memcpy.3 (b2c76c41be32f904179efed29c0ca04d53f3996c) | memcpy.3 (8c8ffe541eabb23e21ddffb534ecda7ac6d7e04a) |
---|---|
1.\" Copyright (c) 1990, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Chris Torek and the American National Standards Committee X3, 6.\" on Information Processing Systems. 7.\" 8.\" Redistribution and use in source and binary forms, with or without --- 17 unchanged lines hidden (view full) --- 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)memcpy.3 8.1 (Berkeley) 6/4/93 33.\" | 1.\" Copyright (c) 1990, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Chris Torek and the American National Standards Committee X3, 6.\" on Information Processing Systems. 7.\" 8.\" Redistribution and use in source and binary forms, with or without --- 17 unchanged lines hidden (view full) --- 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)memcpy.3 8.1 (Berkeley) 6/4/93 33.\" |
34.Dd July 14, 2021 | 34.Dd November 18, 2023 |
35.Dt MEMCPY 3 36.Os 37.Sh NAME 38.Nm memcpy 39.Nd copy byte string 40.Sh LIBRARY 41.Lb libc 42.Sh SYNOPSIS --- 29 unchanged lines hidden (view full) --- 72The 73.Fn mempcpy 74function returns a pointer to the byte after the last written byte. 75.Sh SEE ALSO 76.Xr bcopy 3 , 77.Xr memccpy 3 , 78.Xr memmove 3 , 79.Xr strcpy 3 , | 35.Dt MEMCPY 3 36.Os 37.Sh NAME 38.Nm memcpy 39.Nd copy byte string 40.Sh LIBRARY 41.Lb libc 42.Sh SYNOPSIS --- 29 unchanged lines hidden (view full) --- 72The 73.Fn mempcpy 74function returns a pointer to the byte after the last written byte. 75.Sh SEE ALSO 76.Xr bcopy 3 , 77.Xr memccpy 3 , 78.Xr memmove 3 , 79.Xr strcpy 3 , |
80.Xr wmemcpy 3 | 80.Xr wmemcpy 3 , |
81.Xr wmempcpy 3 82.Sh STANDARDS 83The 84.Fn memcpy 85function 86conforms to 87.St -isoC . | 81.Xr wmempcpy 3 82.Sh STANDARDS 83The 84.Fn memcpy 85function 86conforms to 87.St -isoC . |
88.Sh HISTORY 89The 90.Fn memcpy 91function first appeared in 92.At V 93and was reimplemented for 94.Bx 4.3 Tahoe . 95The 96.Fn mempcpy 97function first appeared in 98.Fx 13.1 . |
|