*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->FreeBSD man pages -> strncpy (3)              
Title
Content
Arch
Section
 

STRCPY(3)

Contents


NAME    [Toc]    [Back]

     strcpy, strncpy -- copy strings

LIBRARY    [Toc]    [Back]

     Standard C Library (libc, -lc)

SYNOPSIS    [Toc]    [Back]

     #include <string.h>

     char *
     stpcpy(char *dst, const char *src);

     char *
     strcpy(char * restrict dst, const char * restrict src);

     char *
     strncpy(char * restrict dst, const char * restrict src, size_t len);

DESCRIPTION    [Toc]    [Back]

     The stpcpy() and strcpy() functions copy the string src to dst (including
     the terminating `\0' character.)

     The strncpy() function copies at most len characters from src into dst.
     If src is less than len characters long, the remainder of dst is filled
     with `\0' characters.  Otherwise, dst is not terminated.

RETURN VALUES    [Toc]    [Back]

     The strcpy() and strncpy() functions return dst.  The stpcpy() function
     returns a pointer to the terminating `\0' character of dst.

EXAMPLES    [Toc]    [Back]

     The following sets chararray to ``abc\0\0\0'':

	   char chararray[6];

	   (void)strncpy(chararray, "abc", sizeof(chararray));

     The following sets chararray to ``abcdef'':

	   char chararray[6];

	   (void)strncpy(chararray, "abcdefgh", sizeof(chararray));

     Note that it does not NUL terminate chararray because the length of the
     source string is greater than or equal to the length argument.

     The following copies as many characters from input to buf as will fit and
     NUL terminates the result.  Because strncpy() does not guarantee to NUL
     terminate the string itself, this must be done explicitly.

	   char buf[1024];

	   (void)strncpy(buf, input, sizeof(buf) - 1);
	   buf[sizeof(buf) - 1] = '\0';

     This could be better achieved using strlcpy(3), as shown in the following
     example:

	   (void)strlcpy(buf, input, sizeof(buf));

     Note that because strlcpy(3) is not defined in any standards, it should
     only be used when portability is not a concern.

SECURITY CONSIDERATIONS    [Toc]    [Back]

     The strcpy() function is easily misused in a manner which enables malicious
 users to arbitrarily change a running program's functionality
     through a buffer overflow attack.	(See the FSA and EXAMPLES.)

SEE ALSO    [Toc]    [Back]

      
      
     bcopy(3), memccpy(3), memcpy(3), memmove(3), strlcpy(3)

     The FreeBSD Security Architecture.  (See /usr/share/doc/{to be decided}.)

STANDARDS    [Toc]    [Back]

     The strcpy() and strncpy() functions conform to ISO/IEC 9899:1990
     (``ISO C89'').  The stpcpy() function is an MS-DOS and GNUism.  The
     stpcpy() function conforms to no standard.

HISTORY    [Toc]    [Back]

     The stpcpy() function first appeared in FreeBSD 4.4, coming from
     1998-vintage Linux.


FreeBSD 5.2.1			August 9, 2001			 FreeBSD 5.2.1
[ Back ]
 Similar pages
Name OS Title
bcopy Linux copy byte strings
strccpy IRIX copy strings, compressing or expanding escape codes
xstr OpenBSD extract strings from C programs to implement shared strings
xstr NetBSD extract strings from C programs to implement shared strings
xstr Tru64 Extracts strings from C programs to implement shared strings
xstr FreeBSD extract strings from C programs to implement shared strings
xstr IRIX extract strings from C programs to implement shared strings
xstr HP-UX extract strings from C programs to implement shared strings
scp FreeBSD secure copy (remote file copy program)
scp OpenBSD secure copy (remote file copy program)
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service