memcpy.3 (b2c76c41be32f904179efed29c0ca04d53f3996c) memcpy.3 (8c8ffe541eabb23e21ddffb534ecda7ac6d7e04a)
1.\" Copyright (c) 1990, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" Chris Torek and the American National Standards Committee X3,
6.\" on Information Processing Systems.
7.\"
8.\" Redistribution and use in source and binary forms, with or without

--- 17 unchanged lines hidden (view full) ---

26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)memcpy.3 8.1 (Berkeley) 6/4/93
33.\"
1.\" Copyright (c) 1990, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" Chris Torek and the American National Standards Committee X3,
6.\" on Information Processing Systems.
7.\"
8.\" Redistribution and use in source and binary forms, with or without

--- 17 unchanged lines hidden (view full) ---

26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)memcpy.3 8.1 (Berkeley) 6/4/93
33.\"
34.Dd July 14, 2021
34.Dd November 18, 2023
35.Dt MEMCPY 3
36.Os
37.Sh NAME
38.Nm memcpy
39.Nd copy byte string
40.Sh LIBRARY
41.Lb libc
42.Sh SYNOPSIS

--- 29 unchanged lines hidden (view full) ---

72The
73.Fn mempcpy
74function returns a pointer to the byte after the last written byte.
75.Sh SEE ALSO
76.Xr bcopy 3 ,
77.Xr memccpy 3 ,
78.Xr memmove 3 ,
79.Xr strcpy 3 ,
35.Dt MEMCPY 3
36.Os
37.Sh NAME
38.Nm memcpy
39.Nd copy byte string
40.Sh LIBRARY
41.Lb libc
42.Sh SYNOPSIS

--- 29 unchanged lines hidden (view full) ---

72The
73.Fn mempcpy
74function returns a pointer to the byte after the last written byte.
75.Sh SEE ALSO
76.Xr bcopy 3 ,
77.Xr memccpy 3 ,
78.Xr memmove 3 ,
79.Xr strcpy 3 ,
80.Xr wmemcpy 3
80.Xr wmemcpy 3 ,
81.Xr wmempcpy 3
82.Sh STANDARDS
83The
84.Fn memcpy
85function
86conforms to
87.St -isoC .
81.Xr wmempcpy 3
82.Sh STANDARDS
83The
84.Fn memcpy
85function
86conforms to
87.St -isoC .
88.Sh HISTORY
89The
90.Fn memcpy
91function first appeared in
92.At V
93and was reimplemented for
94.Bx 4.3 Tahoe .
95The
96.Fn mempcpy
97function first appeared in
98.Fx 13.1 .