summaryrefslogtreecommitdiff
path: root/lib/strlcat.c
diff options
context:
space:
mode:
authorwhitespace / reindent <invalid@invalid.invalid>2017-08-09 11:49:42 +0200
committerwhitespace / reindent <invalid@invalid.invalid>2017-08-09 12:03:17 +0200
commitac4d0be5874fafd14212d6007fff7495edc9b152 (patch)
tree5e2f0d3189de928c849f9983406389ade3b098cb /lib/strlcat.c
parent76a86854181c27819e5cf71b12ae1fa5ccd9e02a (diff)
indent.py `git ls-files | pcregrep '\.[ch]$' | pcregrep -v '^(ldpd|babeld|nhrpd)/'` Signed-off-by: David Lamparter <equinox@opensourcerouting.org>
Diffstat (limited to 'lib/strlcat.c')
-rw-r--r--lib/strlcat.c61
1 files changed, 29 insertions, 32 deletions
diff --git a/lib/strlcat.c b/lib/strlcat.c
index 1d04b43d95..f144b76b5b 100644
--- a/lib/strlcat.c
+++ b/lib/strlcat.c
@@ -27,45 +27,42 @@
#ifndef HAVE_STRLCAT
#undef strlcat
-size_t
-strlcat (char *__restrict dest, const char *__restrict src, size_t size);
+size_t strlcat(char *__restrict dest, const char *__restrict src, size_t size);
-size_t
-strlcat (char *__restrict dest, const char *__restrict src, size_t size)
+size_t strlcat(char *__restrict dest, const char *__restrict src, size_t size)
{
- size_t src_length = strlen (src);
+ size_t src_length = strlen(src);
- /* Our implementation strlcat supports dest == NULL if size == 0
- (for consistency with snprintf and strlcpy), but strnlen does
- not, so we have to cover this case explicitly. */
- if (size == 0)
- return src_length;
+ /* Our implementation strlcat supports dest == NULL if size == 0
+ (for consistency with snprintf and strlcpy), but strnlen does
+ not, so we have to cover this case explicitly. */
+ if (size == 0)
+ return src_length;
- size_t dest_length = strnlen (dest, size);
- if (dest_length != size)
- {
- /* Copy at most the remaining number of characters in the
- destination buffer. Leave for the NUL terminator. */
- size_t to_copy = size - dest_length - 1;
- /* But not more than what is available in the source string. */
- if (to_copy > src_length)
- to_copy = src_length;
+ size_t dest_length = strnlen(dest, size);
+ if (dest_length != size) {
+ /* Copy at most the remaining number of characters in the
+ destination buffer. Leave for the NUL terminator. */
+ size_t to_copy = size - dest_length - 1;
+ /* But not more than what is available in the source string. */
+ if (to_copy > src_length)
+ to_copy = src_length;
- char *target = dest + dest_length;
- memcpy (target, src, to_copy);
- target[to_copy] = '\0';
- }
+ char *target = dest + dest_length;
+ memcpy(target, src, to_copy);
+ target[to_copy] = '\0';
+ }
- /* If the sum wraps around, we have more than SIZE_MAX + 2 bytes in
- the two input strings (including both null terminators). If each
- byte in the address space can be assigned a unique size_t value
- (which the static_assert checks), then by the pigeonhole
- principle, the two input strings must overlap, which is
- undefined. */
+/* If the sum wraps around, we have more than SIZE_MAX + 2 bytes in
+ the two input strings (including both null terminators). If each
+ byte in the address space can be assigned a unique size_t value
+ (which the static_assert checks), then by the pigeonhole
+ principle, the two input strings must overlap, which is
+ undefined. */
#if __STDC_VERSION__ >= 201112L
- _Static_assert (sizeof (uintptr_t) == sizeof (size_t),
- "theoretical maximum object size covers address space");
+ _Static_assert(sizeof(uintptr_t) == sizeof(size_t),
+ "theoretical maximum object size covers address space");
#endif
- return dest_length + src_length;
+ return dest_length + src_length;
}
#endif /* HAVE_STRLCAT */