Casper Dik writes:
>    char *stpcpy(char  *restrict s1, const char *restrict s2);
>    char *stpncpy(char *restrict s1, const char *restrict s2, size_t n);
>    wchar_t *wcpcpy(wchar_t  restrict *ws1, const wchar_t *restrict ws2);
>    wchar_t *wcpncpy(wchar_t restrict *ws1, const wchar_t *restrict ws2, 
> size_t 
> n);

The lint maintainers be notified so that they can add stpcpy and
wcpcpy to their list of security-questionable functions warned about
via -errsecurity.  (At least file an RFE.)

This looks to me like a standards-related blunder.  "stpncpy" and
"wcpncpy" functionality (strncpy-like zero pad to end of the buffer,
*and* leaving full destination buffers unterminated) doesn't seem to
make much sense in this context.

I think it's a shame they didn't do stplcpy and wcplcpy instead.  Do
we have anyone involved in the standards process who could add
comments?

Apart from that, big sigh, nose held, and +1.

-- 
James Carlson, Solaris Networking              <james.d.carlson at sun.com>
Sun Microsystems / 35 Network Drive        71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677

Reply via email to