blob: 7e6ccd410cbfe305eb8dfdc8d05b76eb9d1eba7e [file] [log] [blame]
Steve Kondikae271bc2015-11-15 02:50:53 +01001/****************************************************************************
2 * Copyright (c) 2012,2013 Free Software Foundation, Inc. *
3 * *
4 * Permission is hereby granted, free of charge, to any person obtaining a *
5 * copy of this software and associated documentation files (the *
6 * "Software"), to deal in the Software without restriction, including *
7 * without limitation the rights to use, copy, modify, merge, publish, *
8 * distribute, distribute with modifications, sublicense, and/or sell *
9 * copies of the Software, and to permit persons to whom the Software is *
10 * furnished to do so, subject to the following conditions: *
11 * *
12 * The above copyright notice and this permission notice shall be included *
13 * in all copies or substantial portions of the Software. *
14 * *
15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS *
16 * OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF *
17 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. *
18 * IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, *
19 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR *
20 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR *
21 * THE USE OR OTHER DEALINGS IN THE SOFTWARE. *
22 * *
23 * Except as contained in this notice, the name(s) of the above copyright *
24 * holders shall not be used in advertising or otherwise to promote the *
25 * sale, use or other dealings in this Software without prior written *
26 * authorization. *
27 ****************************************************************************/
28
29/****************************************************************************
30 * Author: Thomas E. Dickey 2012 *
31 ****************************************************************************/
32
33#ifndef STRING_HACKS_H
34#define STRING_HACKS_H 1
35
36#include <ncurses_cfg.h>
37
38/*
39 * $Id: nc_string.h,v 1.4 2013/12/15 01:09:19 tom Exp $
40 *
41 * String-hacks. Use these macros to stifle warnings on (presumably) correct
42 * uses of strcat, strcpy and sprintf.
43 *
44 * By the way -
45 * A fundamental limitation of the interfaces (and frequent issue in bug
46 * reports using these functions) is that sizes are passed as unsigned values
47 * (with associated sign-extension problems), limiting their effectiveness
48 * when checking for buffer overflow.
49 */
50
51#ifdef __cplusplus
52#define NCURSES_VOID /* nothing */
53#else
54#define NCURSES_VOID (void)
55#endif
56
57#if USE_STRING_HACKS && HAVE_STRLCAT
58#define _nc_STRCAT(d,s,n) NCURSES_VOID strlcat((d),(s),NCURSES_CAST(size_t,n))
59#else
60#define _nc_STRCAT(d,s,n) NCURSES_VOID strcat((d),(s))
61#endif
62
63#if USE_STRING_HACKS && HAVE_STRLCPY
64#define _nc_STRCPY(d,s,n) NCURSES_VOID strlcpy((d),(s),NCURSES_CAST(size_t,n))
65#else
66#define _nc_STRCPY(d,s,n) NCURSES_VOID strcpy((d),(s))
67#endif
68
69#if USE_STRING_HACKS && HAVE_SNPRINTF
70#define _nc_SPRINTF NCURSES_VOID snprintf
71#define _nc_SLIMIT(n) NCURSES_CAST(size_t,n),
72#else
73#define _nc_SPRINTF NCURSES_VOID sprintf
74#define _nc_SLIMIT(n) /* nothing */
75#endif
76
77#endif /* STRING_HACKS_H */