strlcpy
In computer programming, the strlcpy function is intended to replace the function strcpy and provide a simpler and more robust and secure interface than strncpy. It is designed to copy the contents of a string from a source string to a destination string. It is almost always accompanied by the strlcat function which provides a similar alternative to strncat.
These are not C standard library functions, but are available in the libraries on several Unix operating systems, including BSD, Mac OS X, Solaris and IRIX, with notable exception of glibc on Linux.
Usage
size_t strlcpy(char *destination, const char *source, size_t size); size_t strlcat(char *destination, const char *source, size_t size);
strlcpy offers two features, absent in strncpy, that are intended to help software developers avoid problems. Like strncpy, strlcpy takes the destination's size as a parameter, to prevent buffer overflows (assuming the size parameter is correct). But, unlike strncpy, strlcpy always writes a NUL byte to the destination, so long as the destination's size is non-zero. Thus, the resulting string, if non-empty, is guaranteed to be NUL-terminated, even if this required truncation.
Secondly, strlcpy counts and returns the length of the entire source string (strncpy doesn't return a length). This length can be compared to the destination buffer's size in order to check, after the fact, whether truncation was inevitable. For example:
/* strlcpy returns src_len */ if (strlcpy(dest, source, dest_len) >= dest_len) errx(1, "String too long");
For performance reasons, strlcpy, unlike strncpy, does not zero-fill any unused space in the destination buffer.[1]
strlcat is equivalent to doing strcat into a buffer large enough to hold the result, and then doing a strlcpy of that buffer to the destination.
History
strlcpy and strlcat were developed by Todd C. Miller and Theo de Raadt and first implemented in OpenBSD version 2.4. It has subsequently been adopted by a number of operating systems including FreeBSD (from version 3.3), Solaris and Mac OS X. Many application packages and libraries include their own copies of these functions, including glib, rsync and the Linux kernel itself.
Criticism
GNU C Library maintainer Ulrich Drepper is among the critics of the strlcpy and strlcat functions;[2] consequently these functions have not been added to glibc. Drepper argues that strlcpy and strlcat make truncation errors easier for a programmer to ignore and thus can introduce more bugs than they remove.[2] His concern with possible truncation, when using any string function involving static allocation, is shared by others.[3]
Other criticisms are that the functions are non-standard and that there are implementation differences between the BSD and Solaris implementations (the return value of strlcat, when there is no NUL in the destination buffer, differs).[4]
References
- ^ Todd C. Miller (1999). "strlcpy and strlcat - consistent, safe, string copy and concatenation". USENIX '99.
{{cite web}}
: Unknown parameter|coauthors=
ignored (|author=
suggested) (help) - ^ a b libc-alpha mailing list, selected messages from 8 August 2000 thread: 53, 60, 61
- ^ Antill, James. Security with string APIs: Security relevant things to look for in a string library API
- ^ Antill, James. Security with string APIs
External links
- strlcpy and strlcat--Consistent, Safe, String Copy and Concatenation - a paper written by Miller and de Raadt, presented at Usenix 99
- OpenBSD Library Functions Manual : size-bounded string copying and concatenation –
- strlcpy() source
- strlcat() source
- Linux Weekly News discussion of strlcpy
- Developer Blog discussion of strlcpy and mempcpy