This manual page is part of the POSIX Programmer's Manual. The Linux implementation of this interface may differ (consult the corresponding Linux manual page for details of Linux behavior), or the interface may not be implemented on Linux.
wcsdup — duplicate a wide-character string
wchar_t *wcsdup(const wchar_t * string);
The wcsdup() function is the wide-character equivalent of the strdup() function.
The wcsdup() function shall return a pointer to a new wide-character string, allocated as if by a call to malloc(), which is the duplicate of the wide-character string string. The returned pointer can be passed to free(). A null pointer is returned if the new wide-character string cannot be created.
Upon successful completion, the wcsdup() function shall return a pointer to the newly allocated wide-character string. Otherwise, it shall return a null pointer and set errno to indicate the error.
The wcsdup() function shall fail if:
The following sections are informative.
For functions that allocate memory as if by malloc(), the application should release such memory when it is no longer required by a call to free(). For wcsdup(), this is the return value.
free(), strdup(), wcscpy()
The Base Definitions volume of POSIX.1‐2008, <wchar.h>
Portions of this text are reprinted and reproduced in electronic form from IEEE Std 1003.1, 2013 Edition, Standard for Information Technology -- Portable Operating System Interface (POSIX), The Open Group Base Specifications Issue 7, Copyright (C) 2013 by the Institute of Electrical and Electronics Engineers, Inc and The Open Group. (This is POSIX.1-2008 with the 2013 Technical Corrigendum 1 applied.) In the event of any discrepancy between this version and the original IEEE and The Open Group Standard, the original IEEE and The Open Group Standard is the referee document. The original Standard can be obtained online at http://www.unix.org/online.html .
- Memory large enough for the duplicate string could not be allocated.
Any typographical or formatting errors that appear in this page are most likely to have been introduced during the conversion of the source files to man page format. To report such errors, see https://www.kernel.org/doc/man-pages/reporting_bugs.html .