|
- /**
- * Copyright 2020 Huawei Technologies Co., Ltd
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-
- #define SECUREC_INLINE_DO_MEMCPY 1
-
- #include "securecutil.h"
-
- static errno_t SecDoWcscpy(wchar_t *strDest, size_t destMax, const wchar_t *strSrc)
- {
- size_t srcStrLen;
-
- SECUREC_CALC_WSTR_LEN(strSrc, destMax, &srcStrLen);
- if (srcStrLen == destMax) {
- strDest[0] = '\0';
- SECUREC_ERROR_INVALID_RANGE("wcscpy_s");
- return ERANGE_AND_RESET;
- }
- if (strDest == strSrc) {
- return EOK;
- }
-
- if (SECUREC_STRING_NO_OVERLAP(strDest, strSrc, srcStrLen)) {
- /* performance optimization srcStrLen include '\0' */
- SecDoMemcpy(strDest, strSrc, (srcStrLen + 1) * sizeof(wchar_t)); /* single character length include \0 */
- return EOK;
- } else {
- strDest[0] = L'\0';
- SECUREC_ERROR_BUFFER_OVERLAP("wcscpy_s");
- return EOVERLAP_AND_RESET;
- }
- }
-
- /*
- * <FUNCTION DESCRIPTION>
- * The wcscpy_s function copies the wide string pointed to by strSrc
- * (including theterminating null wide character) into the array pointed to by strDest
-
- * <INPUT PARAMETERS>
- * strDest Destination string buffer
- * destMax Size of the destination string buffer.
- * strSrc Null-terminated source string buffer.
- *
- * <OUTPUT PARAMETERS>
- * strDest is updated.
- *
- * <RETURN VALUE>
- * EOK Success
- * EINVAL strDest is NULL and destMax != 0 and destMax <= SECUREC_WCHAR_STRING_MAX_LEN
- * EINVAL_AND_RESET strDest != NULL and strSrc is NULLL and destMax != 0
- * and destMax <= SECUREC_WCHAR_STRING_MAX_LEN
- * ERANGE destMax > SECUREC_WCHAR_STRING_MAX_LEN or destMax is 0
- * ERANGE_AND_RESET destMax <= length of strSrc and strDest != strSrc
- * and strDest != NULL and strSrc != NULL and destMax != 0
- * and destMax <= SECUREC_WCHAR_STRING_MAX_LEN and not overlap
- * EOVERLAP_AND_RESET dest buffer and source buffer are overlapped and destMax != 0
- * and destMax <= SECUREC_WCHAR_STRING_MAX_LEN
- * and strDest != NULL and strSrc !=NULL and strDest != strSrc
- *
- * If there is a runtime-constraint violation, strDest[0] will be set to the '\0' when strDest and destMax valid
- */
- errno_t wcscpy_s(wchar_t *strDest, size_t destMax, const wchar_t *strSrc)
- {
- if (destMax == 0 || destMax > SECUREC_WCHAR_STRING_MAX_LEN) {
- SECUREC_ERROR_INVALID_RANGE("wcscpy_s");
- return ERANGE;
- }
- if (strDest == NULL || strSrc == NULL) {
- SECUREC_ERROR_INVALID_PARAMTER("wcscpy_s");
- if (strDest != NULL) {
- strDest[0] = L'\0';
- return EINVAL_AND_RESET;
- }
- return EINVAL;
- }
- return SecDoWcscpy(strDest, destMax, strSrc);
- }
-
|