/external/valgrind/main/memcheck/tests/amd64/ |
insn-pcmpistri.stdout.exp | 0 strlen("")=0 2 strlen("a")=1 3 strlen("ab")=2 4 strlen("abc")=3 5 strlen("abcd")=4 6 strlen("abcde")=5 7 strlen("abcdef")=6 8 strlen("abcdefg")=7 9 strlen("abcdefgh")=8 10 strlen("abcdefghi")= [all...] |
/external/clang/test/CodeGenCXX/ |
2004-03-09-UnmangledBuiltinMethods.cpp | 5 void strlen(); 8 void AccessFlags::strlen() { } function in class:AccessFlags
|
/external/valgrind/main/none/tests/ |
readline1.stdout.exp | 1 HERE strlen is 2
|
coolo_strlen.c | 7 int len = strlen(b2);
|
/external/compiler-rt/test/msan/ |
tzset.cc | 10 if (!strlen(tzname[0]) || !strlen(tzname[1])) 13 if (!strlen(tzname[0]) || !strlen(tzname[1]))
|
strlen_of_shadow.cc | 3 // Check that strlen() and similar intercepted functions can be called on shadow 17 assert(strlen(s) == 6); 18 assert(strlen(mem_to_shadow(s)) == 0); 22 assert(strlen(mem_to_shadow(t)) == 41);
|
/external/clang/test/SemaCXX/ |
constexpr-strlen.cpp | 6 extern size_t strlen(const char *p); 9 # 10 "SemaCXX/constexpr-strlen.cpp" 2 11 constexpr int m = strlen("hello"); // expected-error {{constant expression}} expected-note {{non-constexpr function 'strlen' cannot be used in a constant expression}} 13 // Make sure we can evaluate a call to strlen. 15 int k = arr[strlen("hello")]; // expected-warning {{array index 5}}
|
/external/clang/test/CodeGen/ |
stack-protector.c | 13 size_t strlen(const char *s); 17 char a[strlen(msg) + 1];
|
/external/compiler-rt/test/asan/TestCases/Windows/ |
dll_intercept_strlen.cc | 11 if (6 != strlen(str)) 18 int len = strlen(str); 22 // CHECK-NEXT: {{#0 .*}}strlen
|
intercept_strlen.cc | 9 if (5 != strlen(str)) 17 int len = strlen(str); 21 // CHECK: strlen
|
/external/e2fsprogs/intl/ |
os2compat.c | 59 size_t sl = strlen (root); 60 _nlos2_libdir = (char *) malloc (sl + strlen (LIBDIR) + 1); 62 memcpy (_nlos2_libdir + sl, LIBDIR, strlen (LIBDIR) + 1); 73 size_t sl = strlen (root); 74 _nlos2_localealiaspath = (char *) malloc (sl + strlen (LOCALE_ALIAS_PATH) + 1); 76 memcpy (_nlos2_localealiaspath + sl, LOCALE_ALIAS_PATH, strlen (LOCALE_ALIAS_PATH) + 1); 87 size_t sl = strlen (root); 88 _nlos2_localedir = (char *) malloc (sl + strlen (LOCALEDIR) + 1); 90 memcpy (_nlos2_localedir + sl, LOCALEDIR, strlen (LOCALEDIR) + 1); 96 if (strlen (_nlos2_localedir) <= MAXPATHLEN [all...] |
/external/oprofile/libop/ |
op_mangle.c | 53 len = strlen(op_samples_current_dir) + strlen(dep_name) + 1 54 + strlen(values->event_name) + 1 + strlen(image_name) + 1; 57 len += strlen(cg_image_name) + 1; 60 len += strlen(anon_name); 82 sprintf(mangled + strlen(mangled), ".%d.%d.", 86 sprintf(mangled + strlen(mangled), "%d.", values->tgid); 88 sprintf(mangled + strlen(mangled), "%s.", "all"); 92 sprintf(mangled + strlen(mangled), "%d.", values->tid) [all...] |
/external/clang/test/Analysis/ |
comparison-implicit-casts.cpp | 17 // unix.cstring's strlen() modelling). 74 size_t strlen(const char *s); 87 if (strlen(x) != value) return; 90 clang_analyzer_eval(strlen(x) >= 2); // expected-warning{{TRUE}} 91 clang_analyzer_eval(2 <= strlen(x)); // expected-warning{{TRUE}} 94 clang_analyzer_eval(strlen(x) != 1); // expected-warning{{TRUE}} 95 clang_analyzer_eval(1 != strlen(x)); // expected-warning{{TRUE}}
