/** * Copyright 2020 Huawei Technologies Co., Ltd * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define SECUREC_INLINE_STR_LEN 1 #define SECUREC_INLINE_DO_MEMCPY 1 #include "securecutil.h" #if defined(SECUREC_COMPATIBLE_WIN_FORMAT) #define SECUREC_STRNCPY_PARAM_OK(strDest, destMax, strSrc, count) \ (((destMax) > 0 && (destMax) <= SECUREC_STRING_MAX_LEN && (strDest) != NULL && (strSrc) != NULL && \ ((count) <= SECUREC_STRING_MAX_LEN || (count) == ((size_t)(-1))) && (count) > 0)) #else #define SECUREC_STRNCPY_PARAM_OK(strDest, destMax, strSrc, count) \ (((destMax) > 0 && (destMax) <= SECUREC_STRING_MAX_LEN && (strDest) != NULL && (strSrc) != NULL && \ (count) <= SECUREC_STRING_MAX_LEN && (count) > 0)) #endif /* * Check Src Count Range */ static errno_t CheckSrcCountRange(char *strDest, size_t destMax, const char *strSrc, size_t count) { size_t tmpDestMax = destMax; size_t tmpCount = count; const char *endPos = strSrc; /* use destMax and count as boundary checker and destMax must be greater than zero */ while (*(endPos) != '\0' && tmpDestMax > 0 && tmpCount > 0) { ++endPos; --tmpCount; --tmpDestMax; } if (tmpDestMax == 0) { strDest[0] = '\0'; SECUREC_ERROR_INVALID_RANGE("strncpy_s"); return ERANGE_AND_RESET; } return EOK; } /* * Handling errors, when dest euqal src return EOK */ errno_t strncpy_error(char *strDest, size_t destMax, const char *strSrc, size_t count) { if (destMax == 0 || destMax > SECUREC_STRING_MAX_LEN) { SECUREC_ERROR_INVALID_RANGE("strncpy_s"); return ERANGE; } else if (strDest == NULL || strSrc == NULL) { SECUREC_ERROR_INVALID_PARAMTER("strncpy_s"); if (strDest != NULL) { strDest[0] = '\0'; return EINVAL_AND_RESET; } return EINVAL; } else if (count > SECUREC_STRING_MAX_LEN) { strDest[0] = '\0'; /* clear dest string */ SECUREC_ERROR_INVALID_RANGE("strncpy_s"); return ERANGE_AND_RESET; } else if (count == 0) { strDest[0] = '\0'; return EOK; } return CheckSrcCountRange(strDest, destMax, strSrc, count); } /* * * The strncpy_s function copies not more than n successive characters (not including the terminating null character) * from the array pointed to by strSrc to the array pointed to by strDest. * * * strDest Destination string. * destMax The size of the destination string, in characters. * strSrc Source string. * count Number of characters to be copied. * * * strDest is updated * * * EOK Success * EINVAL strDest is NULL and destMax != 0 and destMax <= SECUREC_STRING_MAX_LEN * EINVAL_AND_RESET strDest != NULL and strSrc is NULL and destMax != 0 and destMax <= SECUREC_STRING_MAX_LEN * ERANGE destMax is 0 and destMax > SECUREC_STRING_MAX_LEN * ERANGE_AND_RESET strDest have not enough space and all other parameters are valid and not overlap * EOVERLAP_AND_RESET dest buffer and source buffer are overlapped and all parameters are valid * * If there is a runtime-constraint violation, strDest[0] will be set to the '\0' when strDest and destMax valid */ errno_t strncpy_s(char *strDest, size_t destMax, const char *strSrc, size_t count) { if (SECUREC_STRNCPY_PARAM_OK(strDest, destMax, strSrc, count)) { size_t minCpLen; /* use it to store the maxi length limit */ if (count < destMax) { minCpLen = SecStrMinLen(strSrc, count); /* no ending terminator */ } else { size_t tmpCount = destMax; #ifdef SECUREC_COMPATIBLE_WIN_FORMAT if (count == ((size_t)(-1))) { tmpCount = destMax - 1; } #endif minCpLen = SecStrMinLen(strSrc, tmpCount); if (minCpLen == destMax) { strDest[0] = '\0'; SECUREC_ERROR_INVALID_RANGE("strncpy_s"); return ERANGE_AND_RESET; } } if (SECUREC_STRING_NO_OVERLAP(strDest, strSrc, minCpLen) || strDest == strSrc) { /* Not overlap */ SecDoMemcpy(strDest, strSrc, minCpLen); /* copy string without terminator */ strDest[minCpLen] = '\0'; return EOK; } else { strDest[0] = '\0'; SECUREC_ERROR_BUFFER_OVERLAP("strncpy_s"); return EOVERLAP_AND_RESET; } } return strncpy_error(strDest, destMax, strSrc, count); } #if SECUREC_IN_KERNEL EXPORT_SYMBOL(strncpy_s); #endif