about summary refs log tree commit diff
path: root/wcsmbs/wcslcat.c
blob: 3bac6a2aa033f63bc8f9cae69a93bf6dd4de4815 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
/* Append a null-terminated wide string to another, with length checking.
   Copyright (C) 2023 Free Software Foundation, Inc.
   This file is part of the GNU C Library.

   The GNU C Library is free software; you can redistribute it and/or
   modify it under the terms of the GNU Lesser General Public
   License as published by the Free Software Foundation; either
   version 2.1 of the License, or (at your option) any later version.

   The GNU C Library is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
   Lesser General Public License for more details.

   You should have received a copy of the GNU Lesser General Public
   License along with the GNU C Library; if not, see
   <https://www.gnu.org/licenses/>.  */

#include <stdint.h>
#include <wchar.h>

size_t
__wcslcat (wchar_t *__restrict dest, const wchar_t *__restrict src,
           size_t size)
{
  size_t src_length = __wcslen (src);

  /* Our implementation strlcat supports dest == NULL if size == 0
     (for consistency with snprintf and strlcpy), but wcsnlen does
     not, so we have to cover this case explicitly.  */
  if (size == 0)
    return src_length;

  size_t dest_length = __wcsnlen (dest, size);
  if (dest_length != size)
    {
      /* Copy at most the remaining number of characters in the
	 destination buffer.  Leave for the null terminator.  */
      size_t to_copy = size - dest_length - 1;
      /* But not more than what is available in the source string.  */
      if (to_copy > src_length)
	to_copy = src_length;

      wchar_t *target = dest + dest_length;
      __wmemcpy (target, src, to_copy);
      target[to_copy] = '\0';
    }

  /* If the sum wraps around, we have more than SIZE_MAX + 2 bytes in
     the two input strings (including both null terminators).  If each
     byte in the address space can be assigned a unique size_t value
     (which the static_assert checks), then by the pigeonhole
     principle, the two input strings must overlap, which is
     undefined.  */
  _Static_assert (sizeof (uintptr_t) == sizeof (size_t),
		  "theoretical maximum object size covers address space");
  return dest_length + src_length;
}
libc_hidden_def (__wcslcat)
weak_alias (__wcslcat, wcslcat)