strstr, strcasestr - locate a substring


   #include <string.h>

   char *strstr(const char *haystack, const char *needle);

   #define _GNU_SOURCE         /* See feature_test_macros(7) */

   #include <string.h>

   char *strcasestr(const char *haystack, const char *needle);


   The  strstr()  function  finds  the  first  occurrence of the substring
   needle in the string haystack.  The terminating null bytes  ('\0')  are
   not compared.

   The  strcasestr()  function  is  like strstr(), but ignores the case of
   both arguments.


   These functions return a  pointer  to  the  beginning  of  the  located
   substring, or NULL if the substring is not found.


   For   an   explanation   of   the  terms  used  in  this  section,  see

   Interface     Attribute      Value          
   strstr()      Thread safety  MT-Safe        
   strcasestr()  Thread safety  MT-Safe locale 


   strstr(): POSIX.1-2001, POSIX.1-2008, C89, C99.

   The strcasestr() function is a nonstandard extension.


   index(3), memchr(3), memmem(3),  rindex(3),  strcasecmp(3),  strchr(3),
   string(3), strpbrk(3), strsep(3), strspn(3), strtok(3), wcsstr(3)


   This  page  is  part of release 4.09 of the Linux man-pages project.  A
   description of the project, information about reporting bugs,  and  the
   latest     version     of     this    page,    can    be    found    at

More Linux Commands

recvfrom(2) - receive a message from a socket (Man Page)....
The recv(), recvfrom(), and recvmsg() calls are used to receive messages from a socket. They may be used to receive data on both connectionless and connection-o

rwarray(3am) write and read gawk arrays to from files.......
The rwarray extension adds two functions named writea(). and reada(), as follows. writea() This function takes a string argument, which is the name of the file

checkXML(1) An XML lint tool for KDE DocBook XML documents.
checkXML is a tool to check for syntax errors in KDE DocBook XML files. It can also be used for other DocBook based XML files, but you should use the less speci

lchown32(2) - change ownership of a file - Linux man page...
These system calls change the owner and group of a file. The chown(), fchown(), and lchown() system calls differ only in how the file is specified: * chown() ch

XDrawImageString(3) - draw image text - Linux manual page...
The XDrawImageString16 function is similar to XDrawImageString except that it uses 2-byte or 16-bit characters. Both functions also use both the foreground and

perlos400(1) - Perl version 5 on OS/400 - Linux manual page
This document describes various features of IBM s OS/400 operating system that will affect how Perl version 5 (hereafter just Perl) is compiled and/or runs. By

gethostbyname2(3) - get network host entry - Linux man page
The gethostbyname*(), gethostbyaddr*(), herror(), and hstrerror() functions are obsolete. Applications should use getaddrinfo(3), getnameinfo(3), and gai_strerr

regulatory.bin(5) - The Linux wireless regulatory database
regulatory.bin is the file used by the Linux wireless subsystem to keep its regulatory database information. It is read by crda upon the Linux kernels request f

getpwent(3) - get password file entry - Linux manual page...
The getpwent() function returns a pointer to a structure containing the broken-out fields of a record from the password database (e.g., the local password file

ldap_msgfree(3) - Wait for the result of an LDAP operation
The ldap_result() routine is used to wait for and return the result of an operation previously initiated by one of the LDAP asynchronous operation routines (e.g

ldap_start_tls_s(3) - LDAP TLS initialization routines......
These routines are used to initiate TLS processing on an LDAP session. ldap_start_tls_s() sends a StartTLS request to a server, waits for the reply, and then in

ppmtoeyuv(1) - convert a PPM image into a Berkeley YUV file
This program is part of Netpbm(1) ppmtoeyuv reads a PPM image as input and produces a Berkeley Encoder YUV (not the same as Abekas YUV) file on the Standard Out

We can't live, work or learn in freedom unless the software we use is free.