Searched refs:buffer (Results 326 – 342 of 342) sorted by relevance
1...<<11121314
/PHP-8.3/ext/fileinfo/libmagic/ |
H A D | compress.c | 252 file_zmagic(struct magic_set *ms, const struct buffer *b, const char *name) in file_zmagic()
|
H A D | apprentice.c | 1259 char buffer[BUFSIZ + 1]; in load_1() local 1281 …for (ms->line = 1; (line = php_stream_get_line(stream, buffer , BUFSIZ, &len)) != NULL; ms->line++… in load_1()
|
/PHP-8.3/ext/dom/ |
H A D | node.c | 1985 ret = buf->buffer->use; in dom_canonicalization() 1991 RETVAL_STRINGL((char *) buf->buffer->content, ret); in dom_canonicalization()
|
/PHP-8.3/ext/gmp/ |
H A D | gmp.c | 508 static int gmp_serialize(zval *object, unsigned char **buffer, size_t *buf_len, zend_serialize_data… in gmp_serialize() argument 525 *buffer = (unsigned char *) estrndup(ZSTR_VAL(buf.s), ZSTR_LEN(buf.s)); in gmp_serialize()
|
/PHP-8.3/ext/soap/ |
H A D | soap.c | 1773 zend_string *buffer; local 1785 buffer = ZSTR_INIT_LITERAL("Internal Error", 0); 1787 buffer = zend_string_copy(message); 1798 set_soap_fault(&fault_obj, NULL, code, ZSTR_VAL(buffer), NULL, &outbuf, NULL); 1799 zend_string_release(buffer);
|
/PHP-8.3/ |
H A D | UPGRADING | 622 buffer overflows, and is not a security feature. 626 subtracted from the max allowed stack size, as a buffer, when checking the
|
/PHP-8.3/ext/standard/ |
H A D | url_scanner_ex.re | 446 * HTML stuff to the result buffer.
|
H A D | var_unserializer.re | 767 * with unserialize reading past the end of the passed buffer if the string is not
|
H A D | basic_functions.stub.php | 3693 function stream_bucket_new($stream, string $buffer): object {}
|
H A D | basic_functions_arginfo.h | 2120 ZEND_ARG_TYPE_INFO(0, buffer, IS_STRING, 0)
|
/PHP-8.3/.github/workflows/ |
H A D | nightly.yml | 553 # Test causes a heap-buffer-overflow but I cannot reproduce it locally...
|
/PHP-8.3/ext/opcache/jit/ |
H A D | zend_jit.c | 743 static int zend_jit_add_veneer(dasm_State *Dst, void *buffer, uint32_t ins, int *b, uint32_t *cp, p…
|
H A D | zend_jit_arm64.dasc | 15430 static int zend_jit_add_veneer(dasm_State *Dst, void *buffer, uint32_t ins, int *b, uint32_t *cp, p… 15478 veneer = (char*)buffer + dasm_getpclabel(&Dst, 1) - (t->exit_count - exit_point) * 4; 15516 veneer = (char*)buffer + (Dst->codesize + dasm_venners_size);
|
H A D | zend_jit_x86.dasc | 448 * This is not a problem at all, while JIT buffer size is less than 4GB.
|
/PHP-8.3/build/ |
H A D | libtool.m4 | 815 # (any single argument exceeding 2000 bytes causes a buffer overrun
|
/PHP-8.3/ext/fileinfo/tests/ |
H A D | magic | 2306 # These are actually just bit-for-bit dumps of the frame buffer, so 34399 0 regex/128l ha:pcb-rnd-buffer-v[0-9]+[\ \t\r\n]*[{] pcb-rnd paste buffer content (lihata) 34410 0 regex/128l li:cschem-buffer-v[0-9]+[\ \t\r\n]*[{] sch-rnd/cschem buffer content (lihata)
|
H A D | magic私はガラスを食べられます | 2306 # These are actually just bit-for-bit dumps of the frame buffer, so 34399 0 regex/128l ha:pcb-rnd-buffer-v[0-9]+[\ \t\r\n]*[{] pcb-rnd paste buffer content (lihata) 34410 0 regex/128l li:cschem-buffer-v[0-9]+[\ \t\r\n]*[{] sch-rnd/cschem buffer content (lihata)
|
Completed in 256 milliseconds
1...<<11121314