lstrcpynA function (winbase.h)
Copies a specified number of characters from a source string into a buffer.
LPSTR lstrcpynA(
[out] LPSTR lpString1,
[in] LPCSTR lpString2,
[in] int iMaxLength
);
[out] lpString1
Type: LPTSTR
The destination buffer, which receives the copied characters. The buffer must be large enough to contain the number of TCHAR values specified by iMaxLength, including room for a terminating null character.
[in] lpString2
Type: LPCTSTR
The source string from which the function is to copy characters.
[in] iMaxLength
Type: int
The number of TCHAR values to be copied from the string pointed to by lpString2 into the buffer pointed to by lpString1, including a terminating null character.
Type: LPTSTR
If the function succeeds, the return value is a pointer to the buffer. The function can succeed even if the source string is greater than iMaxLength characters.
If the function fails, the return value is NULL and lpString1 may not be null-terminated.
The buffer pointed to by lpString1 must be large enough to include a terminating null character, and the string length value specified by iMaxLength includes room for a terminating null character.
The lstrcpyn function has an undefined behavior if source and destination buffers overlap.
Using this function incorrectly can compromise the security of your application. This function uses structured exception handling (SEH) to catch access violations and other errors. When this function catches SEH errors, it returns NULL without null-terminating the string and without notifying the caller of the error. The caller is not safe to assume that insufficient space is the error condition.If the buffer pointed to by lpString1 is not large
enough to contain the copied string, a buffer overrun can occur. When copying an entire
string, note that sizeof returns the number of bytes.
For example, if lpString1 points to a buffer
szString1 which is declared as
TCHAR szString[100]
, then sizeof(szString1) gives the size of
the buffer in bytes rather than WCHAR, which could lead to a buffer
overflow for the Unicode version of the function.
Buffer overflow situations are the cause of many security problems in applications and can cause a denial of service attack against the application if an access violation occurs. In the worst case, a buffer overrun may allow an attacker to inject executable code into your process, especially if lpString1 is a stack-based buffer.
Using sizeof(szString1)/sizeof(szString1[0])
gives the proper size of the buffer.
Consider using StringCchCopy instead; use either
StringCchCopy(buffer, sizeof(buffer)/sizeof(buffer[0]), src);
,
being aware that buffer
must not be a pointer or
use StringCchCopy(buffer, ARRAYSIZE(buffer), src);
,
being aware that, when copying to a pointer, the caller is responsible for
passing in the size of the pointed-to memory in characters.
Review Security Considerations: Windows User Interface before continuing.
Note
The winbase.h header defines lstrcpyn as an alias that automatically selects the ANSI or Unicode version of this function based on the definition of the UNICODE preprocessor constant. Mixing usage of the encoding-neutral alias with code that is not encoding-neutral can lead to mismatches that result in compilation or runtime errors. For more information, see Conventions for Function Prototypes.
Requirement | Value |
---|---|
Minimum supported client | Windows 2000 Professional [desktop apps only] |
Minimum supported server | Windows 2000 Server [desktop apps only] |
Target Platform | Windows |
Header | winbase.h (include Windows.h) |
Library | Kernel32.lib |
DLL | Kernel32.dll |
Conceptual
Reference