[3abfe9a8] | 1 | /*
|
---|
| 2 | * Copyright (c) 2011 Martin Decky
|
---|
[a68003f] | 3 | * All rights reserved.
|
---|
| 4 | *
|
---|
| 5 | * Redistribution and use in source and binary forms, with or without
|
---|
| 6 | * modification, are permitted provided that the following conditions
|
---|
| 7 | * are met:
|
---|
| 8 | *
|
---|
| 9 | * - Redistributions of source code must retain the above copyright
|
---|
| 10 | * notice, this list of conditions and the following disclaimer.
|
---|
| 11 | * - Redistributions in binary form must reproduce the above copyright
|
---|
| 12 | * notice, this list of conditions and the following disclaimer in the
|
---|
| 13 | * documentation and/or other materials provided with the distribution.
|
---|
| 14 | * - The name of the author may not be used to endorse or promote products
|
---|
| 15 | * derived from this software without specific prior written permission.
|
---|
| 16 | *
|
---|
| 17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
---|
| 18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
---|
| 19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
---|
| 20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
---|
| 21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
---|
| 22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
---|
| 23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
---|
| 24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
---|
| 25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
---|
| 26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
---|
| 27 | */
|
---|
| 28 |
|
---|
[3abfe9a8] | 29 | /** @addtogroup generic
|
---|
[b45c443] | 30 | * @{
|
---|
| 31 | */
|
---|
| 32 |
|
---|
[3abfe9a8] | 33 | /**
|
---|
| 34 | * @file
|
---|
| 35 | * @brief Memory string functions.
|
---|
| 36 | *
|
---|
| 37 | * This file provides architecture independent functions to manipulate blocks
|
---|
| 38 | * of memory. These functions are optimized as much as generic functions of
|
---|
| 39 | * this type can be.
|
---|
| 40 | */
|
---|
[a68003f] | 41 |
|
---|
[3abfe9a8] | 42 | #include <lib/memfnc.h>
|
---|
| 43 | #include <typedefs.h>
|
---|
[a68003f] | 44 |
|
---|
[3abfe9a8] | 45 | /** Fill block of memory.
|
---|
| 46 | *
|
---|
| 47 | * Fill cnt bytes at dst address with the value val.
|
---|
| 48 | *
|
---|
| 49 | * @param dst Destination address to fill.
|
---|
| 50 | * @param val Value to fill.
|
---|
| 51 | * @param cnt Number of bytes to fill.
|
---|
| 52 | *
|
---|
| 53 | * @return Destination address.
|
---|
| 54 | *
|
---|
| 55 | */
|
---|
| 56 | void *memset(void *dst, int val, size_t cnt)
|
---|
| 57 | {
|
---|
[9c779e9] | 58 | uint8_t *dp = (uint8_t *) dst;
|
---|
[3abfe9a8] | 59 |
|
---|
[9c779e9] | 60 | while (cnt-- != 0)
|
---|
| 61 | *dp++ = val;
|
---|
[3abfe9a8] | 62 |
|
---|
| 63 | return dst;
|
---|
| 64 | }
|
---|
[a68003f] | 65 |
|
---|
[3abfe9a8] | 66 | /** Move memory block without overlapping.
|
---|
| 67 | *
|
---|
| 68 | * Copy cnt bytes from src address to dst address. The source
|
---|
| 69 | * and destination memory areas cannot overlap.
|
---|
| 70 | *
|
---|
| 71 | * @param dst Destination address to copy to.
|
---|
| 72 | * @param src Source address to copy from.
|
---|
| 73 | * @param cnt Number of bytes to copy.
|
---|
| 74 | *
|
---|
| 75 | * @return Destination address.
|
---|
| 76 | *
|
---|
| 77 | */
|
---|
| 78 | void *memcpy(void *dst, const void *src, size_t cnt)
|
---|
| 79 | {
|
---|
| 80 | uint8_t *dp = (uint8_t *) dst;
|
---|
| 81 | const uint8_t *sp = (uint8_t *) src;
|
---|
| 82 |
|
---|
| 83 | while (cnt-- != 0)
|
---|
[9c779e9] | 84 | *dp++ = *sp++;
|
---|
[3abfe9a8] | 85 |
|
---|
| 86 | return dst;
|
---|
| 87 | }
|
---|
[b45c443] | 88 |
|
---|
[06e1e95] | 89 | /** @}
|
---|
[b45c443] | 90 | */
|
---|