strcpy.3 (6cec9cad762b6476313fb1f8e931a1647822db6b) | strcpy.3 (50a717a67bc36ba6fb26b70476918f46b8ddf293) |
---|---|
1.\" Copyright (c) 1990, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Chris Torek and the American National Standards Committee X3, 6.\" on Information Processing Systems. 7.\" 8.\" Redistribution and use in source and binary forms, with or without --- 49 unchanged lines hidden (view full) --- 58functions 59copy the string 60.Fa src 61to 62.Fa dst 63(including the terminating 64.Ql \e0 65character.) | 1.\" Copyright (c) 1990, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Chris Torek and the American National Standards Committee X3, 6.\" on Information Processing Systems. 7.\" 8.\" Redistribution and use in source and binary forms, with or without --- 49 unchanged lines hidden (view full) --- 58functions 59copy the string 60.Fa src 61to 62.Fa dst 63(including the terminating 64.Ql \e0 65character.) |
66If 67.Fa src 68and 69.Fa dst 70overlap, the results are undefined. |
|
66.Pp 67The 68.Fn stpncpy 69and 70.Fn strncpy 71functions copy at most 72.Fa len 73characters from --- 10 unchanged lines hidden (view full) --- 84is filled with 85.Ql \e0 86characters. 87Otherwise, 88.Fa dst 89is 90.Em not 91terminated. | 71.Pp 72The 73.Fn stpncpy 74and 75.Fn strncpy 76functions copy at most 77.Fa len 78characters from --- 10 unchanged lines hidden (view full) --- 89is filled with 90.Ql \e0 91characters. 92Otherwise, 93.Fa dst 94is 95.Em not 96terminated. |
97If 98.Fa src 99and 100.Fa dst 101overlap, the results are undefined. |
|
92.Sh RETURN VALUES 93The 94.Fn strcpy 95and 96.Fn strncpy 97functions 98return 99.Fa dst . --- 113 unchanged lines hidden --- | 102.Sh RETURN VALUES 103The 104.Fn strcpy 105and 106.Fn strncpy 107functions 108return 109.Fa dst . --- 113 unchanged lines hidden --- |