summaryrefslogtreecommitdiff
path: root/strings/strmake.c
blob: c313ed17740531d22358e3e42e0f7b71c8a6ffcf (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
/* Copyright (c) 2000, 2011, Oracle and/or its affiliates.
   Copyright (c) 2009-2011, Monty Program Ab
   Use is subject to license terms.

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; version 2 of the License.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to the Free Software
   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301  USA
*/

/*  File   : strmake.c
    Author : Michael Widenius
    Updated: 20 Jul 1984
    Defines: strmake()

    strmake(dst,src,length) moves length characters, or until end, of src to
    dst and appends a closing NUL to dst.
    Note that if strlen(src) >= length then dst[length] will be set to \0
    strmake() returns pointer to closing null
*/

#include "strings_def.h"

char *strmake(register char *dst, register const char *src, size_t length)
{
  while (length--)
  {
    if (! (*dst++ = *src++))
    {
#ifdef EXTRA_DEBUG
      /*
        'length' is the maximum length of the string; the buffer needs
        to be one character larger to accommodate the terminating
        '\0'.  This is easy to get wrong, so we make sure we write to
        the entire length of the buffer to identify incorrect
        buffer-sizes.  We only initialism the "unused" part of the
        buffer here, a) for efficiency, and b) because dst==src is
        allowed, so initializing the entire buffer would overwrite the
        source-string. Also, we write a character rather than '\0' as
        this makes spotting these problems in the results easier.

        If we are using purify/valgrind, we only set one character at
        end to be able to detect also wrong accesses after the end of
        dst.
      */
      if (length)
      {
#ifdef HAVE_valgrind
        dst[length-1]= 'Z';
#else
        bfill(dst, length-1, (int) 'Z');
#endif /* HAVE_valgrind */
      }
#endif /* EXTRA_DEBUG */
      return dst-1;
    }
  }
  *dst=0;
  return dst;
}