HomeSort by relevance Sort by last modified time
    Searched refs:canary (Results 1 - 10 of 10) sorted by null

  /external/vboot_reference/scripts/image_signing/sample-test-configs/
ensure_sane_lsb-release.config 18 canary-channel
  /system/bt/osi/src/
allocation_tracker.cc 41 static char canary[canary_size]; variable
56 // randomize the canary contents
57 for (size_t i = 0; i < canary_size; i++) canary[i] = (char)osi_rand();
59 LOG_DEBUG(LOG_TAG, "canary initialized");
129 // Add the canary on both sides
130 memcpy(return_ptr - canary_size, canary, canary_size);
131 memcpy(return_ptr + requested_size, canary, canary_size);
160 CHECK(beginning_canary[i] == canary[i]);
161 CHECK(end_canary[i] == canary[i]);
  /external/ltp/testcases/kernel/syscalls/gethostbyname_r/
gethostbyname_r01.c 28 #define CANARY "in_the_coal_mine"
35 char canary[sizeof(CANARY)]; member in struct:__anon26684
38 CANARY,
87 if (strcmp(temp.canary, CANARY) != 0) {
  /frameworks/data-binding/integration-tests/TestApp/app/src/androidTestApi7/java/android/databinding/testapp/
LeakTest.java 66 WeakReference<Object> canary = new WeakReference<Object>(new Object()); local
68 while (canary.get() != null) {
  /system/update_engine/
omaha_request_params_unittest.cc 118 EXPECT_TRUE(params.SetTargetChannel("canary-channel", false, nullptr));
123 EXPECT_EQ("canary-channel", params_.target_channel());
132 EXPECT_TRUE(params.SetTargetChannel("canary-channel", true, nullptr));
137 EXPECT_EQ("canary-channel", params_.target_channel());
161 EXPECT_TRUE(params_.IsValidChannel("canary-channel"));
211 int canary = params_.GetChannelIndex("canary-channel"); local
215 EXPECT_LE(canary, dev);
227 params_.image_props_.current_channel = "canary-channel";
  /external/mesa3d/src/util/
ralloc.c 52 #define CANARY 0x5A1106
70 /* A canary value used to determine whether a pointer is ralloc'd. */
71 unsigned canary; variable
97 assert(info->canary == CANARY);
149 info->canary = CANARY;
  /external/v8/tools/release/
releases.py 454 if current_version["channel"] != "canary":
test_scripts.py     [all...]
  /external/lz4/tests/
fuzzer.c 333 char const canary = FUZ_rand(&randState) & 255; local
337 decodedBuffer[srcSize] = canary;
341 FUZ_CHECKTEST(decodedBuffer[srcSize] != canary, "LZ4_decompress_safe() overwrite dst buffer !");
    [all...]
  /external/v8/benchmarks/
crypto.js 54 var canary = 0xdeadbeefcafe; variable
55 var j_lm = ((canary&0xffffff)==0xefcafe);
    [all...]

Completed in 1584 milliseconds