/external/compiler-rt/test/asan/TestCases/Windows/ |
dll_intercept_memcpy.cc | 14 char buff1[6] = "Hello", buff2[5]; local 16 memcpy(buff2, buff1, 5); 17 if (buff1[2] != buff2[2]) 23 memcpy(buff2, buff1, 6); 30 // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
|
dll_intercept_memcpy_indirect.cc | 15 char buff1[6] = "Hello", buff2[5]; local 17 call_memcpy(&memcpy, buff2, buff1, 5); 18 if (buff1[2] != buff2[2]) 24 call_memcpy(&memcpy, buff2, buff1, 6); 32 // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
|
intercept_memcpy.cc | 13 char buff1[6] = "Hello", buff2[5]; local 15 call_memcpy(&memcpy, buff2, buff1, 5); 16 if (buff1[2] != buff2[2]) 22 call_memcpy(&memcpy, buff2, buff1, 6); 30 // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
|
/external/chromium_org/third_party/android_crazy_linker/src/src/ |
crazy_linker_system_unittest.cpp | 22 char buff2[kStringLen + 10]; local 25 EXPECT_EQ(kStringLen, fd.Read(buff2, sizeof(buff2))); 26 buff2[kStringLen] = '\0'; 27 EXPECT_STREQ(kString, buff2);
|
/device/generic/goldfish/libqemu/ |
test_guest_1.c | 61 char buff2[64]; local 79 ret = pipe_recv(pipe, buff2, len); 90 if (memcmp(buff, buff2, len) != 0) {
|
/external/chromium_org/sandbox/win/src/ |
ipc_unittest.cc | 109 void* buff2 = client.GetBuffer(); local 110 EXPECT_TRUE(mem + client_control->channels[2].channel_base == buff2);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x509_vfy.c | 1817 char buff1[24],buff2[24],*p; local [all...] |
/external/openssl/crypto/x509/ |
x509_vfy.c | 1686 char buff1[24],buff2[24],*p; local [all...] |
/external/chromium_org/third_party/libxml/src/ |
xmlreader.c | 1673 xmlBufferPtr buff, buff2; local [all...] |
/external/libxml2/ |
xmlreader.c | 1690 xmlBufferPtr buff, buff2; local [all...] |