I'm having a hard time understanding why you would need asprintf. Here in the manual it says
The functions
asprintf()
andvasprintf()
are analogs ofsprintf(3)
andvsprintf(3)
, except that they allocate a string large enough to hold the output including the terminating null byte, and return a pointer to it via the first argument. This pointer should be passed tofree(3)
to release the allocated storage when it is no longer needed.
So here is the example that I'm trying to understand:
asprintf(&buffer, "/bin/echo %s is cool", getenv("USER"));
What's the difference if the buffer allocates a string large enough vs saying char* = (string)
The asprintf (mnemonic: "allocating string print formatted") command is identical to printf , except that its first parameter is a string to which to send output. It terminates the string with a null character. It returns the number of characters stored in the string, not including the terminating null.
Like any library routine, sprintf and snprintf may or may not allocate memory for internal use. They will not allocate memory for the resulting string. That memory must be allocated somehow by the caller, and its address passed as the first argument.
snprintf is essentially a function that redirects the output of printf to a buffer. This is particularly useful for avoiding repetition of a formatted string. You can build a string once and use printf("%s", mystr) instead of print("%d,%s,%f,%d", x,y,z,a) every time, which gets cumbersome with actual variable names.
If you use sprintf()
or vsprintf()
, you need to allocate a buffer first, and you need to be sure that the buffer is large enough to contain what sprintf writes. Otherwise sprintf()
will happily overwrite whatever memory lies beyond the end of the buffer.
char* x = malloc(5 * sizeof(char)); // writes "123456" +null but overruns the buffer sprintf(x,"%s%s%s", "12", "34", "56");
... writes the '6' and the terminating null
beyond the end of the space allocated to x
, either corrupting some other variable, or causing a segmentation fault.
If you're lucky, it will trample on memory in-between allocated blocks, and will do no harm -- this time. This leads to intermittent bugs -- the hardest kind to diagnose. It's good to use a tool like ElectricFence that causes overruns to fail-fast.
A non-malicious user who provides an overlong input, could cause the program to behave in unexpected ways. A malicious user could exploit this as a way to get their own executable code into the system.
One guard against this is to use snprintf()
, which truncates the string to the maximum length you supply.
char *x = malloc(5 * sizeof(char)); int size = snprintf(x, 5, "%s%s%s", "12", "34", "56"); // writes "1234" + null
The return value size
is the length that would have been written if space was available -- not including the terminating null.
In this case, if size
is greater than or equal to 5 then you know that truncation occurred - and if you didn't want truncation, you could allocate a new string and try snprintf()
again.
char *x = malloc(BUF_LEN * sizeof(char)); int size = snprintf(x, 5, "%s%s%s", "12", "34", "56"); if (size >= BUF_LEN) { realloc(&x,(size + 1) * sizeof(char)); snprintf(x, size + 1 , "%s%s%s", "12", "34", "56"); }
(That's a pretty naive algorithm, but it illustrates the point. There may yet be bugs in it, which further illustrates the point -- this stuff is easy to screw up.)
asprintf()
does this in one step for you - calculates the length of the string, allocates that amount of memory, and writes the string into it.
char *x; int size = asprintf(&x, "%s%s%s", "12", "34", "56");
In all cases, once you've finished with x
you need to release it, or you leak memory:
free(x);
asprintf()
is an implicit malloc()
, so you have to check it worked, just as you would with malloc()
or any other system call.
if (size == -1 ) { /* deal with error in some way */ }
Note that asprintf()
is part of the GNU and BSD extensions to libc - you can't be sure it will be available in every C environment. sprintf()
and snprintf()
are part of the POSIX and C99 standards.
The benefit is security.
Numerous programs have allowed system exploits to occur by having programmer-supplied buffers overflowed when filled with user supplied data.
Having asprintf
allocate the buffer for you guarantees that can't happen.
However you must check the return value of asprintf
to ensure that the memory allocation actually succeeded. See http://blogs.23.nu/ilja/2006/10/antville-12995/
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With