Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ns_threadstrcopy(3aolserv) [debian man page]

Ns_ThreadAlloc(3aolserver)				   AOLserver Library Procedures 				Ns_ThreadAlloc(3aolserver)

__________________________________________________________________________________________________________________________________________________

NAME
Ns_ThreadAlloc, Ns_ThreadCalloc, Ns_ThreadFree, Ns_ThreadMalloc, Ns_ThreadPool, Ns_ThreadRealloc, Ns_ThreadStrCopy, Ns_ThreadStrDup - Mem- ory allocation functions for threads (deprecated) SYNOPSIS
#include "ns.h" void * Ns_ThreadAlloc(size_t size) void * Ns_ThreadCalloc(size_t nelem, size_t elsize) void Ns_ThreadFree(void *ptr) void * Ns_ThreadMalloc(size_t size) Ns_Pool * Ns_ThreadPool(void) void * Ns_ThreadRealloc(void *ptr, size_t size) char * Ns_ThreadStrCopy(char *str) char * Ns_ThreadStrDup(char *str) _________________________________________________________________ DESCRIPTION
These functions are deprecated and are actually wrappers around other functions. You should use the other functions directly. Ns_ThreadAlloc(size) A wrapper for Ns_ThreadMalloc. Ns_ThreadCalloc(nelem, elsize) A wrapper for ns_calloc. Ns_ThreadFree(ptr) A wrapper for ns_free. Ns_ThreadMalloc(size) A wrapper for ns_malloc. Ns_ThreadPool() Deprecated. Always returns a -1. Ns_ThreadRealloc(ptr, size) A wrapper for ns_realloc. Ns_ThreadStrCopy(str) A wrapper for ns_strcopy. Ns_ThreadStrDup(str) A wrapper for ns_strdup. SEE ALSO
nsd(1), info(n), ns_calloc(3), ns_malloc(3), ns_realloc(3), ns_free(3), ns_strcopy(3), ns_strdup(3) KEYWORDS
AOLserver 4.0 Ns_ThreadAlloc(3aolserver)

Check Out this Related Man Page

SSP(3)							   BSD Library Functions Manual 						    SSP(3)

NAME
ssp -- bounds checked libc functions LIBRARY
Buffer Overflow Protection Library (libssp, -lssp) SYNOPSIS
#include <ssp/stdio.h> int sprintf(char *str, const char *fmt, ...); int vsprintf(char *str, const char *fmt, va_list ap); int snprintf(char *str, size_t len, const char *fmt, ...); int vsnprintf(char *str, size_t len, const char *fmt, va_list ap); char * gets(char *str); char * fgets(char *str, int len, FILE *fp); #include <ssp/string.h> void * memcpy(void *str, const void *ptr, size_t len); void * memmove(void *str, const void *ptr, size_t len); void * memset(void *str, int val, size_t len); char * strcpy(char *str, const char *ptr, size_t len); char * strcat(char *str, const char *ptr, size_t len); char * strncpy(char *str, const char *ptr, size_t len); char * strncat(char *str, const char *ptr, size_t len); #include <ssp/strings.h> void * bcopy(const void *ptr, void *str, size_t len); void * bzero(void *str, size_t len); #include <ssp/unistd.h> ssize_t read(int fd, void *str, size_t len); int readlink(const char * restrict path, char * restrict str, size_t len); int getcwd(char *str, size_t len); DESCRIPTION
When _FORTIFY_SOURCE bounds checking is enabled as described below, the above functions get overwritten to use the __builtin_object_size(3) function to compute the size of str, if known at compile time, and perform bounds check on it in order to avoid data buffer or stack buffer overflows. If an overflow is detected, the routines will call abort(3). To enable these function overrides the following should be added to the gcc(1) command line: ``-I/usr/include/ssp'' to override the standard include files and ``-D_FORTIFY_SOURCE=1'' or ``-D_FORTIFY_SOURCE=2''. If _FORTIFY_SOURCE is set to 1 the code will compute the maximum possible buffer size for str, and if set to 2 it will compute the minimum buffer size. SEE ALSO
gcc(1), __builtin_object_size(3), stdio(3), string(3), security(7) HISTORY
The ssp library appeared NetBSD 4.0. BSD
March 21, 2011 BSD
Man Page