/vbox/src/VBox/ExtPacks/VBoxDTrace/onnv/uts/common/dtrace/ |
H A D | dcpc.c | 225 len = strlen(desc->dtpd_name); 243 evlen = strlen(p); 266 p += strlen(p) + 1; 277 end == p + strlen(p)) { 278 p += strlen(p) + 1; 288 if ((ddi_strtol(p, &end, 10, &val) != 0) || end != p + strlen(p) || 303 llen = strlen(events); 318 p += strlen(p) + 1;
|
/vbox/src/VBox/Runtime/testcase/ |
H A D | tstRTTemp.cpp | 98 RTTESTI_CHECK_MSG(strlen(szName) == strlen(papszNames[i]), ("%s: szName %s\nReturned %s\n", pcszAPI, szName, papszNames[i]));
|
H A D | tstRTHttp.cpp | 101 rc = RTStrmWrite(CAFile, RTFILE_LINEFEED, strlen(RTFILE_LINEFEED)); 165 rc = RTStrmWrite(CAFile, RTFILE_LINEFEED, strlen(RTFILE_LINEFEED)); 240 rc = extractPCA3G5(hHttp, CAFile, (uint8_t*)pszBuf, strlen(pszBuf)); 257 rc = extractPCA3(hHttp, CAFile, (uint8_t*)pszBuf, strlen(pszBuf));
|
H A D | tstRTPath.cpp | 126 RTTESTI_CHECK_MSG(strlen(szPath1) == s_aTests[i].cchPath, ("%s\n", szPath1)); 183 RTTESTI_CHECK_MSG(strlen(szPath1) == s_aTests[i].cchPath, ("%s\n", szPath1)); 262 size_t cch = strlen(szPath); 367 cch = strlen(szTmp); 368 if (cch + strlen(s_aRTPathAbsExTests[i].pcszOutput) - 2 <= sizeof(szTmp)) 374 if (2 + strlen(s_aRTPathAbsExTests[i].pcszOutput) - 2 <= sizeof(szTmp)) 495 size_t const cchResult = strlen(szPath); 505 if (strlen(pszInput) < cchResult) 539 size_t const cchResult = strlen(szPath); 619 RTTESTI_CHECK(cch == strlen(szPat [all...] |
/vbox/src/VBox/Storage/testcase/ |
H A D | tstVD-2.cpp | 63 *pcbValue = strlen(pszValue) + 1; 72 size_t cchTmp = strlen(pszTmp) + 1;
|
/vbox/src/libs/xpcom18a4/ipc/ipcd/daemon/src/ |
H A D | ipcModuleReg.cpp | 116 int dLen = strlen(modulesDir); 117 int fLen = strlen(fileName);
|
/vbox/src/libs/libpng-1.2.8/contrib/gregbook/ |
H A D | wpng.c | 238 if (strlen(bgstr) != 7 || bgstr[0] != '#') 287 } else if ((len = strlen(inname)) > 250) { 418 if (FGETS(p, 74, keybd) && (len = strlen(p)) > 1) { 448 if (FGETS(p, 74, keybd) && (len = strlen(p)) > 1) { 480 if (FGETS(p, 74, keybd) && (len = strlen(p)) > 1) 518 if (FGETS(p, 74, keybd) && (len = strlen(p)) > 1) { 548 if (FGETS(p, 74, keybd) && (len = strlen(p)) > 1) { 578 if (FGETS(p, 74, keybd) && (len = strlen(p)) > 1) {
|
/vbox/src/VBox/Devices/EFI/Firmware/StdLib/BsdSocketLib/ |
H A D | inet_net_ntop.c | 34 # define SPRINTF(x) strlen(sprintf/**/x)
|
H A D | res_query.c | 364 n = (int)strlen(name); 376 n = (int)strlen(name); 377 d = (int)strlen(domain);
|
/vbox/src/VBox/Devices/PC/ipxe/src/core/ |
H A D | base64.c | 71 assert ( strlen ( encoded ) == base64_encoded_len ( len ) );
|
H A D | uri.c | 83 raw_len = ( strlen ( uri_string ) + 1 /* NUL */ ); 188 strlen ( field ) + 1 /* NUL */ ); 314 size_t base_len = ( strlen ( base_path ) + 1 ); 353 ( ( base_tmp[ strlen ( base_tmp ) - 1 ] == '/' ) ?
