| 1 | /* |
| 2 | * Copyright (c) 1993 Winning Strategies, Inc. |
| 3 | * All rights reserved. |
| 4 | * |
| 5 | * Redistribution and use in source and binary forms, with or without |
| 6 | * modification, are permitted provided that the following conditions |
| 7 | * are met: |
| 8 | * 1. Redistributions of source code must retain the above copyright |
| 9 | * notice, this list of conditions and the following disclaimer. |
| 10 | * 2. Redistributions in binary form must reproduce the above copyright |
| 11 | * notice, this list of conditions and the following disclaimer in the |
| 12 | * documentation and/or other materials provided with the distribution. |
| 13 | * 3. All advertising materials mentioning features or use of this software |
| 14 | * must display the following acknowledgement: |
| 15 | * This product includes software developed by Winning Strategies, Inc. |
| 16 | * 4. The name of the author may not be used to endorse or promote products |
| 17 | * derived from this software withough specific prior written permission |
| 18 | * |
| 19 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 20 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 21 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 22 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 23 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 24 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 25 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 26 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 27 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 28 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 29 | * |
| 30 | * $Id: memchr.s,v 1.3 1993/08/16 17:06:32 jtc Exp $ |
| 31 | */ |
| 32 | |
| 33 | #if defined(LIBC_RCS) && !defined(lint) |
| 34 | .asciz "$Id: memchr.s,v 1.3 1993/08/16 17:06:32 jtc Exp $" |
| 35 | #endif /* LIBC_RCS and not lint */ |
| 36 | |
| 37 | #include "DEFS.h" |
| 38 | |
| 39 | /* |
| 40 | * memchr (b, c, len) |
| 41 | * locates the first occurance of c in string b. |
| 42 | * |
| 43 | * Written by: |
| 44 | * J.T. Conklin (jtc@wimsey.com), Winning Strategies, Inc. |
| 45 | */ |
| 46 | |
| 47 | ENTRY(memchr) |
| 48 | pushl %edi |
| 49 | movl 8(%esp),%edi /* string address */ |
| 50 | movl 12(%esp),%eax /* set character to search for */ |
| 51 | movl 16(%esp),%ecx /* set length of search */ |
| 52 | testl %eax,%eax /* clear Z flag, for len == 0 */ |
| 53 | cld /* set search forward */ |
| 54 | repne /* search! */ |
| 55 | scasb |
| 56 | jnz L1 /* scan failed, return null */ |
| 57 | leal -1(%edi),%eax /* adjust result of scan */ |
| 58 | popl %edi |
| 59 | ret |
| 60 | .align 2,0x90 |
| 61 | L1: xorl %eax,%eax |
| 62 | popl %edi |
| 63 | ret |