casadm: Add missing safeclib files
Signed-off-by: Robert Baldyga <robert.baldyga@huawei.com>
This commit is contained in:
204
casadm/safeclib/strcpyfldout_s.c
Normal file
204
casadm/safeclib/strcpyfldout_s.c
Normal file
@@ -0,0 +1,204 @@
|
||||
/*------------------------------------------------------------------
|
||||
* strcpyfldout_s.c
|
||||
*
|
||||
* November 2008, Bo Berry
|
||||
*
|
||||
* Copyright (c) 2008-2011 by Cisco Systems, Inc
|
||||
* All rights reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person
|
||||
* obtaining a copy of this software and associated documentation
|
||||
* files (the "Software"), to deal in the Software without
|
||||
* restriction, including without limitation the rights to use,
|
||||
* copy, modify, merge, publish, distribute, sublicense, and/or
|
||||
* sell copies of the Software, and to permit persons to whom the
|
||||
* Software is furnished to do so, subject to the following
|
||||
* conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be
|
||||
* included in all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
|
||||
* OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
|
||||
* HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
||||
* WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
||||
* OTHER DEALINGS IN THE SOFTWARE.
|
||||
*------------------------------------------------------------------
|
||||
*/
|
||||
|
||||
#include "safeclib_private.h"
|
||||
#include "safe_str_constraint.h"
|
||||
#include "safe_str_lib.h"
|
||||
|
||||
|
||||
/**
|
||||
* NAME
|
||||
* strcpyfldout_s
|
||||
*
|
||||
* SYNOPSIS
|
||||
* #include "safe_str_lib.h"
|
||||
* errno_t
|
||||
* strcpyfldout_s(char *dest, rsize_t dmax,
|
||||
* const char *src, rsize_t slen)
|
||||
*
|
||||
* DESCRIPTION
|
||||
* The strcpyfldout_s function copies slen characters from
|
||||
* the character array pointed to by src into the string
|
||||
* pointed to by dest. A null is included to properly
|
||||
* termiante the dest string. The copy operation does not
|
||||
* stop on the null character as function copies dmax
|
||||
* characters.
|
||||
*
|
||||
* EXTENSION TO
|
||||
* ISO/IEC TR 24731, Programming languages, environments
|
||||
* and system software interfaces, Extensions to the C Library,
|
||||
* Part I: Bounds-checking interfaces
|
||||
*
|
||||
* INPUT PARAMETERS
|
||||
* dest pointer to string that will be replaced by src.
|
||||
*
|
||||
* dmax restricted maximum length of dest
|
||||
*
|
||||
* src pointer to the character array to be copied
|
||||
* to dest and null terminated.
|
||||
*
|
||||
* slen the maximum number of characters that will be
|
||||
* copied from the src field into the dest string.
|
||||
*
|
||||
* OUTPUT PARAMETERS
|
||||
* dest updated
|
||||
*
|
||||
* RUNTIME CONSTRAINTS
|
||||
* Neither dest nor src shall be a null pointer.
|
||||
* dmax shall not equal zero.
|
||||
* dmax shall not be greater than RSIZE_MAX_STR.
|
||||
* slen shall not equal zero.
|
||||
* slen shall not exceed dmax
|
||||
* Copying shall not take place between objects that overlap.
|
||||
* If there is a runtime-constraint violation, then if dest
|
||||
* is not a null pointer and dmax is greater than zero and
|
||||
* not greater than RSIZE_MAX_STR, then strcpyfldout_s nulls dest.
