This macro indicates the basic character set and encoding used by the host: more precisely, the encoding used for character constants in preprocessor `#if' statements (the C "execution character set"). It is defined by safe-ctype.h, and will be an integer constant with one of the following values:
HOST_CHARSET_UNKNOWN
- The host character set is unknown - that is, not one of the next two possibilities.
HOST_CHARSET_ASCII
- The host character set is ASCII.
HOST_CHARSET_EBCDIC
- The host character set is some variant of EBCDIC. (Only one of the nineteen EBCDIC varying characters is tested; exercise caution.)
This function allocates memory which will be automatically reclaimed after the procedure exits. The
libiberty
implementation does not free the memory immediately but will do so eventually during subsequent calls to this function. Memory is allocated usingxmalloc
under normal circumstances.The header file alloca-conf.h can be used in conjunction with the GNU Autoconf test
AC_FUNC_ALLOCA
to test for and properly make available this function. TheAC_FUNC_ALLOCA
test requires that client code use a block of preprocessor code to be safe (see the Autoconf manual for more); this header incorporates that logic and more, including the possibility of a GCC built-in function.
Like
sprintf
, but instead of passing a pointer to a buffer, you pass a pointer to a pointer. This function will compute the size of the buffer needed, allocate memory withmalloc
, and store a pointer to the allocated memory in*
resptr. The value returned is the same assprintf
would return. If memory could not be allocated, minus one is returned andNULL
is stored in*
resptr.
Returns a pointer to the last component of pathname name. Behavior is undefined if the pathname ends in a directory separator.
Compares the first count bytes of two areas of memory. Returns zero if they are the same, nonzero otherwise. Returns zero if count is zero. A nonzero result only indicates a difference, it does not indicate any sorting order (say, by having a positive result mean x sorts before y).
Copies length bytes from memory region in to region out. The use of
bcopy
is deprecated in new programs.
Performs a search over an array of nmemb elements pointed to by base for a member that matches the object pointed to by key. The size of each member is specified by size. The array contents should be sorted in ascending order according to the compar comparison function. This routine should take two arguments pointing to the key and to an array member, in that order, and should return an integer less than, equal to, or greater than zero if the key object is respectively less than, matching, or greater than the array member.
Given a pointer to a string, parse the string extracting fields separated by whitespace and optionally enclosed within either single or double quotes (which are stripped off), and build a vector of pointers to copies of the string for each field. The input string remains unchanged. The last element of the vector is followed by a
NULL
element.All of the memory for the pointer array and copies of the string is obtained from
malloc
. All of the memory can be returned to the system with the single function callfreeargv
, which takes the returned result ofbuildargv
, as it's argument.Returns a pointer to the argument vector if successful. Returns
NULL
if sp isNULL
or if there is insufficient memory to complete building the argument vector.If the input is a null string (as opposed to a
NULL
pointer), then buildarg returns an argument vector that has one arg, a null string.
Zeros count bytes starting at mem. Use of this function is deprecated in favor of
memset
.
Uses
malloc
to allocate storage for nelem objects of elsize bytes each, then zeros the memory.
Return a prefix for temporary file names or
NULL
if unable to find one. The current directory is chosen if all else fails so the program is exited if a temporary directory can't be found (mktemp
fails). The buffer for the result is obtained withxmalloc
.This function is provided for backwards compatability only. Its use is not recommended.
Returns a pointer to a directory path suitable for creating temporary files in.
Returns an approximation of the CPU time used by the process as a
clock_t
; divide this number by `CLOCKS_PER_SEC' to get the number of seconds used.
NULL
)Concatenate zero or more of strings and return the result in freshly
xmalloc
ed memory. ReturnsNULL
if insufficient memory is available. The argument list is terminated by the firstNULL
pointer encountered. Pointers to empty strings are ignored.
Duplicate an argument vector. Simply scans through vector, duplicating each argument until the terminating
NULL
is found. Returns a pointer to the argument vector if successful. ReturnsNULL
if there is insufficient memory to complete building the argument vector.
Returns the maximum
errno
value for which a corresponding symbolic name or message is available. Note that in the case where we use thesys_errlist
supplied by the system, it is possible for there to be more symbolic names than messages, or vice versa. In fact, the manual page forperror(3C)
explicitly warns that one should check the size of the table (sys_nerr
) before indexing it, since new error codes may be added to the system before they are added to the table. Thussys_nerr
might be smaller than value implied by the largesterrno
value defined in<errno.h>
.We return the maximum value that can be used to obtain a meaningful symbolic name or message.
