size_t) -1)
|
|
return __wcscat_chk (__dest, __src, __sz / sizeof (wchar_t));
|
|
return __wcscat_alias (__dest, __src);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ wchar_t *
|
|
__NTH (wcsncat (__fortify_clang_overload_arg (wchar_t *, __restrict, __dest),
|
|
const wchar_t *__restrict __src, size_t __n))
|
|
{
|
|
size_t __sz = __glibc_objsize (__dest);
|
|
if (__sz != (size_t) -1)
|
|
return __wcsncat_chk (__dest, __src, __n, __sz / sizeof (wchar_t));
|
|
return __wcsncat_alias (__dest, __src, __n);
|
|
}
|
|
|
|
#ifdef __USE_MISC
|
|
__fortify_function __attribute_overloadable__ size_t
|
|
__NTH (wcslcpy (__fortify_clang_overload_arg (wchar_t *, __restrict, __dest),
|
|
const wchar_t *__restrict __src, size_t __n))
|
|
__fortify_clang_warning_only_if_bos0_lt2 (__n, __dest, sizeof (wchar_t),
|
|
"wcslcpy called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
if (__glibc_objsize (__dest) != (size_t) -1
|
|
&& (!__builtin_constant_p (__n
|
|
> __glibc_objsize (__dest) / sizeof (wchar_t))
|
|
|| __n > __glibc_objsize (__dest) / sizeof (wchar_t)))
|
|
return __wcslcpy_chk (__dest, __src, __n,
|
|
__glibc_objsize (__dest) / sizeof (wchar_t));
|
|
return __wcslcpy_alias (__dest, __src, __n);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ size_t
|
|
__NTH (wcslcat (__fortify_clang_overload_arg (wchar_t *, __restrict, __dest),
|
|
const wchar_t *__restrict __src, size_t __n))
|
|
{
|
|
if (__glibc_objsize (__dest) != (size_t) -1
|
|
&& (!__builtin_constant_p (__n > __glibc_objsize (__dest)
|
|
/ sizeof (wchar_t))
|
|
|| __n > __glibc_objsize (__dest) / sizeof (wchar_t)))
|
|
return __wcslcat_chk (__dest, __src, __n,
|
|
__glibc_objsize (__dest) / sizeof (wchar_t));
|
|
return __wcslcat_alias (__dest, __src, __n);
|
|
}
|
|
#endif /* __USE_MISC */
|
|
|
|
#ifdef __va_arg_pack
|
|
__fortify_function int
|
|
__NTH (swprintf (wchar_t *__restrict __s, size_t __n,
|
|
const wchar_t *__restrict __fmt, ...))
|
|
{
|
|
size_t __sz = __glibc_objsize (__s);
|
|
if (__sz != (size_t) -1 || __USE_FORTIFY_LEVEL > 1)
|
|
return __swprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1,
|
|
__sz / sizeof (wchar_t), __fmt, __va_arg_pack ());
|
|
return __swprintf_alias (__s, __n, __fmt, __va_arg_pack ());
|
|
}
|
|
#elif __fortify_use_clang
|
|
__fortify_function_error_function __attribute_overloadable__ int
|
|
__NTH (swprintf (__fortify_clang_overload_arg (wchar_t *, __restrict, __s),
|
|
size_t __n, const wchar_t *__restrict __fmt, ...))
