1994-05-27 05:00:24 +00:00
|
|
|
.\" Copyright (c) 1990, 1991, 1993
|
|
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" This code is derived from software contributed to Berkeley by
|
|
|
|
.\" Chris Torek and the American National Standards Committee X3,
|
|
|
|
.\" on Information Processing Systems.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\" 4. Neither the name of the University nor the names of its contributors
|
|
|
|
.\" may be used to endorse or promote products derived from this software
|
|
|
|
.\" without specific prior written permission.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.\"
|
|
|
|
.\" @(#)fgets.3 8.1 (Berkeley) 6/4/93
|
1999-08-28 00:22:10 +00:00
|
|
|
.\" $FreeBSD$
|
1994-05-27 05:00:24 +00:00
|
|
|
.\"
|
|
|
|
.Dd June 4, 1993
|
|
|
|
.Dt FGETS 3
|
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm fgets ,
|
|
|
|
.Nm gets
|
|
|
|
.Nd get a line from a stream
|
2000-04-21 09:42:15 +00:00
|
|
|
.Sh LIBRARY
|
|
|
|
.Lb libc
|
1994-05-27 05:00:24 +00:00
|
|
|
.Sh SYNOPSIS
|
2001-10-01 16:09:29 +00:00
|
|
|
.In stdio.h
|
1994-05-27 05:00:24 +00:00
|
|
|
.Ft char *
|
2002-10-12 16:13:41 +00:00
|
|
|
.Fn fgets "char * restrict str" "int size" "FILE * restrict stream"
|
1994-05-27 05:00:24 +00:00
|
|
|
.Ft char *
|
|
|
|
.Fn gets "char *str"
|
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
|
|
|
.Fn fgets
|
|
|
|
function
|
|
|
|
reads at most one less than the number of characters specified by
|
1996-03-27 17:43:38 +00:00
|
|
|
.Fa size
|
1994-05-27 05:00:24 +00:00
|
|
|
from the given
|
|
|
|
.Fa stream
|
|
|
|
and stores them in the string
|
|
|
|
.Fa str .
|
|
|
|
Reading stops when a newline character is found,
|
|
|
|
at end-of-file or error.
|
|
|
|
The newline, if any, is retained.
|
1996-03-27 17:43:38 +00:00
|
|
|
If any characters are read and there is no error, a
|
1994-05-27 05:00:24 +00:00
|
|
|
.Ql \e0
|
|
|
|
character is appended to end the string.
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Fn gets
|
|
|
|
function
|
|
|
|
is equivalent to
|
|
|
|
.Fn fgets
|
|
|
|
with an infinite
|
1996-03-27 17:43:38 +00:00
|
|
|
.Fa size
|
1994-05-27 05:00:24 +00:00
|
|
|
and a
|
|
|
|
.Fa stream
|
|
|
|
of
|
2002-12-04 18:57:46 +00:00
|
|
|
.Dv stdin ,
|
1994-05-27 05:00:24 +00:00
|
|
|
except that the newline character (if any) is not stored in the string.
|
|
|
|
It is the caller's responsibility to ensure that the input line,
|
|
|
|
if any, is sufficiently short to fit in the string.
|
|
|
|
.Sh RETURN VALUES
|
|
|
|
Upon successful completion,
|
|
|
|
.Fn fgets
|
2001-07-15 07:53:42 +00:00
|
|
|
and
|
1994-05-27 05:00:24 +00:00
|
|
|
.Fn gets
|
|
|
|
return
|
|
|
|
a pointer to the string.
|
2001-07-15 07:53:42 +00:00
|
|
|
If end-of-file occurs before any characters are read,
|
1994-05-27 05:00:24 +00:00
|
|
|
they return
|
1996-03-27 17:43:38 +00:00
|
|
|
.Dv NULL
|
2002-05-31 05:01:17 +00:00
|
|
|
and the buffer contents remain unchanged.
|
1996-03-27 17:43:38 +00:00
|
|
|
If an error occurs,
|
|
|
|
they return
|
|
|
|
.Dv NULL
|
2002-05-31 05:01:17 +00:00
|
|
|
and the buffer contents are indeterminate.
|
1994-05-27 05:00:24 +00:00
|
|
|
The
|
|
|
|
.Fn fgets
|
|
|
|
and
|
|
|
|
.Fn gets
|
1996-03-27 17:43:38 +00:00
|
|
|
functions
|
1994-05-27 05:00:24 +00:00
|
|
|
do not distinguish between end-of-file and error, and callers must use
|
|
|
|
.Xr feof 3
|
|
|
|
and
|
|
|
|
.Xr ferror 3
|
|
|
|
to determine which occurred.
|
|
|
|
.Sh ERRORS
|
2000-05-06 12:07:59 +00:00
|
|
|
.Bl -tag -width Er
|
1994-05-27 05:00:24 +00:00
|
|
|
.It Bq Er EBADF
|
|
|
|
The given
|
|
|
|
.Fa stream
|
|
|
|
is not a readable stream.
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
The function
|
|
|
|
.Fn fgets
|
|
|
|
may also fail and set
|
|
|
|
.Va errno
|
|
|
|
for any of the errors specified for the routines
|
|
|
|
.Xr fflush 3 ,
|
|
|
|
.Xr fstat 2 ,
|
|
|
|
.Xr read 2 ,
|
|
|
|
or
|
|
|
|
.Xr malloc 3 .
|
|
|
|
.Pp
|
|
|
|
The function
|
|
|
|
.Fn gets
|
|
|
|
may also fail and set
|
|
|
|
.Va errno
|
|
|
|
for any of the errors specified for the routine
|
|
|
|
.Xr getchar 3 .
|
2010-05-13 12:07:55 +00:00
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr feof 3 ,
|
|
|
|
.Xr ferror 3 ,
|
|
|
|
.Xr fgetln 3 ,
|
|
|
|
.Xr fgetws 3 ,
|
|
|
|
.Xr getline 3
|
|
|
|
.Sh STANDARDS
|
|
|
|
The functions
|
|
|
|
.Fn fgets
|
|
|
|
and
|
|
|
|
.Fn gets
|
|
|
|
conform to
|
|
|
|
.St -isoC-99 .
|
2002-01-06 21:16:41 +00:00
|
|
|
.Sh SECURITY CONSIDERATIONS
|
|
|
|
The
|
|
|
|
.Fn gets
|
|
|
|
function cannot be used securely.
|
|
|
|
Because of its lack of bounds checking,
|
2002-01-06 21:48:37 +00:00
|
|
|
and the inability for the calling program
|
|
|
|
to reliably determine the length of the next incoming line,
|
2002-01-06 21:16:41 +00:00
|
|
|
the use of this function enables malicious users
|
|
|
|
to arbitrarily change a running program's functionality through
|
|
|
|
a buffer overflow attack.
|
2002-01-06 21:48:37 +00:00
|
|
|
It is strongly suggested that the
|
|
|
|
.Fn fgets
|
|
|
|
function be used in all cases.
|
2002-01-06 21:16:41 +00:00
|
|
|
(See
|
|
|
|
the FSA.)
|