The argcp and
argvp
arguments are pointers to the usualargc
andargv
arguments tomain
. This function looks for arguments that begin with the character `@'. Any such arguments are interpreted as “response files”. The contents of the response file are interpreted as additional command line options. In particular, the file is separated into whitespace-separated strings; each such string is taken as a command-line option. The new options are inserted in place of the option naming the response file, and*argcp
and*argvp
will be updated. If the value of*argvp
is modified by this function, then the new value has been dynamically allocated and can be deallocated by the caller withfreeargv
. However, most callers will simply callexpandargv
near the beginning ofmain
and allow the operating system to free the memory when the program exits.
Check to see if two open file descriptors refer to the same file. This is useful, for example, when we have an open file descriptor for an unnamed file, and the name of a file that we believe to correspond to that fd. This can happen when we are exec'd with an already open file (
stdout
for example) or from the SVR4 /proc calls that return open file descriptors for mapped address spaces. All we have to do is open the file by name and check the two file descriptors for a match, which is done by comparing major and minor device numbers and inode numbers.
Opens and returns a
FILE
pointer viafdopen
. If the operating system supports it, ensure that the stream is setup to avoid any multi-threaded locking. Otherwise return theFILE
pointer unchanged.
Find the first (least significant) bit set in valu. Bits are numbered from right to left, starting with bit 1 (corresponding to the value 1). If valu is zero, zero is returned.
Matches string against pattern, returning zero if it matches,
FNM_NOMATCH
if not. pattern may contain the wildcards?
to match any one character,*
to match any zero or more characters, or a set of alternate characters in square brackets, like `[a-gt8]', which match one character (a
throughg
, ort
, or8
, in this example) if that one character is in the set. A set may be inverted (i.e., match anything except what's in the set) by giving^
or!
as the first character in the set. To include those characters in the set, list them as anything other than the first character of the set. To include a dash in the set, list it last in the set. A backslash character makes the following character not special, so for example you could match against a literal asterisk with `\*'. To match a literal backslash, use `\\'.
flags
controls various aspects of the matching process, and is a boolean OR of zero or more of the following values (defined in<fnmatch.h>
):
FNM_PATHNAME
FNM_FILE_NAME
- string is assumed to be a path name. No wildcard will ever match
/
.FNM_NOESCAPE
- Do not interpret backslashes as quoting the following special character.
FNM_PERIOD
- A leading period (at the beginning of string, or if
FNM_PATHNAME
after a slash) is not matched by*
or?
but must be matched explicitly.FNM_LEADING_DIR
- Means that string also matches pattern if some initial part of string matches, and is followed by
/
and zero or more characters. For example, `foo*' would match either `foobar' or `foobar/grill'.FNM_CASEFOLD
- Ignores case when performing the comparison.
Opens and returns a
FILE
pointer viafopen
. If the operating system supports it, ensure that the stream is setup to avoid any multi-threaded locking. Otherwise return theFILE
pointer unchanged.
Free an argument vector that was built using
buildargv
. Simply scans through vector, freeing the memory for each argument until the terminatingNULL
is found, and then frees vector itself.
Opens and returns a
FILE
pointer viafreopen
. If the operating system supports it, ensure that the stream is setup to avoid any multi-threaded locking. Otherwise return theFILE
pointer unchanged.
Returns the time used so far, in microseconds. If possible, this is the time used by this process, else it is the elapsed time since the process started.
Copy the absolute pathname for the current working directory into pathname, which is assumed to point to a buffer of at least len bytes, and return a pointer to the buffer. If the current directory's path doesn't fit in len characters, the result is
NULL
anderrno
is set. If pathname is a null pointer,getcwd
will obtain len bytes of space usingmalloc
.
Returns the number of bytes in a page of memory. This is the granularity of many of the system memory management routines. No guarantee is made as to whether or not it is the same as the basic memory management hardware page size.
Returns the current working directory. This implementation caches the result on the assumption that the process will not call
chdir
between calls togetpwd
.
Writes the current time to tp. This implementation requires that tz be NULL. Returns 0 on success, -1 on failure.
Initializes the array mapping the current character set to corresponding hex values. This function must be called before any call to
hex_p
orhex_value
. If you fail to call it, a default ASCII-based table will normally be used on ASCII systems.
