diff options
Diffstat (limited to 'src/lib/libc/string/memcpy.3')
| -rw-r--r-- | src/lib/libc/string/memcpy.3 | 49 |
1 files changed, 25 insertions, 24 deletions
diff --git a/src/lib/libc/string/memcpy.3 b/src/lib/libc/string/memcpy.3 index 3f4bb643c9..e95d670ad9 100644 --- a/src/lib/libc/string/memcpy.3 +++ b/src/lib/libc/string/memcpy.3 | |||
| @@ -1,3 +1,5 @@ | |||
| 1 | .\" $OpenBSD: memcpy.3,v 1.8 2011/07/25 00:38:52 schwarze Exp $ | ||
| 2 | .\" | ||
| 1 | .\" Copyright (c) 1990, 1991 The Regents of the University of California. | 3 | .\" Copyright (c) 1990, 1991 The Regents of the University of California. |
| 2 | .\" All rights reserved. | 4 | .\" All rights reserved. |
| 3 | .\" | 5 | .\" |
| @@ -13,11 +15,7 @@ | |||
| 13 | .\" 2. Redistributions in binary form must reproduce the above copyright | 15 | .\" 2. Redistributions in binary form must reproduce the above copyright |
| 14 | .\" notice, this list of conditions and the following disclaimer in the | 16 | .\" notice, this list of conditions and the following disclaimer in the |
| 15 | .\" documentation and/or other materials provided with the distribution. | 17 | .\" documentation and/or other materials provided with the distribution. |
| 16 | .\" 3. All advertising materials mentioning features or use of this software | 18 | .\" 3. Neither the name of the University nor the names of its contributors |
| 17 | .\" must display the following acknowledgement: | ||
| 18 | .\" This product includes software developed by the University of | ||
| 19 | .\" California, Berkeley and its contributors. | ||
| 20 | .\" 4. Neither the name of the University nor the names of its contributors | ||
| 21 | .\" may be used to endorse or promote products derived from this software | 19 | .\" may be used to endorse or promote products derived from this software |
| 22 | .\" without specific prior written permission. | 20 | .\" without specific prior written permission. |
| 23 | .\" | 21 | .\" |
| @@ -33,15 +31,12 @@ | |||
| 33 | .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 31 | .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 34 | .\" SUCH DAMAGE. | 32 | .\" SUCH DAMAGE. |
| 35 | .\" | 33 | .\" |
| 36 | .\" from: @(#)memcpy.3 5.5 (Berkeley) 6/29/91 | 34 | .Dd $Mdocdate: July 25 2011 $ |
| 37 | .\" $Id: memcpy.3,v 1.1.1.1 1995/10/18 08:42:21 deraadt Exp $ | ||
| 38 | .\" | ||
| 39 | .Dd June 29, 1991 | ||
| 40 | .Dt MEMCPY 3 | 35 | .Dt MEMCPY 3 |
| 41 | .Os | 36 | .Os |
| 42 | .Sh NAME | 37 | .Sh NAME |
| 43 | .Nm memcpy | 38 | .Nm memcpy |
| 44 | .Nd copy byte string | 39 | .Nd copy bytes |
| 45 | .Sh SYNOPSIS | 40 | .Sh SYNOPSIS |
| 46 | .Fd #include <string.h> | 41 | .Fd #include <string.h> |
| 47 | .Ft void * | 42 | .Ft void * |
| @@ -49,36 +44,42 @@ | |||
| 49 | .Sh DESCRIPTION | 44 | .Sh DESCRIPTION |
| 50 | The | 45 | The |
| 51 | .Fn memcpy | 46 | .Fn memcpy |
| 52 | function | 47 | function copies |
| 53 | copies | ||
| 54 | .Fa len | 48 | .Fa len |
| 55 | bytes from string | 49 | bytes from buffer |
| 56 | .Fa src | 50 | .Fa src |
| 57 | to string | 51 | to buffer |
| 58 | .Fa dst . | 52 | .Fa dst . |
| 59 | .Sh RETURN VALUES | 53 | .Sh RETURN VALUES |
| 60 | The | 54 | The |
| 61 | .Fn memcpy | 55 | .Fn memcpy |
| 62 | function | 56 | function returns the original value of |
| 63 | returns the original value of | ||
| 64 | .Fa dst . | 57 | .Fa dst . |
| 65 | .Sh SEE ALSO | 58 | .Sh SEE ALSO |
| 66 | .Xr bcopy 3 , | 59 | .Xr bcopy 3 , |
| 67 | .Xr memccpy 3 , | 60 | .Xr memccpy 3 , |
| 68 | .Xr memmove 3 , | 61 | .Xr memmove 3 , |
| 69 | .Xr strcpy 3 | 62 | .Xr strcpy 3 , |
| 63 | .Xr strlcpy 3 , | ||
| 64 | .Xr wmemcpy 3 | ||
| 70 | .Sh STANDARDS | 65 | .Sh STANDARDS |
| 71 | The | 66 | The |
| 72 | .Fn memcpy | 67 | .Fn memcpy |
| 73 | function | 68 | function conforms to |
| 74 | conforms to | ||
| 75 | .St -ansiC . | 69 | .St -ansiC . |
| 76 | .Sh BUGS | 70 | .Sh HISTORY |
| 71 | The | ||
| 72 | .Fn memcpy | ||
| 73 | function first appeared in | ||
| 74 | .At V | ||
| 75 | and was reimplemented for | ||
| 76 | .Bx 4.3 Tahoe . | ||
| 77 | .Sh CAVEATS | ||
| 77 | In this implementation | 78 | In this implementation |
| 78 | .Fn memcpy | 79 | .Fn memcpy |
| 79 | is implemented using | 80 | is implemented using |
| 80 | .Xr bcopy 3 , | 81 | .Xr bcopy 3 , |
| 81 | and therefore the strings may overlap. | 82 | and therefore the buffers may overlap. |
| 82 | On other systems, copying overlapping strings may produce surprises. | 83 | On other systems, copying overlapping buffers may produce surprises. |
| 83 | A simpler solution is to not use | 84 | A portable, safe solution is to use |
| 84 | .Fn memcpy . | 85 | .Xr memmove 3 . |
