1 .\" Copyright (c) 1998 Softweyr LLC. All rights reserved.
3 .\" strtok_r, from Berkeley strtok
4 .\" Oct 13, 1998 by Wes Peters <wes@softweyr.com>
6 .\" Copyright (c) 1988, 1991, 1993
7 .\" The Regents of the University of California. All rights reserved.
9 .\" This code is derived from software contributed to Berkeley by
10 .\" the American National Standards Committee X3, on Information
11 .\" Processing Systems.
13 .\" Redistribution and use in source and binary forms, with or without
14 .\" modification, are permitted provided that the following conditions
17 .\" 1. Redistributions of source code must retain the above copyright
18 .\" notices, this list of conditions and the following disclaimer.
20 .\" 2. Redistributions in binary form must reproduce the above
21 .\" copyright notices, this list of conditions and the following
22 .\" disclaimer in the documentation and/or other materials provided
23 .\" with the distribution.
25 .\" 3. All advertising materials mentioning features or use of this
26 .\" software must display the following acknowledgement:
28 .\" This product includes software developed by Softweyr LLC, the
29 .\" University of California, Berkeley, and its contributors.
31 .\" 4. Neither the name of Softweyr LLC, the University nor the names
32 .\" of its contributors may be used to endorse or promote products
33 .\" derived from this software without specific prior written
36 .\" THIS SOFTWARE IS PROVIDED BY SOFTWEYR LLC, THE REGENTS AND
37 .\" CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
38 .\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
39 .\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
40 .\" DISCLAIMED. IN NO EVENT SHALL SOFTWEYR LLC, THE REGENTS, OR
41 .\" CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
42 .\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
43 .\" LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
44 .\" USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
45 .\" ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
46 .\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
47 .\" OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
55 .Nd split wide-character string into tokens
61 .Fn wcstok "wchar_t * restrict str" "const wchar_t * restrict sep" "wchar_t ** restrict last"
66 is used to isolate sequential tokens in a null-terminated wide character
69 These tokens are separated in the string by at least one of the
76 should be specified; subsequent calls, wishing to obtain further tokens
77 from the same string, should pass a null pointer instead.
80 must be supplied each time, and may change between calls.
83 must be provided on each call.
87 function is the wide character counterpart of the
94 returns a pointer to the beginning of each subsequent token in the string,
95 after replacing the token itself with a null wide character (L'\e0').
96 When no more tokens remain, a null pointer is returned.
98 The following code fragment splits a wide character string on
100 space, tab and newline characters and writes the tokens to
102 .Bd -literal -offset indent
103 const wchar_t *seps = L" \et\en";
104 wchar_t *last, *tok, text[] = L" \enone\ettwo\et\etthree \en";
106 for (tok = wcstok(text, seps, &last); tok != NULL;
107 tok = wcstok(NULL, seps, &last))
108 wprintf(L"%ls\en", tok);
111 Some early implementations of
114 context pointer argument,
116 and maintain state across calls in a static variable like