|Important||This document may not represent best practices for current development, links to downloads and other resources may no longer be valid. Current recommended version can be found here. ArchiveDisclaimer|
Copy n bytes of a string to a destination string. More secure versions of these functions are available; see _mbsnbcpy_s, _mbsnbcpy_s_l.
unsigned char * _mbsnbcpy( unsigned char * strDest, const unsigned char * strSource, size_t count ); unsigned char * _mbsnbcpy_l( unsigned char * strDest, const unsigned char * strSource, size_t count, _locale_t locale ); template <size_t size> unsigned char * _mbsnbcpy( unsigned char (&strDest)[size], const unsigned char * strSource, size_t count ); // C++ only template <size_t size> unsigned char * _mbsnbcpy_l( unsigned char (&strDest)[size], const unsigned char * strSource, size_t count, _locale_t locale ); // C++ only
The _mbsnbcpy function copies count bytes from strSource to strDest. If count is less than or equal to the size in bytes of strSource, a null character is not appended automatically to the copied string. If size in bytes of strSource is less than count, the destination buffer is padded with null characters. If count exceeds the size of strDest or the source and destination strings overlap, the behavior of _mbstrncpy is undefined.
If strSource or strDest is a null pointer, this function invokes the invalid parameter handler as described in Parameter Validation. If execution is allowed to continue, the function returns NULL and sets errno to EINVAL.
The output value is affected by the setting of the LC_CTYPE category setting of the locale; see setlocale for more information. The versions of these functions without the _l suffix use the current locale for this locale-dependent behavior; the versions with the _l suffix are identical except that they use the locale parameter passed in instead. For more information, see Locale.
Security Note This API incurs a potential threat brought about by a buffer overrun problem. Buffer overrun problems are a frequent method of system attack, resulting in an unwarranted elevation of privilege. For more information, see Avoiding Buffer Overruns.
In C++, these functions have template overloads that invoke the newer, secure counterparts of these functions. For more information, see Secure Template Overloads.
For more compatibility information, see Compatibility in the Introduction.
Not applicable. To call the standard C function, use PInvoke. For more information, see Platform Invoke Examples.