Evaluates to non-zero if the given character is a valid hex character, or zero if it is not. Note that the value you pass will be cast to
unsigned char
within the macro.
Returns the numeric equivalent of the given character when interpreted as a hexidecimal digit. The result is undefined if you pass an invalid hex digit. Note that the value you pass will be cast to
unsigned char
within the macro.The
hex_value
macro returnsunsigned int
, rather than signedint
, to make it easier to use in parsing addresses from hex dump files: a signedint
would be sign-extended when converted to a wider unsigned type — likebfd_vma
, on some systems.
Returns a pointer to the first occurrence of the character c in the string s, or
NULL
if not found. The use ofindex
is deprecated in new programs in favor ofstrchr
.
Routines to manipulate queues built from doubly linked lists. The
insque
routine inserts elem in the queue immediately after pred. Theremque
routine removes elem from its containing queue. These routines expect to be passed pointers to structures which have as their first members a forward pointer and a back pointer, like this prototype (although no prototype is provided):struct qelem { struct qelem *q_forw; struct qelem *q_back; char q_data[]; };
These twelve macros are defined by safe-ctype.h. Each has the same meaning as the corresponding macro (with name in lowercase) defined by the standard header ctype.h. For example,
ISALPHA
returns true for alphabetic characters and false for others. However, there are two differences between these macros and those provided by ctype.h:
- These macros are guaranteed to have well-defined behavior for all values representable by
signed char
andunsigned char
, and forEOF
.- These macros ignore the current locale; they are true for these fixed sets of characters:
ALPHA
A-Za-z ALNUM
A-Za-z0-9 BLANK
space tab CNTRL
DIGIT
0-9 GRAPH
ALNUM || PUNCT
LOWER
a-z GRAPH ||
spacePUNCT
`~!@#$%^&*()_-=+[{]}\|;:'",<.>/? SPACE
space tab \n \r \f \v UPPER
A-Z XDIGIT
0-9A-Fa-f Note that, if the host character set is ASCII or a superset thereof, all these macros will return false for all values of
char
outside the range of 7-bit ASCII. In particular, both ISPRINT and ISCNTRL return false for characters with numeric values from 128 to 255.
These six macros are defined by safe-ctype.h and provide additional character classes which are useful when doing lexical analysis of C or similar languages. They are true for the following sets of characters:
IDNUM
A-Za-z0-9_ IDST
A-Za-z_ VSPACE
\r \n NVSPACE
space tab \f \v \0 SPACE_OR_NUL
VSPACE || NVSPACE
ISOBASIC
VSPACE || NVSPACE || PRINT
Given a pointer to a string containing a typical pathname (`/usr/src/cmd/ls/ls.c' for example), returns a pointer to the last component of the pathname (`ls.c' in this case). The returned pointer is guaranteed to lie within the original string. This latter fact is not true of many vendor C libraries, which return special strings or modify the passed strings for particular input.
In particular, the empty string returns the same empty string, and a path ending in
/
returns the empty string after it.
Given a pointer to a string containing a pathname, returns a canonical version of the filename. Symlinks will be resolved, and “.” and “..” components will be simplified. The returned value will be allocated using
malloc
, orNULL
will be returned on a memory allocation error.
Given three paths progname, bin_prefix, prefix, return the path that is in the same position relative to progname's directory as prefix is relative to bin_prefix. That is, a string starting with the directory portion of progname, followed by a relative pathname of the difference between bin_prefix and prefix.
If progname does not contain any directory separators,
make_relative_prefix
will search PATH to find a program named progname. Also, if progname is a symbolic link, the symbolic link will be resolved.For example, if bin_prefix is
/alpha/beta/gamma/gcc/delta
, prefix is/alpha/beta/gamma/omega/
, and progname is/red/green/blue/gcc
, then this function will return/red/green/blue/../../omega/
.The return value is normally allocated via
malloc
. If no relative prefix can be found, returnNULL
.
Return a temporary file name (as a string) or
NULL
if unable to create one. suffix is a suffix to append to the file name. The string ismalloc
ed, and the temporary file has been created.
This function searches memory starting at
*
s for the character c. The search only ends with the first occurrence of c, or after length characters; in particular, a null character does not terminate the search. If the character c is found within length characters of*
s, a pointer to the character is returned. If c is not found, thenNULL
is returned.
