diff options
| author | whitespace / reindent <invalid@invalid.invalid> | 2017-08-09 11:49:42 +0200 |
|---|---|---|
| committer | whitespace / reindent <invalid@invalid.invalid> | 2017-08-09 12:03:17 +0200 |
| commit | ac4d0be5874fafd14212d6007fff7495edc9b152 (patch) | |
| tree | 5e2f0d3189de928c849f9983406389ade3b098cb /lib/strlcat.c | |
| parent | 76a86854181c27819e5cf71b12ae1fa5ccd9e02a (diff) | |
*: reindentreindent-3.0-after
indent.py `git ls-files | pcregrep '\.[ch]$' | pcregrep -v '^(ldpd|babeld|nhrpd)/'`
Signed-off-by: David Lamparter <equinox@opensourcerouting.org>
Diffstat (limited to 'lib/strlcat.c')
| -rw-r--r-- | lib/strlcat.c | 61 |
1 files changed, 29 insertions, 32 deletions
diff --git a/lib/strlcat.c b/lib/strlcat.c index 1d04b43d95..f144b76b5b 100644 --- a/lib/strlcat.c +++ b/lib/strlcat.c @@ -27,45 +27,42 @@ #ifndef HAVE_STRLCAT #undef strlcat -size_t -strlcat (char *__restrict dest, const char *__restrict src, size_t size); +size_t strlcat(char *__restrict dest, const char *__restrict src, size_t size); -size_t -strlcat (char *__restrict dest, const char *__restrict src, size_t size) +size_t strlcat(char *__restrict dest, const char *__restrict src, size_t size) { - size_t src_length = strlen (src); + size_t src_length = strlen(src); - /* Our implementation strlcat supports dest == NULL if size == 0 - (for consistency with snprintf and strlcpy), but strnlen does - not, so we have to cover this case explicitly. */ - if (size == 0) - return src_length; + /* Our implementation strlcat supports dest == NULL if size == 0 + (for consistency with snprintf and strlcpy), but strnlen does + not, so we have to cover this case explicitly. */ + if (size == 0) + return src_length; - size_t dest_length = strnlen (dest, size); - if (dest_length != size) - { - /* Copy at most the remaining number of characters in the - destination buffer. Leave for the NUL terminator. */ - size_t to_copy = size - dest_length - 1; - /* But not more than what is available in the source string. */ - if (to_copy > src_length) - to_copy = src_length; + size_t dest_length = strnlen(dest, size); + if (dest_length != size) { + /* Copy at most the remaining number of characters in the + destination buffer. Leave for the NUL terminator. */ + size_t to_copy = size - dest_length - 1; + /* But not more than what is available in the source string. */ + if (to_copy > src_length) + to_copy = src_length; - char *target = dest + dest_length; - memcpy (target, src, to_copy); - target[to_copy] = '\0'; - } + char *target = dest + dest_length; + memcpy(target, src, to_copy); + target[to_copy] = '\0'; + } - /* If the sum wraps around, we have more than SIZE_MAX + 2 bytes in - the two input strings (including both null terminators). If each - byte in the address space can be assigned a unique size_t value - (which the static_assert checks), then by the pigeonhole - principle, the two input strings must overlap, which is - undefined. */ +/* If the sum wraps around, we have more than SIZE_MAX + 2 bytes in + the two input strings (including both null terminators). If each + byte in the address space can be assigned a unique size_t value + (which the static_assert checks), then by the pigeonhole + principle, the two input strings must overlap, which is + undefined. */ #if __STDC_VERSION__ >= 201112L - _Static_assert (sizeof (uintptr_t) == sizeof (size_t), - "theoretical maximum object size covers address space"); + _Static_assert(sizeof(uintptr_t) == sizeof(size_t), + "theoretical maximum object size covers address space"); #endif - return dest_length + src_length; + return dest_length + src_length; } #endif /* HAVE_STRLCAT */ |