|
cstring-syntax.c | 5 size_t strlen (const char *s); 9 strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(dest) - 1); // expected-warning {{Potential buffer overflow. Replace with 'sizeof(dest) - strlen(dest) - 1' or use a safer 'strlcat' API}} 11 strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(dest) - strlen(dest)); // expected-warning {{Potential buffer overflow. Replace with}}
|
/hardware/intel/img/libdrm/tests/ |
getversion.c | 40 assert(strlen(v->name) != 0); 41 assert(strlen(v->date) != 0); 42 assert(strlen(v->desc) != 0);
|
/bionic/libc/upstream-openbsd/lib/libc/string/ |
strlen.c | 1 /* $OpenBSD: strlen.c,v 1.8 2014/06/10 04:17:37 deraadt Exp $ */ 35 strlen(const char *str) function
|
/external/chromium_org/sync/util/ |
logging.cc | 15 from_here.file_name(), ::strlen(from_here.file_name())));
|
/external/chromium_org/third_party/webrtc/modules/audio_device/dummy/ |
file_audio_device_factory.cc | 25 if (strlen(_inputAudioFilename) == 0 || strlen(_outputAudioFilename) == 0) { 35 assert(strlen(inputAudioFilename) < MAX_FILENAME_LEN && 36 strlen(outputAudioFilename) < MAX_FILENAME_LEN);
|
/external/elfutils/0.153/lib/ |
xstrdup.c | 39 return strcpy (xmalloc (strlen (string) + 1), string);
|
/bionic/libc/private/ |
bionic_string_utils.h | 23 size_t s1_length = strlen(s1); 24 size_t s2_length = strlen(s2);
|
/external/chromium_org/base/ |
build_time_unittest.cc | 12 EXPECT_EQ(11u, strlen(build_date)); 20 EXPECT_EQ(8u, strlen(build_time));
|
/external/chromium_org/chrome/browser/nacl_host/test/ |
mock_nacl_gdb.cc | 28 CHECK_GE(strlen(argv[2]), strlen(kNaClIrt)); 29 CHECK_EQ(strncmp(argv[2], kNaClIrt, strlen(kNaClIrt)), 0); 30 char* irt_file_name = strdup(&argv[2][strlen(kNaClIrt)]); 31 CHECK_GE(strlen(irt_file_name), 1u); 33 irt_file_name[strlen(irt_file_name) - 1] = 0; 54 kPass, strlen(kPass)); 62 kPass, strlen(kPass));
|
/external/chromium_org/third_party/WebKit/Source/wtf/text/ |
TextCodec.cpp | 47 return static_cast<int>(strlen(replacement)); 50 return static_cast<int>(strlen(replacement));
|
/external/chromium_org/base/third_party/xdg_user_dirs/ |
xdg_user_dir_lookup.cc | 67 config_file = (char*) malloc (strlen (home_dir) + strlen ("/.config/user-dirs.dirs") + 1); 76 config_file = (char*) malloc (strlen (config_home) + strlen ("/user-dirs.dirs") + 1); 93 len = strlen (buffer); 104 if (strncmp (p, type, strlen (type)) != 0) 106 p += strlen (type); 136 user_dir = (char*) malloc (strlen (home_dir) + 1 + strlen (p) + 1); 145 user_dir = (char*) malloc (strlen (p) + 1) [all...] |
/bionic/libc/bionic/ |
__strlen_chk.cpp | 43 * This strlen check is called if _FORTIFY_SOURCE is defined and 51 * size_t len = strlen(buf); // segfault here with _FORTIFY_SOURCE 56 * or anytime strlen reads beyond an object boundary. 59 size_t ret = strlen(s); 62 __fortify_chk_fail("strlen: prevented read past end of buffer", 0);
|