Compares the first count bytes of two areas of memory. Returns zero if they are the same, a value less than zero if x is lexically less than y, or a value greater than zero if x is lexically greater than y. Note that lexical order is determined as if comparing unsigned char arrays.
Copies length bytes from memory region in to region out. Returns a pointer to out.
Copies count bytes from memory area from to memory area to, returning a pointer to to.
Copies length bytes from memory region in to region out. Returns a pointer to out + length.
Sets the first count bytes of s to the constant byte c, returning a pointer to s.
Generate a unique temporary file name from pattern. pattern has the form:
path/ccXXXXXXsuffixsuffix_len tells us how long suffix is (it can be zero length). The last six characters of pattern before suffix must be `XXXXXX'; they are replaced with a string that makes the filename unique. Returns a file descriptor open on the file for reading and writing.
Returns the exit status of all programs run using obj. count is the number of results expected. The results will be placed into vector. The results are in the order of the calls to
pex_run
. Returns 0 on error, 1 on success.
Returns the process execution times of all programs run using obj. count is the number of results expected. The results will be placed into vector. The results are in the order of the calls to
pex_run
. Returns 0 on error, 1 on success.
struct pex_time
has the following fields of the typeunsigned long
:user_seconds
,user_microseconds
,system_seconds
,system_microseconds
. On systems which do not support reporting process times, all the fields will be set to0
.
Prepare to execute one or more programs, with standard output of each program fed to standard input of the next. This is a system independent interface to execute a pipeline.
flags is a bitwise combination of the following:
PEX_RECORD_TIMES
- Record subprocess times if possible.
PEX_USE_PIPES
- Use pipes for communication between processes, if possible.
PEX_SAVE_TEMPS
- Don't delete temporary files used for communication between processes.
pname is the name of program to be executed, used in error messages. tempbase is a base name to use for any required temporary files; it may be
NULL
to use a randomly chosen name.
Return a stream for a temporary file to pass to the first program in the pipeline as input.
The name of the input file is chosen according to the same rules
pex_run
uses to choose output file names, based on in_name, obj and thePEX_SUFFIX
bit in flags.Don't call
fclose
on the returned stream; the first call topex_run
closes it automatically.If flags includes
PEX_BINARY_OUTPUT
, open the stream in binary mode; otherwise, open it in the default mode. IncludingPEX_BINARY_OUTPUT
in flags has no effect on Unix.
Return a stream fp for a pipe connected to the standard input of the first program in the pipeline; fp is opened for writing. You must have passed
PEX_USE_PIPES
to thepex_init
call that returned obj.You must close fp using
fclose
yourself when you have finished writing data to the pipeline.The file descriptor underlying fp is marked not to be inherited by child processes.
On systems that do not support pipes, this function returns
NULL
, and setserrno
toEINVAL
. If you would like to write code that is portable to all systems thepex
functions support, consider usingpex_input_file
instead.There are two opportunities for deadlock using
pex_input_pipe
:
- Most systems' pipes can buffer only a fixed amount of data; a process that writes to a full pipe blocks. Thus, if you write to fp before starting the first process, you run the risk of blocking when there is no child process yet to read the data and allow you to continue.
pex_input_pipe
makes no promises about the size of the pipe's buffer, so if you need to write any data at all before starting the first process in the pipeline, consider usingpex_input_file
instead.- Using
pex_input_pipe
andpex_read_output
together may also cause deadlock. If the output pipe fills up, so that each program in the pipeline is waiting for the next to read more data, and you fill the input pipe by writing more data to fp, then there is no way to make progress: the only process that could read data from the output pipe is you, but you are blocked on the input pipe.
An interface to permit the easy execution of a single program. The return value and most of the parameters are as for a call to
pex_run
. flags is restricted to a combination ofPEX_SEARCH
,PEX_STDERR_TO_STDOUT
, andPEX_BINARY_OUTPUT
. outname is interpreted as ifPEX_LAST
were set. On a successful return,*
status will be set to the exit status of the program.
Returns a
FILE
pointer which may be used to read the standard output of the last program in the pipeline. When this is used,PEX_LAST
should not be used in a call topex_run
. After this is called,pex_run
may no longer be called with the same obj. binary should be non-zero if the file should be opened in binary mode. Don't callfclose
on the returned file; it will be closed bypex_free
.
