GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
STRLCPY(3) FreeBSD Library Functions Manual STRLCPY(3)

strlcpy, strlcat
size-bounded string copying and concatenation

Standard C Library (libc, -lc)

#include <string.h>
size_t
strlcpy(char * restrict dst, const char * restrict src, size_t dstsize);
size_t
strlcat(char * restrict dst, const char * restrict src, size_t dstsize);

The strlcpy() and strlcat() functions copy and concatenate strings with the same input parameters and output result as snprintf(3). They are designed to be safer, more consistent, and less error prone replacements for the easily misused functions strncpy(3) and strncat(3).
strlcpy() and strlcat() take the full size of the destination buffer and guarantee NUL-termination if there is room. Note that room for the NUL should be included in dstsize.
strlcpy() copies up to dstsize - 1 characters from the string src to dst, NUL-terminating the result if dstsize is not 0.
strlcat() appends string src to the end of dst. It will append at most dstsize - strlen(dst) - 1 characters. It will then NUL-terminate, unless dstsize is 0 or the original dst string was longer than dstsize (in practice this should not happen as it means that either dstsize is incorrect or that dst is not a proper string).
If the src and dst strings overlap, the behavior is undefined.

Besides quibbles over the return type (size_t versus int) and signal handler safety (snprintf(3) is not entirely safe on some systems), the following two are equivalent:
n = strlcpy(dst, src, len); 
n = snprintf(dst, len, "%s", src);
Like snprintf(3), the strlcpy() and strlcat() functions return the total length of the string they tried to create. For strlcpy() that means the length of src. For strlcat() that means the initial length of dst plus the length of src.
If the return value is >= dstsize, the output string has been truncated. It is the caller's responsibility to handle this.

The following code fragment illustrates the simple case:
char *s, *p, buf[BUFSIZ]; 
 
... 
 
(void)strlcpy(buf, s, sizeof(buf)); 
(void)strlcat(buf, p, sizeof(buf));
To detect truncation, perhaps while building a pathname, something like the following might be used:
char *dir, *file, pname[MAXPATHLEN]; 
 
... 
 
if (strlcpy(pname, dir, sizeof(pname)) >= sizeof(pname)) 
	goto toolong; 
if (strlcat(pname, file, sizeof(pname)) >= sizeof(pname)) 
	goto toolong;
Since it is known how many characters were copied the first time, things can be sped up a bit by using a copy instead of an append:
char *dir, *file, pname[MAXPATHLEN]; 
size_t n; 
 
... 
 
n = strlcpy(pname, dir, sizeof(pname)); 
if (n >= sizeof(pname)) 
	goto toolong; 
if (strlcpy(pname + n, file, sizeof(pname) - n) >= sizeof(pname) - n) 
	goto toolong;
However, one may question the validity of such optimizations, as they defeat the whole purpose of strlcpy() and strlcat(). As a matter of fact, the first version of this manual page got it wrong.

snprintf(3), strncat(3), strncpy(3), wcslcpy(3)

The strlcpy() and strlcat() functions first appeared in OpenBSD 2.4, and FreeBSD 3.3.
February 26, 2016 FreeBSD 12.0-RELEASE

Search for    or go to Top of page |  Section 3 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.