|
||||
*
|
||||
* RETURN VALUE
|
||||
* EOK successful operation
|
||||
* ESNULLP NULL pointer
|
||||
* ESZEROL zero length
|
||||
* ESLEMAX length exceeds max limit
|
||||
* ESOVRLP strings overlap
|
||||
*
|
||||
* ALSO SEE
|
||||
* strcpyfld_s(), strcpyfldin_s()
|
||||
*
|
||||
*/
|
||||
errno_t
|
||||
strcpyfldout_s (char *dest, rsize_t dmax, const char *src, rsize_t slen)
|
||||
{
|
||||
rsize_t orig_dmax;
|
||||
char *orig_dest;
|
||||
const char *overlap_bumper;
|
||||
|
||||
if (dest == NULL) {
|
||||
invoke_safe_str_constraint_handler("strcpyfldout_s: dest is null",
|
||||
NULL, ESNULLP);
|
||||
return (ESNULLP);
|
||||
}
|
||||
|
||||
if (dmax == 0) {
|
||||
invoke_safe_str_constraint_handler("strcpyfldout_s: dmax is 0",
|
||||
NULL, ESZEROL);
|
||||
return (ESZEROL);
|
||||
}
|
||||
|
||||
if (dmax > RSIZE_MAX_STR) {
|
||||
invoke_safe_str_constraint_handler("strcpyfldout_s: dmax exceeds max",
|
||||
NULL, ESLEMAX);
|
||||
return (ESLEMAX);
|
||||
}
|
||||
|
||||
if (src == NULL) {
|
||||
/* null string to clear data */
|
||||
while (dmax) { *dest = '\0'; dmax--; dest++; }
|
||||
|
||||
invoke_safe_str_constraint_handler("strcpyfldout_s: src is null",
|
||||
NULL, ESNULLP);
|
||||
return (ESNULLP);
|
||||
}
|
||||
|
||||
if (slen == 0) {
|
||||
/* null string to clear data */
|
||||
while (dmax) { *dest = '\0'; dmax--; dest++; }
|
||||
|
||||
invoke_safe_str_constraint_handler("strcpyfldout_s: slen is 0",
|
||||
NULL, ESZEROL);
|
||||
return (ESZEROL);
|
||||
}
|
||||
|
||||
if (slen > dmax) {
|
||||
/* null string to clear data */
|
||||
while (dmax) { *dest = '\0'; dmax--; dest++; }
|
||||
|
||||
invoke_safe_str_constraint_handler("strcpyfldout_s: slen exceeds max",
|
||||
NULL, ESLEMAX);
|
||||
return (ESLEMAX);
|
||||
}
|
||||
|
||||
|
||||
/* hold base of dest in case src was not copied */
|
||||
orig_dmax = dmax;
|
||||
orig_dest = dest;
|
||||
|
||||
if (dest < src) {
|
||||
overlap_bumper = src;
|
||||
|
||||
while (dmax > 1 && slen) {
|
||||
|
||||
if (dest == overlap_bumper) {
|
||||
dmax = orig_dmax;
|
||||
dest = orig_dest;
|
||||
|
||||
/* null string to eliminate partial copy */
|
||||
while (dmax) { *dest = '\0'; dmax--; dest++; }
|
||||
|
||||
invoke_safe_str_constraint_handler(
|
||||
"strcpyfldout_s: overlapping objects",
|
||||
NULL, ESOVRLP);
|
||||
return (ESOVRLP);
|
||||
}
|
||||
|
||||
dmax--;
|
||||
slen--;
|
||||
*dest++ = *src++;
|
||||
}
|
||||
|
||||
} else {
|
||||
overlap_bumper = dest;
|
||||
|
||||
while (dmax > 1 && slen) {
|
||||
|
||||
if (src == overlap_bumper) {
|
||||
dmax = orig_dmax;
|
||||
dest = orig_dest;
|
||||
|
||||
/* null string to eliminate partial copy */
|
||||
while (dmax) { *dest = '\0'; dmax--; dest++; }
|
||||
|
||||
invoke_safe_str_constraint_handler(
|
||||
"strcpyfldout_s: overlapping objects",
|
||||
NULL, ESOVRLP);
|
||||
return (ESOVRLP);
|
||||
}
|
||||
|
||||
dmax--;
|
||||
slen--;
|
||||
*dest++ = *src++;
|
||||
}
|
||||
}
|
||||
|
||||
/* null slack space */
|
||||
while (dmax) { *dest = '\0'; dmax--; dest++; }
|
||||
|
||||
return (EOK);
|
||||
}
|
Reference in New Issue
Block a user