Execute one program in a pipeline. On success this returns
NULL
. On failure it returns an error message, a statically allocated string.obj is returned by a previous call to
pex_init
.flags is a bitwise combination of the following:
PEX_LAST
- This must be set on the last program in the pipeline. In particular, it should be set when executing a single program. The standard output of the program will be sent to outname, or, if outname is
NULL
, to the standard output of the calling program. Do not set this bit if you want to callpex_read_output
(described below). After a call topex_run
with this bit set, pex_run may no longer be called with the same obj.PEX_SEARCH
- Search for the program using the user's executable search path.
PEX_SUFFIX
- outname is a suffix. See the description of outname, below.
PEX_STDERR_TO_STDOUT
- Send the program's standard error to standard output, if possible.
PEX_BINARY_INPUT
PEX_BINARY_OUTPUT
- The standard input (output) of the program should be read (written) in binary mode rather than text mode. These flags are ignored on systems which do not distinguish binary mode and text mode, such as Unix. For proper behavior these flags should match appropriately—a call to
pex_run
usingPEX_BINARY_OUTPUT
should be followed by a call usingPEX_BINARY_INPUT
.executable is the program to execute. argv is the set of arguments to pass to the program; normally argv
[0]
will be a copy of executable.outname is used to set the name of the file to use for standard output. There are two cases in which no output file will be used:
- if
PEX_LAST
is not set in flags, andPEX_USE_PIPES
was set in the call topex_init
, and the system supports pipes- if
PEX_LAST
is set in flags, and outname isNULL
Otherwise the code will use a file to hold standard output. If
PEX_LAST
is not set, this file is considered to be a temporary file, and it will be removed when no longer needed, unlessPEX_SAVE_TEMPS
was set in the call topex_init
.There are two cases to consider when setting the name of the file to hold standard output.
PEX_SUFFIX
is set in flags. In this case outname may not beNULL
. If the tempbase parameter topex_init
was notNULL
, then the output file name is the concatenation of tempbase and outname. If tempbase wasNULL
, then the output file name is a random file name ending in outname.PEX_SUFFIX
was not set in flags. In this case, if outname is notNULL
, it is used as the output file name. If outname isNULL
, and tempbase was not NULL, the output file name is randomly chosen using tempbase. Otherwise the output file name is chosen completely at random.errname is the file name to use for standard error output. If it is
NULL
, standard error is the same as the caller's. Otherwise, standard error is written to the named file.On an error return, the code sets
*
err to anerrno
value, or to 0 if there is no relevanterrno
.
Execute one program in a pipeline, permitting the environment for the program to be specified. Behaviour and parameters not listed below are as for
pex_run
.env is the environment for the child process, specified as an array of character pointers. Each element of the array should point to a string of the form
VAR=VALUE
, with the exception of the last element that must beNULL
.
This is the old interface to execute one or more programs. It is still supported for compatibility purposes, but is no longer documented.
Print message to the standard error, followed by a colon, followed by the description of the signal specified by signo, followed by a newline.
Uses
setenv
orunsetenv
to put string into the environment or remove it. If string is of the form `name=value' the string is added; if no `=' is present the name is unset/removed.
Another part of the old execution interface.
Random number functions.
random
returns a random number in the range 0 toLONG_MAX
.srandom
initializes the random number generator to some starting point determined by seed (else, the values returned byrandom
are always the same for each run of the program).initstate
andsetstate
allow fine-grained control over the state of the random number generator.
NULL
)Same as
concat
, except that if optr is notNULL
it is freed after the string is created. This is intended to be useful when you're extending an existing string or building up a string in a loop:str = reconcat (str, "pre-", str, NULL);
Renames a file from old to new. If new already exists, it is removed.
Returns a pointer to the last occurrence of the character c in the string s, or
NULL
if not found. The use ofrindex
is deprecated in new programs in favor ofstrrchr
.
setenv
adds name to the environment with value value. If the name was already present in the environment, the new value will be stored only if overwrite is nonzero. The companionunsetenv
function removes name from the environment. This implementation is not safe for multithreaded code.
Returns the maximum signal value for which a corresponding symbolic name or message is available. Note that in the case where we use the
sys_siglist
supplied by the system, it is possible for there to be more symbolic names than messages, or vice versa. In fact, the manual page forpsignal(3b)
explicitly warns that one should check the size of the table (NSIG
) before indexing it, since new signal codes may be added to the system before they are added to the table. ThusNSIG
might be smaller than value implied by the largest signo value defined in<signal.h>
.We return the maximum value that can be used to obtain a meaningful symbolic name or message.
