15f8a6c06Sperry.\" Copyright (c) 1990, 1991, 1993 25f8a6c06Sperry.\" The Regents of the University of California. All rights reserved. 361f28255Scgd.\" 461f28255Scgd.\" This code is derived from software contributed to Berkeley by 561f28255Scgd.\" Chris Torek and the American National Standards Committee X3, 661f28255Scgd.\" on Information Processing Systems. 761f28255Scgd.\" 861f28255Scgd.\" Redistribution and use in source and binary forms, with or without 961f28255Scgd.\" modification, are permitted provided that the following conditions 1061f28255Scgd.\" are met: 1161f28255Scgd.\" 1. Redistributions of source code must retain the above copyright 1261f28255Scgd.\" notice, this list of conditions and the following disclaimer. 1361f28255Scgd.\" 2. Redistributions in binary form must reproduce the above copyright 1461f28255Scgd.\" notice, this list of conditions and the following disclaimer in the 1561f28255Scgd.\" documentation and/or other materials provided with the distribution. 16*eb7c1594Sagc.\" 3. Neither the name of the University nor the names of its contributors 1761f28255Scgd.\" may be used to endorse or promote products derived from this software 1861f28255Scgd.\" without specific prior written permission. 1961f28255Scgd.\" 2061f28255Scgd.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 2161f28255Scgd.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2261f28255Scgd.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 2361f28255Scgd.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 2461f28255Scgd.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 2561f28255Scgd.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2661f28255Scgd.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2761f28255Scgd.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2861f28255Scgd.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2961f28255Scgd.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 3061f28255Scgd.\" SUCH DAMAGE. 3161f28255Scgd.\" 325f8a6c06Sperry.\" from: @(#)memmove.3 8.1 (Berkeley) 6/4/93 33*eb7c1594Sagc.\" $NetBSD: memmove.3,v 1.8 2003/08/07 16:43:48 agc Exp $ 3461f28255Scgd.\" 355f8a6c06Sperry.Dd June 4, 1993 3661f28255Scgd.Dt MEMMOVE 3 3761f28255Scgd.Os 3861f28255Scgd.Sh NAME 3961f28255Scgd.Nm memmove 4061f28255Scgd.Nd copy byte string 41312aca53Sperry.Sh LIBRARY 42312aca53Sperry.Lb libc 4361f28255Scgd.Sh SYNOPSIS 44472351e1Swiz.In string.h 4561f28255Scgd.Ft void * 4661f28255Scgd.Fn memmove "void *dst" "const void *src" "size_t len" 4761f28255Scgd.Sh DESCRIPTION 4861f28255ScgdThe 4961f28255Scgd.Fn memmove 5061f28255Scgdfunction 5161f28255Scgdcopies 5261f28255Scgd.Fa len 5361f28255Scgdbytes from string 5461f28255Scgd.Fa src 5561f28255Scgdto string 5661f28255Scgd.Fa dst . 5761f28255ScgdThe two strings may overlap; 5861f28255Scgdthe copy is always done in a non-destructive manner. 5961f28255Scgd.Sh RETURN VALUES 6061f28255ScgdThe 6161f28255Scgd.Fn memmove 6261f28255Scgdfunction returns the original value of 6361f28255Scgd.Fa dst . 6461f28255Scgd.Sh SEE ALSO 6561f28255Scgd.Xr bcopy 3 , 6661f28255Scgd.Xr memccpy 3 , 6761f28255Scgd.Xr memcpy 3 , 6861f28255Scgd.Xr strcpy 3 6961f28255Scgd.Sh STANDARDS 7061f28255ScgdThe 7161f28255Scgd.Fn memmove 7261f28255Scgdfunction 7361f28255Scgdconforms to 7461f28255Scgd.St -ansiC . 75