Searched refs:buffer (Results 101 – 125 of 321) sorted by relevance
12345678910>>...13
/PHP-8.0/ext/exif/tests/ |
H A D | bug77753.phpt | 2 Bug #77753 (Heap-buffer-overflow in php_ifd_get32s)
|
H A D | bug77950.phpt | 2 Bug #77950 (Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG)
|
H A D | bug77988.phpt | 2 Bug #77988 (heap-buffer-overflow on php_jpg_get16)
|
H A D | bug78222.phpt | 2 Bug #78222 (heap-buffer-overflow on exif_scan_thumbnail)
|
H A D | bug77831.phpt | 2 Bug #77831 (Heap-buffer-overflow in exif_iif_add_value in EXIF)
|
/PHP-8.0/ext/standard/tests/serialize/ |
H A D | bug74111.phpt | 2 Bug #74111: Heap buffer overread (READ: 1) finish_nested_data from unserialize
|
/PHP-8.0/ext/phar/tests/ |
H A D | bug77247.phpt | 2 PHP bug #77247 (heap buffer overflow in phar_detect_phar_fname_ext)
|
/PHP-8.0/Zend/tests/ |
H A D | bug70430.phpt | 2 Bug #70430: Stack buffer overflow in zend_language_parser()
|
/PHP-8.0/ext/hash/ |
H A D | hash_sha.c | 241 memcpy((unsigned char*) & context->buffer[index], (unsigned char*) input, partLen); in PHP_SHA224Update() 242 SHA256Transform(context->state, context->buffer); in PHP_SHA224Update() 254 memcpy((unsigned char*) & context->buffer[index], (unsigned char*) & input[i], inputLen - i); in PHP_SHA224Update() 318 memcpy((unsigned char*) & context->buffer[index], (unsigned char*) input, partLen); in PHP_SHA256Update() 319 SHA256Transform(context->state, context->buffer); in PHP_SHA256Update() 331 memcpy((unsigned char*) & context->buffer[index], (unsigned char*) & input[i], inputLen - i); in PHP_SHA256Update() 532 memcpy((unsigned char*) & context->buffer[index], (unsigned char*) input, partLen); in PHP_SHA384Update() 533 SHA512Transform(context->state, context->buffer); in PHP_SHA384Update() 543 memcpy((unsigned char*) & context->buffer[index], (unsigned char*) & input[i], inputLen - i); in PHP_SHA384Update() 685 memcpy((unsigned char*) & context->buffer[index], (unsigned char*) input, partLen); in PHP_SHA512Update() [all …]
|
H A D | php_hash_tiger.h | 24 unsigned char buffer[64]; member
|
/PHP-8.0/ext/pdo_oci/tests/ |
H A D | pdo_oci_fread_1.phpt | 41 $buffer = fread($sh,1024); 42 echo '*'.$buffer.'*';
|
/PHP-8.0/ext/standard/tests/strings/ |
H A D | 005.phpt | 2 highlight_string(), output buffer and error level
|
H A D | 006.phpt | 2 highlight_file() and output buffer
|
/PHP-8.0/ext/standard/ |
H A D | md5.h | 40 unsigned char buffer[64]; member
|
/PHP-8.0/ext/mbstring/tests/ |
H A D | bug79371.phpt | 2 Bug #79371 (mb_strtolower (UTF-32LE): stack-buffer-overflow)
|
H A D | bug78559.phpt | 2 Bug #78559 (#78559 Heap buffer overflow in mb_eregi)
|
H A D | bug78633.phpt | 2 Bug #78633 (Heap buffer overflow (read) in mb_eregi)
|
/PHP-8.0/ext/standard/tests/ |
H A D | bug79821.phpt | 11 ob_start(function (string $buffer) use (&$bar) {
|
/PHP-8.0/ext/date/tests/ |
H A D | bug49585.phpt | 2 Bug #49585 (date_format buffer not long enough for >4 digit years)
|
/PHP-8.0/ext/pcre/pcre2lib/ |
H A D | pcre2_substring.c | 74 PCRE2_UCHAR *buffer, PCRE2_SIZE *sizeptr) in pcre2_substring_copy_byname() argument 90 return pcre2_substring_copy_bynumber(match_data, n, buffer, sizeptr); in pcre2_substring_copy_byname() 122 uint32_t stringnumber, PCRE2_UCHAR *buffer, PCRE2_SIZE *sizeptr) in pcre2_substring_copy_bynumber() argument 129 memcpy(buffer, match_data->subject + match_data->ovector[stringnumber*2], in pcre2_substring_copy_bynumber() 131 buffer[size] = 0; in pcre2_substring_copy_bynumber()
|
/PHP-8.0/ext/xmlwriter/tests/ |
H A D | 002.phpt | 13 // Force to write and empty the buffer
|
H A D | OO_002.phpt | 14 // Force to write and empty the buffer
|
/PHP-8.0/ext/fileinfo/tests/ |
H A D | bug71434.phpt | 14 echo $finfo->buffer($a) . "\n";
|
/PHP-8.0/ext/calendar/tests/ |
H A D | bug71894.phpt | 2 Bug #71894 (AddressSanitizer: global-buffer-overflow in zif_cal_from_jd)
|
/PHP-8.0/tests/lang/ |
H A D | bug32828.phpt | 6 function output_handler($buffer)
|
Completed in 35 milliseconds
12345678910>>...13