/barrelfish-master/lib/openssl-1.0.0d/crypto/lhash/ |
H A D | lh_test.c | 78 i=strlen(buf);
|
/barrelfish-master/usr/bench/net_latency/ |
H A D | main.c | 43 char plsz[strlen("payload_size=0000") + 1]; 44 char noca[strlen("elb_nocache=0") + 1]; 45 char rdic[strlen("read_incoming=0") + 1]; 46 char hiwb[strlen("head_idx_wb=0") + 1];
|
/barrelfish-master/lib/queue_service/ |
H A D | service.c | 53 return !strncmp(name1, name2, strlen(name1)); 64 __FILE__, __FUNCTION__, __LINE__, name1, strlen(name1), 65 name2, strlen(name2), strncmp(name2, name1, strlen(name2) -1)); 66 return strncmp(name2, name1, strlen(name2)-1) ? 0: 1; 220 st->name = malloc(strlen(name)); 221 strncpy(st->name, name, strlen(name)); 277 if (strlen(factory_name) > MAX_NAME_LEN) { 289 strncpy(epf_state->name, factory_name, strlen(factory_name));
|
/barrelfish-master/usr/tests/lua/ |
H A D | luatest.c | 63 error = luaL_loadbuffer(L, program, strlen(program), "line") || lua_pcall(L, 0, 0, 0);
|
/barrelfish-master/lib/libc/arm/string/ |
H A D | Makefile.inc | 5 memmove.S memset.S strcat.c strchr.c strcmp.S strcpy.c strlen.S \
|
/barrelfish-master/lib/libc/db/test/hash.tests/ |
H A D | tcreat3.c | 88 key.size = strlen(wp1); 89 item.size = strlen(wp2);
|
H A D | tread2.c | 89 key.size = strlen(wp1); 90 item.size = strlen(wp2);
|
/barrelfish-master/lib/libc/locale/ |
H A D | wctype.c | 101 len1 = strlen(property); 103 for (p = propnames; (len2 = strlen(p)) != 0; p += len2 + 1) {
|
/barrelfish-master/lib/libc/net/ |
H A D | if_nameindex.c | 100 nbytes += strlen(ifa->ifa_name) + 1; 130 cp += strlen(cp) + 1;
|
/barrelfish-master/lib/libc/resolv/ |
H A D | herror.c | 95 v->iov_len = strlen(t); 104 v->iov_len = strlen(v->iov_base);
|
/barrelfish-master/lib/libc/stdio/ |
H A D | tempnam.c | 63 *(f + strlen(f) - 1) == '/'? "": "/", pfx); 70 *(f + strlen(f) - 1) == '/'? "": "/", pfx);
|
/barrelfish-master/lib/libc/string/ |
H A D | strcoll.c | 80 sz1 = strlen(s) + 1; 81 sz2 = strlen(s2) + 1;
|
/barrelfish-master/lib/acpica/source/components/tables/ |
H A D | tbfind.c | 165 if ((strlen (OemId) > ACPI_OEM_ID_SIZE) || 166 (strlen (OemTableId) > ACPI_OEM_TABLE_ID_SIZE))
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ripemd/ |
H A D | rmdtest.c | 116 ebcdic2ascii((char *)*P, (char *)*P, strlen((char *)*P)); 118 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_ripemd160(), NULL);
|
/barrelfish-master/lib/openssl-1.0.0d/demos/sign/ |
H A D | sign.c | 110 EVP_SignUpdate (&md_ctx, data, strlen(data)); 143 EVP_VerifyUpdate (&md_ctx, data, strlen((char*)data));
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | rmdtest.c | 116 ebcdic2ascii((char *)*P, (char *)*P, strlen((char *)*P)); 118 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_ripemd160(), NULL);
|
/barrelfish-master/lib/tzcode/stdtime/ |
H A D | asctime.c | 119 ((strlen(year) <= 4) ? ASCTIME_FMT : ASCTIME_FMT_B), 124 if (strlen(result) < STD_ASCTIME_BUF_SIZE || buf == buf_asctime)
|
/barrelfish-master/lib/tzcode/zic/ |
H A D | ialloc.c | 58 newsize = (new == NULL) ? 0 : strlen(new); 63 else oldsize = strlen(old);
|
/barrelfish-master/lib/dist/ |
H A D | service.c | 29 int new_len = strlen(name) + EXTRA_NAME_LEN; 51 int new_len = strlen(name) + EXTRA_NAME_LEN;
|
/barrelfish-master/usr/drivers/lo/ |
H A D | lo_qdriver.c | 187 if (strncmp(argv[i], "cardname=", strlen("cardname=") - 1) == 0) { 188 service_name = argv[i] + strlen("cardname="); 189 } else if (strncmp(argv[i], "queue=", strlen("queue=") - 1) == 0) { 190 assumed_queue_id = atol(argv[i] + strlen("queue=")); 193 strlen("cache_coherence=") - 1) == 0) { 194 cache_coherence = !!atol(argv[i] + strlen("cache_coherence=")); 196 strlen("head_idx_wb=") - 1) == 0) { 197 use_txhwb = !!atol(argv[i] + strlen("head_idx_wb="));
|
/barrelfish-master/lib/libc/tests/string/ |
H A D | strerror_test.c | 108 iret = strerror_r(EPERM, buf, strlen("Operation not permitted")); 119 iret = strerror_r(-1, buf, strlen("Unknown error: -1")); 130 iret = strerror_r(-2, buf, strlen("Unknown error: -2") - 1); 141 iret = strerror_r(-2, buf, strlen("Unknown error: -2") - 2); 152 iret = strerror_r(12345, buf, strlen("Unknown error: 12345"));
|
/barrelfish-master/lib/acpica/source/components/utilities/ |
H A D | utnonansi.c | 267 if (strlen (Source) >= DestSize) 283 if ((strlen (Dest) + strlen (Source)) >= DestSize) 302 ActualTransferLength = ACPI_MIN (MaxTransferLength, strlen (Source)); 304 if ((strlen (Dest) + ActualTransferLength) >= DestSize)
|
/barrelfish-master/kernel/ |
H A D | string.c | 61 strlen(const char *s) function 141 unsigned int n = strlen(s); 155 unsigned int n = strlen(s); 190 size_t len1 = strlen(s1), len2 = strlen(s2),
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dso/ |
H A D | dso_dl.c | 262 merged = OPENSSL_malloc(strlen(filespec1) + 1); 274 merged = OPENSSL_malloc(strlen(filespec2) + 1); 292 spec2len = (filespec2 ? strlen(filespec2) : 0); 293 len = spec2len + (filespec1 ? strlen(filespec1) : 0); 329 len = strlen(filename); 334 rsize += strlen(extension);/* The length of ".s?" */ 374 len = (int)strlen(inf.filename);
|
/barrelfish-master/lib/int_route/server/ |
H A D | init.c | 71 if(label != NULL && strlen(label) > 0) { 78 if(class != NULL && strlen(class) > 0) { 117 if(strncmp(n_pos, "mem_write", strlen("mem_write")) == 0){ 137 } else if(strncmp(n_pos, "nullMsg", strlen("nullMsg"))==0) { 138 if(pos_after != NULL) *pos_after = n_pos + strlen("nullMsg"); 178 char * out = malloc(strlen(skb_get_output())+1); 281 int q_size = strlen(template) + 3 * 16; 301 c->label = malloc(strlen(label)+1); 305 c->class = malloc(strlen(class)+1);
|