X-Git-Url: https://pd.if.org/git/?a=blobdiff_plain;f=includes%2Fstdio.h;h=9b68d73d7f0c6a1618f34a04440b6dae0a582593;hb=a55b8838b33fbdc8edea70cae7d10e3d9ef95a94;hp=9d423c1ec031e818c557cf2b55cc41529d0d1b04;hpb=99677c35ae2bfd651274191143e140d730fc9925;p=pdclib.old diff --git a/includes/stdio.h b/includes/stdio.h index 9d423c1..9b68d73 100644 --- a/includes/stdio.h +++ b/includes/stdio.h @@ -684,13 +684,18 @@ int getc( FILE * stream ) _PDCLIB_nothrow; /* Equivalent to fgetc( stdin ). */ int getchar( void ) _PDCLIB_nothrow; +#if _PDCLIB_C_MAX(1999) /* Read characters from given stream into the array s, stopping at \n or EOF. The string read is terminated with \0. Returns s if successful. If EOF is encountered before any characters are read, the contents of s are unchanged, and NULL is returned. If a read error occurs, the contents of s are indeter- minate, and NULL is returned. + + This function is dangerous and has been a great source of security + vulnerabilities. Do not use it. It was removed by C11. */ -char * gets( char * s ) _PDCLIB_nothrow; +char * gets( char * s ) _PDCLIB_DEPRECATED _PDCLIB_nothrow; +#endif /* Equivalent to fputc( c, stream ), but may be overloaded by a macro that evaluates its parameter more than once. @@ -849,7 +854,6 @@ int putchar_unlocked(int c); void clearerr_unlocked(FILE *stream); int feof_unlocked(FILE *stream); int ferror_unlocked(FILE *stream); -int fileno_unlocked(FILE *stream); int fflush_unlocked(FILE *stream); int fgetc_unlocked(FILE *stream); int fputc_unlocked(int c, FILE *stream); @@ -867,6 +871,7 @@ int fgetpos_unlocked( FILE * _PDCLIB_restrict stream, fpos_t * _PDCLIB_restrict int fsetpos_unlocked( FILE * stream, const fpos_t * pos ) _PDCLIB_nothrow; long int ftell_unlocked( FILE * stream ) _PDCLIB_nothrow; int fseek_unlocked( FILE * stream, long int offset, int whence ) _PDCLIB_nothrow; +void rewind_unlocked( FILE * stream ) _PDCLIB_nothrow; int puts_unlocked( const char * s ) _PDCLIB_nothrow; int ungetc_unlocked( int c, FILE * stream ) _PDCLIB_nothrow;