Searched
full:malloc (Results
776 -
800 of
6596) sorted by null
<<31323334353637383940>>
/external/chromium_org/third_party/libevent/test/ |
test-time.c | 76 ev[i] = malloc(sizeof(struct event));
|
/external/chromium_org/third_party/libwebp/utils/ |
utils.h | 32 // size-checking safe malloc/calloc: verify that the requested size is not too 34 // malloc(sizeof(foo)), but only if there's picture-dependent size involved 35 // somewhere (like: malloc(num_pixels * sizeof(*something))). That's why this 36 // safe malloc() borrows the signature from calloc(), pointing at the dangerous
|
/external/chromium_org/third_party/mesa/src/src/egl/main/ |
eglstring.c | 45 char *s2 = malloc(l + 1);
|
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/d3d1x/gd3d11/ |
d3d11_misc.h | 12 void* data = malloc(num_bytes);
|
/external/chromium_org/third_party/npapi/npspy/extern/nspr/ |
prmem.h | 52 ** NOTE: pr wraps up malloc, free, calloc, realloc so they are already 58 ** as their libc equivalent malloc, calloc, realloc, and free, and have 83 ** RETURN: pointer to node or error returned from malloc(). 93 ** RETURN: pointer to _struct or error returns from malloc().
|
/external/chromium_org/third_party/ocmock/OCMock/ |
OCMBoxedReturnValueProvider.m | 15 void *buffer = malloc([[anInvocation methodSignature] methodReturnLength]);
|
/external/chromium_org/third_party/opus/src/celt/tests/ |
test_unit_mdct.c | 120 kiss_fft_scalar * in = (kiss_fft_scalar*)malloc(buflen); 121 kiss_fft_scalar * in_copy = (kiss_fft_scalar*)malloc(buflen); 122 kiss_fft_scalar * out= (kiss_fft_scalar*)malloc(buflen); 123 opus_val16 * window= (opus_val16*)malloc(sizeof(opus_val16)*nfft/2);
|
/external/chromium_org/third_party/skia/src/gpu/ |
GrAllocPool.h | 29 * address was allocated by malloc or new (because it hasn't).
|
/external/chromium_org/third_party/sqlite/src/ext/fts1/ |
simple_tokenizer.c | 10 #include <malloc.h> 26 char *str = malloc(strlen(s) + 1); 55 t = (simple_tokenizer *) malloc(sizeof(simple_tokenizer)); 97 c = (simple_tokenizer_cursor *) malloc(sizeof(simple_tokenizer_cursor));
|
/external/chromium_org/third_party/sqlite/src/test/ |
mallocAll.test | 51 foreach testfile [lsort -dictionary [glob $testdir/*malloc*.test]] {
|
/external/chromium_org/third_party/tcmalloc/chromium/src/tests/ |
realloc_unittest.cc | 39 #include <stdlib.h> // for free, malloc, realloc 92 unsigned char* src = (unsigned char*) malloc(src_size); 106 int** p = (int**)malloc(sizeof(*p) * kNumEntries); 109 p[i] = (int*)malloc(8192); // no page size is likely to be bigger
|
system-alloc_unittest.cc | 125 // There is no way to call malloc and guarantee it will fail. malloc takes a 138 void* p1 = malloc(kHugeSize); 139 void* p2 = malloc(kHugeSize);
|
/external/chromium_org/third_party/tcmalloc/vendor/src/tests/ |
realloc_unittest.cc | 39 #include <stdlib.h> // for free, malloc, realloc 92 unsigned char* src = (unsigned char*) malloc(src_size); 106 int** p = (int**)malloc(sizeof(*p) * kNumEntries); 109 p[i] = (int*)malloc(8192); // no page size is likely to be bigger
|
system-alloc_unittest.cc | 125 // There is no way to call malloc and guarantee it will fail. malloc takes a 138 void* p1 = malloc(kHugeSize); 139 void* p2 = malloc(kHugeSize);
|
/external/chromium_org/webkit/child/ |
webkit_child_helpers.cc | 8 #include <malloc.h>
|
/external/clang/INPUTS/ |
macro_pounder_fn.c | 3 // heavily constrained by darwin's malloc.
|
/external/clang/test/Analysis/Inputs/ |
system-header-simulator-for-malloc.h | 9 void *malloc(size_t);
|
/external/clang/test/Analysis/ |
cxx-crashes.cpp | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc,debug.ExprInspection -verify %s
|
objc-boxing.m | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc -analyzer-store=region -verify %s
|
/external/clang/test/Analysis/engine/ |
replay-without-inlining.c | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc -verify %s
|
/external/clang/test/PCH/ |
crash-12631281.cpp | 7 // reproduced only on guarded malloc (and probably valgrind).
|
/external/compiler-rt/lib/asan/lit_tests/TestCases/Linux/ |
interception_test.cc | 17 char *x = (char*)malloc(10 * sizeof(char));
|
/external/compiler-rt/lib/asan/lit_tests/TestCases/ |
malloc_fill.cc | 1 // Check that we fill malloc-ed memory correctly.
|
/external/compiler-rt/lib/asan/tests/ |
asan_noinst_test.cc | 363 char *array = Ident((char*)malloc(kArraySize)); 374 // and from the interior pointers (not returned by previous malloc). 393 void *zero_alloc = Ident(malloc(0)); 395 // If malloc(0) is not null, this pointer is owned and should have valid 410 array = Ident((char*)malloc(kMallocSize)); 430 free(Ident(malloc(kLargeMallocSize))); // Drain quarantine. 434 free(Ident(malloc(kLargeMallocSize))); 448 free(Ident(malloc(kManyThreadsMallocSizes[size_index]))); 452 free(Ident(malloc(1 << 20))); 502 char *array = Ident((char*)malloc(120)) [all...] |
/external/compiler-rt/lib/lsan/lit_tests/TestCases/ |
disabler_in_tsd_destructor.cc | 17 void *p = malloc(1337);
|
Completed in 2214 milliseconds
<<31323334353637383940>>