/external/compiler-rt/test/asan/TestCases/Windows/ |
dll_intercept_memcpy.cc | 14 char buff1[6] = "Hello", buff2[5]; local 16 memcpy(buff2, buff1, 5); 17 if (buff1[2] != buff2[2]) 23 memcpy(buff2, buff1, 6); 30 // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
|
dll_intercept_memcpy_indirect.cc | 15 char buff1[6] = "Hello", buff2[5]; local 17 call_memcpy(&memcpy, buff2, buff1, 5); 18 if (buff1[2] != buff2[2]) 24 call_memcpy(&memcpy, buff2, buff1, 6); 32 // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
|
intercept_memcpy.cc | 13 char buff1[6] = "Hello", buff2[5]; local 15 call_memcpy(&memcpy, buff2, buff1, 5); 16 if (buff1[2] != buff2[2]) 22 call_memcpy(&memcpy, buff2, buff1, 6); 30 // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
|
/device/generic/goldfish/libqemu/ |
test_guest_1.c | 61 char buff2[64]; local 79 ret = pipe_recv(pipe, buff2, len); 90 if (memcmp(buff, buff2, len) != 0) {
|
/external/toybox/toys/pending/ |
telnetd.c | 60 char buff1[BUFSIZE], buff2[BUFSIZE]; member in struct:term_session 214 curr = start = tm->buff2+tm->buff2_avail; 215 end = tm->buff2 + c -1; 393 if ((c = read(tm->new_fd, tm->buff2+tm->buff2_avail, 397 if ((w = write(tm->pty_fd, tm->buff2+ tm->buff2_written, 402 if ((w = write(tm->pty_fd, tm->buff2 + tm->buff2_written,
|
/external/boringssl/src/crypto/x509/ |
x509_vfy.c | 1836 char buff1[24],buff2[24],*p; local [all...] |
/external/libxml2/ |
xmlreader.c | 1703 xmlBufferPtr buff, buff2; local [all...] |
/external/pcre/dist/ |
pcregrep.c | 2735 char buff2[24]; local [all...] |