|
|
{
|
|
__gnuc_va_list __fortify_ap;
|
|
__builtin_va_start (__fortify_ap, __fmt);
|
|
int __r;
|
|
if (__glibc_objsize (__s) != (size_t) -1 || __USE_FORTIFY_LEVEL > 1)
|
|
__r = __vswprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1,
|
|
__glibc_objsize (__s) / sizeof (wchar_t),
|
|
__fmt, __fortify_ap);
|
|
else
|
|
__r = __vswprintf_alias (__s, __n, __fmt, __fortify_ap);
|
|
__builtin_va_end (__fortify_ap);
|
|
return __r;
|
|
}
|
|
#elif !defined __cplusplus
|
|
/* XXX We might want to have support in gcc for swprintf. */
|
|
# define swprintf(s, n, ...) \
|
|
(__glibc_objsize (s) != (size_t) -1 || __USE_FORTIFY_LEVEL > 1 \
|
|
? __swprintf_chk (s, n, __USE_FORTIFY_LEVEL - 1, \
|
|
__glibc_objsize (s) / sizeof (wchar_t), __VA_ARGS__) \
|
|
: swprintf (s, n, __VA_ARGS__))
|
|
#endif
|
|
|
|
__fortify_function int
|
|
__NTH (vswprintf (wchar_t *__restrict __s, size_t __n,
|
|
const wchar_t *__restrict __fmt, __gnuc_va_list __ap))
|
|
{
|
|
size_t __sz = __glibc_objsize (__s);
|
|
if (__sz != (size_t) -1 || __USE_FORTIFY_LEVEL > 1)
|
|
return __vswprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1,
|
|
__sz / sizeof (wchar_t), __fmt, __ap);
|
|
return __vswprintf_alias (__s, __n, __fmt, __ap);
|
|
}
|
|
|
|
|
|
#if __USE_FORTIFY_LEVEL > 1
|
|
|
|
# ifdef __va_arg_pack
|
|
__fortify_function int
|
|
wprintf (const wchar_t *__restrict __fmt, ...)
|
|
{
|
|
return __wprintf_chk (__USE_FORTIFY_LEVEL - 1, __fmt, __va_arg_pack ());
|
|
}
|
|
|
|
__fortify_function int
|
|
fwprintf (__FILE *__restrict __stream, const wchar_t *__restrict __fmt, ...)
|
|
{
|
|
return __fwprintf_chk (__stream, __USE_FORTIFY_LEVEL - 1, __fmt,
|
|
__va_arg_pack ());
|
|
}
|
|
# elif !defined __cplusplus
|
|
# define wprintf(...) \
|
|
__wprintf_chk (__USE_FORTIFY_LEVEL - 1, __VA_ARGS__)
|
|
# define fwprintf(stream, ...) \
|
|
__fwprintf_chk (stream, __USE_FORTIFY_LEVEL - 1, __VA_ARGS__)
|
|
# endif
|
|
|
|
__fortify_function int
|
|
vwprintf (const wchar_t *__restrict __fmt, __gnuc_va_list __ap)
|
|
{
|
|
return __vwprintf_chk (__USE_FORTIFY_LEVEL - 1, __fmt, __ap);
|
|
}
|
|
|
|
__fortify_function int
|
|
vfwprintf (__FILE *__restrict __stream,
|
|
const wchar_t *__restrict __fmt, __gnuc_va_list __ap)
|
|
{
|
|
return __vfwprintf_chk (__stream, __USE_FORTIFY_LEVEL - 1, __fmt, __ap);
|
|
}
|
|
|
|
#endif
|
|
__fortify_function __attribute_overloadable__ __wur wchar_t *
|
|
fgetws (__fortify_clang_overload_arg (wchar_t *, __restrict, __s), int __n,
|
|
__FILE *__restrict __stream)
|
|
__fortify_clang_warning_only_if_bos_lt2 (__n, __s, sizeof (wchar_t),
|
|
"fgetws called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
size_t __sz = __glibc_objsize (__s);
|
|
if (__glibc_safe_or_unknown_len (__n, sizeof (wchar_t), __sz))
|
|
return __fgetws_alias (__s, __n, __stream);
|
|
#if !__fortify_use_clang
|
|
if (__glibc_unsafe_len (__n, sizeof (wchar_t), __sz))
|
|
return __fgetws_chk_warn (__s, __sz / sizeof (wchar_t), __n, __stream);
|
|
#endif
|
|
return __fgetws_chk (__s, __sz / sizeof (wchar_t), __n, __stream);
|
|
}
|
|
|
|
#ifdef __USE_GNU
|
|
__fortify_function __attribute_overloadable__ __wur wchar_t *
|
|
fgetws_unlocked (__fortify_clang_overload_arg (wchar_t *, __restrict, __s),
|
|
int __n, __FILE *__restrict __stream)
|
|
__fortify_clang_warning_only_if_bos_lt2 (__n, __s, sizeof (wchar_t),
|
|
"fgetws_unlocked called with length bigger "
|
|
"than size of destination buffer")
|
|
{
|
|
size_t __sz = __glibc_objsize (__s);
|
|
if (__glibc_safe_or_unknown_len (__n, sizeof (wchar_t), __sz))
|
|
return __fgetws_unlocked_alias (__s, __n, __stream);
|
|
# if !__fortify_use_clang
|
|
if (__glibc_unsafe_len (__n, sizeof (wchar_t), __sz))
|
|
return __fgetws_unlocked_chk_warn (__s, __sz / sizeof (wchar_t), __n,
|
|
__stream);
|
|
# endif
|
|
return __fgetws_unlocked_chk (__s, __sz / sizeof (wchar_t), __n, __stream);
|
|
}
|
|
#endif
|
|
|
|
__fortify_function __attribute_overloadable__ __wur size_t
|
|
__NTH (wcrtomb (__fortify_clang_overload_arg (char *, __restrict, __s),
|
|
wchar_t __wchar, mbstate_t *__restrict __ps))
|
|
{
|
|
/* We would have to include <limits.h> to get a definition of MB_LEN_MAX.