Sets the signal mask to the one provided in set and returns the old mask (which, for libiberty's implementation, will always be the value
1
).
This function is similar to sprintf, but it will print at most n characters. On error the return value is -1, otherwise it returns the number of characters that would have been printed had n been sufficiently large, regardless of the actual value of n. Note some pre-C99 system libraries do not implement this correctly so users cannot generally rely on the return value if the system version of this function is used.
Returns a pointer to a memory region filled with the specified number of spaces and null terminated. The returned pointer is valid until at least the next call.
Copies the string src into dst. Returns a pointer to dst + strlen(src).
Copies the string src into dst, copying exactly len and padding with zeros if necessary. If len < strlen(src) then return dst + len, otherwise returns dst + strlen(src).
Returns a pointer to the first occurrence of the character c in the string s, or
NULL
if not found. If c is itself the null character, the results are undefined.
Returns a pointer to a copy of s in memory obtained from
malloc
, orNULL
if insufficient memory was available.
Given an error number returned from a system call (typically returned in
errno
), returns a pointer to a string containing the symbolic name of that error number, as found in<errno.h>
.If the supplied error number is within the valid range of indices for symbolic names, but no name is available for the particular error number, then returns the string `Error num', where num is the error number.
If the supplied error number is not within the range of valid indices, then returns
NULL
.The contents of the location pointed to are only guaranteed to be valid until the next call to
strerrno
.
Maps an
errno
number to an error message string, the contents of which are implementation defined. On systems which have the external variablessys_nerr
andsys_errlist
, these strings will be the same as the ones used byperror
.If the supplied error number is within the valid range of indices for the
sys_errlist
, but no message is available for the particular error number, then returns the string `Error num', where num is the error number.If the supplied error number is not a valid index into
sys_errlist
, returnsNULL
.The returned string is only guaranteed to be valid only until the next call to
strerror
.
Compares the first n bytes of two strings, returning a value as
strcmp
.
Returns a pointer to a copy of s with at most n characters in memory obtained from
malloc
, orNULL
if insufficient memory was available. The result is always NUL terminated.
Returns a pointer to the last occurrence of the character c in the string s, or
NULL
if not found. If c is itself the null character, the results are undefined.
Maps an signal number to an signal message string, the contents of which are implementation defined. On systems which have the external variable
sys_siglist
, these strings will be the same as the ones used bypsignal()
.If the supplied signal number is within the valid range of indices for the
sys_siglist
, but no message is available for the particular signal number, then returns the string `Signal num', where num is the signal number.If the supplied signal number is not a valid index into
sys_siglist
, returnsNULL
.The returned string is only guaranteed to be valid only until the next call to
strsignal
.
Given an signal number, returns a pointer to a string containing the symbolic name of that signal number, as found in
<signal.h>
.If the supplied signal number is within the valid range of indices for symbolic names, but no name is available for the particular signal number, then returns the string `Signal num', where num is the signal number.
If the supplied signal number is not within the range of valid indices, then returns
NULL
.The contents of the location pointed to are only guaranteed to be valid until the next call to
strsigno
.
This function searches for the substring sub in the string string, not including the terminating null characters. A pointer to the first occurrence of sub is returned, or
NULL
if the substring is absent. If sub points to a string with zero length, the function returns string.
This ISO C function converts the initial portion of string to a
double
. If endptr is notNULL
, a pointer to the character after the last character used in the conversion is stored in the location referenced by endptr. If no conversion is performed, zero is returned and the value of string is stored in the location referenced by endptr.
Given the symbolic name of a error number (e.g.,
EACCES
), map it to an errno value. If no translation is found, returns 0.
The
strtol
function converts the string in string to a long integer value according to the given base, which must be between 2 and 36 inclusive, or be the special value 0. If base is 0,strtol
will look for the prefixes0
and0x
to indicate bases 8 and 16, respectively, else default to base 10. When the base is 16 (either explicitly or implicitly), a prefix of0x
is allowed. The handling of endptr is as that ofstrtod
above. Thestrtoul
function is the same, except that the converted value is unsigned.
Given the symbolic name of a signal, map it to a signal number. If no translation is found, returns 0.