|
/vbox/src/VBox/HostServices/auth/simple/ |
H A D | VBoxAuthSimple.cpp | 117 RTSha256(szPassword, strlen(szPassword), abDigest);
|
/vbox/src/VBox/Devices/PC/ipxe/src/include/ |
H A D | string.h | 32 size_t __pure strlen(const char * s) __nonnull;
|
/vbox/src/VBox/ExtPacks/VBoxDTrace/onnv/cmd/dtrace/test/cmd/badioctl/ |
H A D | badioctl.c | 52 if (fmt[strlen(fmt) - 1] != '\n')
|
/vbox/src/VBox/ExtPacks/VBoxDTrace/onnv/common/ctf/ |
H A D | ctf_create.c | 99 soff += VBDTCAST(uint_t)strlen(dmd->dmd_name) + 1; 122 soff += VBDTCAST(uint_t)strlen(dmd->dmd_name) + 1; 147 soff += VBDTCAST(uint_t)strlen(dmd->dmd_name) + 1; 164 len = strlen(dmd->dmd_name) + 1; 293 len = strlen(dtd->dtd_name) + 1; 456 len = strlen(dmd->dmd_name) + 1; 471 len = strlen(dtd->dtd_name) + 1; 560 fp->ctf_dtstrlen += strlen(s) + 1; 730 hep = ctf_hash_lookup(hp, fp, name, strlen(name)); 752 hep = ctf_hash_lookup(hp, fp, name, strlen(nam [all...] |
H A D | ctf_util.c | 125 char *s2 = ctf_alloc(strlen(s1) + 1);
|
/vbox/src/VBox/Runtime/r3/win/ |
H A D | utf8-win.cpp | 118 size_t cch = strlen(pszString);
|
/vbox/src/libs/xpcom18a4/nsprpub/config/ |
H A D | now.c | 129 for (i = strlen(tbuf); i < 6; ++i)
|
/vbox/src/libs/xpcom18a4/nsprpub/pr/tests/ |
H A D | errset.c | 178 PR_SetErrorText( strlen(errcodes[errnum].errname), errcodes[errnum].errname );
|
/vbox/src/libs/xpcom18a4/xpcom/glue/standalone/ |
H A D | nsGREDirServiceProvider.cpp | 190 if (strlen(psz) < MAXPATHLEN) 363 PRUint32 pathlen = strlen(buffer); 493 if (offset != entry->name + strlen(entry->name) - 5) 539 PRInt32 len = strlen(pathBuffer);
|
/vbox/src/VBox/VMM/VMMR3/ |
H A D | PDMLdr.cpp | 250 size_t cchFilename = strlen(pszFilename); 252 size_t cchName = strlen(pszName); 284 size_t cchSuff = RTPathHasSuffix(pszFilename) ? 0 : strlen(pszSuff); 478 PPDMMOD pModule = (PPDMMOD)RTMemAllocZ(sizeof(*pModule) + strlen(pszFilename)); 485 AssertMsg(strlen(pszName) + 1 < sizeof(pModule->szName), 486 ("pazName is too long (%d chars) max is %d chars.\n", strlen(pszName), sizeof(pModule->szName) - 1)); 653 PPDMMOD pModule = (PPDMMOD)RTMemAllocZ(sizeof(*pModule) + strlen(pszFilename)); 660 AssertMsg(strlen(pszName) + 1 < sizeof(pModule->szName), 661 ("pazName is too long (%d chars) max is %d chars.\n", strlen(pszName), sizeof(pModule->szName) - 1)); 1059 size_t cchDir = strlen(pszDi [all...] |
/vbox/src/VBox/VMM/testcase/ |
H A D | tstGlobalConfig.cpp | 67 size_t cch = strlen(argv[1]);
|
/vbox/src/libs/kStuff/iprt/ |
H A D | kHlpString-iprt.cpp | 148 return strlen(psz1);
|
/vbox/src/VBox/Devices/EFI/Firmware/BaseTools/Source/C/Common/ |
H A D | ParseInf.c | 250 strlen (Section) == 0 || 252 strlen (Token) == 0 || 550 for (; Index < strlen (AsciiString); Index++) {
|
/vbox/src/VBox/HostServices/auth/pam/ |
H A D | VBoxAuthPAM.c | 261 debug_printf("conv: num %d u[%s] p[%d]\n", num_msg, ctx->szUser, ctx->szPassword? strlen (ctx->szPassword): 0); 277 debug_printf("conv: %d returning password [%d]\n", i, r[i].resp? strlen (r[i].resp): 0); 337 debug_printf("u[%s], d[%s], p[%d]\n", szUser, szDomain, szPassword? strlen (szPassword): 0);
|