|
|
But this would only disturb the namespace. So we define our own
|
|
version here. */
|
|
#define __WCHAR_MB_LEN_MAX 16
|
|
#if defined MB_LEN_MAX && MB_LEN_MAX != __WCHAR_MB_LEN_MAX
|
|
# error "Assumed value of MB_LEN_MAX wrong"
|
|
#endif
|
|
if (__glibc_objsize (__s) != (size_t) -1
|
|
&& __WCHAR_MB_LEN_MAX > __glibc_objsize (__s))
|
|
return __wcrtomb_chk (__s, __wchar, __ps, __glibc_objsize (__s));
|
|
return __wcrtomb_alias (__s, __wchar, __ps);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ size_t
|
|
__NTH (mbsrtowcs (__fortify_clang_overload_arg (wchar_t *, __restrict, __dst),
|
|
const char **__restrict __src,
|
|
size_t __len, mbstate_t *__restrict __ps))
|
|
__fortify_clang_warning_only_if_bos_lt2 (__len, __dst, sizeof (wchar_t),
|
|
"mbsrtowcs called with dst buffer "
|
|
"smaller than len * sizeof (wchar_t)")
|
|
{
|
|
return __glibc_fortify_n (mbsrtowcs, __len, sizeof (wchar_t),
|
|
__glibc_objsize (__dst),
|
|
__dst, __src, __len, __ps);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ size_t
|
|
__NTH (wcsrtombs (__fortify_clang_overload_arg (char *, __restrict, __dst),
|
|
const wchar_t **__restrict __src,
|
|
size_t __len, mbstate_t *__restrict __ps))
|
|
__fortify_clang_warning_only_if_bos_lt (__len, __dst,
|
|
"wcsrtombs called with dst buffer "
|
|
"smaller than len")
|
|
{
|
|
return __glibc_fortify (wcsrtombs, __len, sizeof (char),
|
|
__glibc_objsize (__dst),
|
|
__dst, __src, __len, __ps);
|
|
}
|
|
|
|
|
|
#ifdef __USE_XOPEN2K8
|
|
__fortify_function __attribute_overloadable__ size_t
|
|
__NTH (mbsnrtowcs (__fortify_clang_overload_arg (wchar_t *, __restrict, __dst),
|
|
const char **__restrict __src, size_t __nmc, size_t __len,
|
|
mbstate_t *__restrict __ps))
|
|
__fortify_clang_warning_only_if_bos_lt (sizeof (wchar_t) * __len, __dst,
|
|
"mbsnrtowcs called with dst buffer "
|
|
"smaller than len * sizeof (wchar_t)")
|
|
{
|
|
return __glibc_fortify_n (mbsnrtowcs, __len, sizeof (wchar_t),
|
|
__glibc_objsize (__dst),
|
|
__dst, __src, __nmc, __len, __ps);
|
|
}
|
|
|
|
__fortify_function __attribute_overloadable__ size_t
|
|
__NTH (wcsnrtombs (__fortify_clang_overload_arg (char *, __restrict, __dst),
|
|
const wchar_t **__restrict __src, size_t __nwc,
|
|
size_t __len, mbstate_t *__restrict __ps))
|
|
__fortify_clang_warning_only_if_bos_lt (__len, __dst,
|
|
"wcsnrtombs called with dst buffer "
|
|
"smaller than len")
|
|
{
|
|
return __glibc_fortify (wcsnrtombs, __len, sizeof (char),
|
|
__glibc_objsize (__dst),
|
|
__dst, __src, __nwc, __len, __ps);
|
|
}
|
|
#endif
|