The
strverscmp
function compares the string s1 against s2, considering them as holding indices/version numbers. Return value follows the same conventions as found in thestrverscmp
function. In fact, if s1 and s2 contain no digits,strverscmp
behaves likestrcmp
.Basically, we compare strings normally (character by character), until we find a digit in each string - then we enter a special comparison mode, where each sequence of digits is taken as a whole. If we reach the end of these two parts without noticing a difference, we return to the standard comparison mode. There are two types of numeric parts: "integral" and "fractional" (those begin with a '0'). The types of the numeric parts affect the way we sort them:
- integral/integral: we compare values as you would expect.
- fractional/integral: the fractional part is less than the integral one. Again, no surprise.
- fractional/fractional: the things become a bit more complex. If the common prefix contains only leading zeroes, the longest part is less than the other one; else the comparison behaves normally.
strverscmp ("no digit", "no digit") => 0 // same behavior as strcmp. strverscmp ("item#99", "item#100") => <0 // same prefix, but 99 < 100. strverscmp ("alpha1", "alpha001") => >0 // fractional part inferior to integral one. strverscmp ("part1_f012", "part1_f01") => >0 // two fractional parts. strverscmp ("foo.009", "foo.0") => <0 // idem, but with leading zeroes only.This function is especially useful when dealing with filename sorting, because filenames frequently hold indices/version numbers.
This function attempts to create a name for a temporary file, which will be a valid file name yet not exist when
tmpnam
checks for it. s must point to a buffer of at leastL_tmpnam
bytes, or beNULL
. Use of this function creates a security risk, and it must not be used in new projects. Usemkstemp
instead.
Unlinks the named file, unless it is special (e.g. a device file). Returns 0 when the file was unlinked, a negative value (and errno set) when there was an error deleting the file, and a positive value if no attempt was made to unlink the file because it is special.
If the OS supports it, ensure that the standard I/O streams,
stdin
,stdout
andstderr
are setup to avoid any multi-threaded locking. Otherwise do nothing.
If the OS supports it, ensure that the supplied stream is setup to avoid any multi-threaded locking. Otherwise leave the
FILE
pointer unchanged. If the stream isNULL
do nothing.
Like
vsprintf
, but instead of passing a pointer to a buffer, you pass a pointer to a pointer. This function will compute the size of the buffer needed, allocate memory withmalloc
, and store a pointer to the allocated memory in*
resptr. The value returned is the same asvsprintf
would return. If memory could not be allocated, minus one is returned andNULL
is stored in*
resptr.
These functions are the same as
printf
,fprintf
, andsprintf
, respectively, except that they are called with ava_list
instead of a variable number of arguments. Note that they do not callva_end
; this is the application's responsibility. Inlibiberty
they are implemented in terms of the nonstandard but common function_doprnt
.
This function is similar to vsprintf, but it will print at most n characters. On error the return value is -1, otherwise it returns the number of characters that would have been printed had n been sufficiently large, regardless of the actual value of n. Note some pre-C99 system libraries do not implement this correctly so users cannot generally rely on the return value if the system version of this function is used.
This is a wrapper around the
wait
function. Any “special” values of pid depend on your implementation ofwait
, as does the return value. The third argument is unused inlibiberty
.
Behaves as the standard
atexit
function, but with no limit on the number of registered functions. Returns 0 on success, or −1 on failure. If you usexatexit
to register functions, you must usexexit
to terminate your program.
Allocate memory without fail, and set it to zero. This routine functions like
calloc
, but will behave the same asxmalloc
if memory cannot be found.
Terminates the program. If any functions have been registered with the
xatexit
replacement function, they will be called first. Termination is handled via the system's normalexit
call.
Allocate memory without fail. If
malloc
fails, this will print a message tostderr
(using the name set byxmalloc_set_program_name
, if any) and then callxexit
. Note that it is therefore safe for a program to contain#define malloc xmalloc
in its source.
This function is not meant to be called by client code, and is listed here for completeness only. If any of the allocation routines fail, this function will be called to print an error message and terminate execution.
You can use this to set the name of the program used by
xmalloc_failed
when printing a failure message.
Duplicates a region of memory without fail. First, alloc_size bytes are allocated, then copy_size bytes from input are copied into it, and the new memory is returned. If fewer bytes are copied than were allocated, the remaining memory is zeroed.
Reallocate memory without fail. This routine functions like
realloc
, but will behave the same asxmalloc
if memory cannot be found.
Duplicates a character string without fail, using
xmalloc
to obtain memory.