Home
last modified time | relevance | path

Searched refs:buffer (Results 326 – 342 of 342) sorted by relevance

1...<<11121314

/PHP-8.3/ext/fileinfo/libmagic/
H A Dcompress.c252 file_zmagic(struct magic_set *ms, const struct buffer *b, const char *name) in file_zmagic()
H A Dapprentice.c1259 char buffer[BUFSIZ + 1]; in load_1() local
1281 …for (ms->line = 1; (line = php_stream_get_line(stream, buffer , BUFSIZ, &len)) != NULL; ms->line++… in load_1()
/PHP-8.3/ext/dom/
H A Dnode.c1985 ret = buf->buffer->use; in dom_canonicalization()
1991 RETVAL_STRINGL((char *) buf->buffer->content, ret); in dom_canonicalization()
/PHP-8.3/ext/gmp/
H A Dgmp.c508 static int gmp_serialize(zval *object, unsigned char **buffer, size_t *buf_len, zend_serialize_data… in gmp_serialize() argument
525 *buffer = (unsigned char *) estrndup(ZSTR_VAL(buf.s), ZSTR_LEN(buf.s)); in gmp_serialize()
/PHP-8.3/ext/soap/
H A Dsoap.c1773 zend_string *buffer; local
1785 buffer = ZSTR_INIT_LITERAL("Internal Error", 0);
1787 buffer = zend_string_copy(message);
1798 set_soap_fault(&fault_obj, NULL, code, ZSTR_VAL(buffer), NULL, &outbuf, NULL);
1799 zend_string_release(buffer);
/PHP-8.3/
H A DUPGRADING622 buffer overflows, and is not a security feature.
626 subtracted from the max allowed stack size, as a buffer, when checking the
/PHP-8.3/ext/standard/
H A Durl_scanner_ex.re446 * HTML stuff to the result buffer.
H A Dvar_unserializer.re767 * with unserialize reading past the end of the passed buffer if the string is not
H A Dbasic_functions.stub.php3693 function stream_bucket_new($stream, string $buffer): object {}
H A Dbasic_functions_arginfo.h2120 ZEND_ARG_TYPE_INFO(0, buffer, IS_STRING, 0)
/PHP-8.3/.github/workflows/
H A Dnightly.yml553 # Test causes a heap-buffer-overflow but I cannot reproduce it locally...
/PHP-8.3/ext/opcache/jit/
H A Dzend_jit.c743 static int zend_jit_add_veneer(dasm_State *Dst, void *buffer, uint32_t ins, int *b, uint32_t *cp, p…
H A Dzend_jit_arm64.dasc15430 static int zend_jit_add_veneer(dasm_State *Dst, void *buffer, uint32_t ins, int *b, uint32_t *cp, p…
15478 veneer = (char*)buffer + dasm_getpclabel(&Dst, 1) - (t->exit_count - exit_point) * 4;
15516 veneer = (char*)buffer + (Dst->codesize + dasm_venners_size);
H A Dzend_jit_x86.dasc448 * This is not a problem at all, while JIT buffer size is less than 4GB.
/PHP-8.3/build/
H A Dlibtool.m4815 # (any single argument exceeding 2000 bytes causes a buffer overrun
/PHP-8.3/ext/fileinfo/tests/
H A Dmagic2306 # These are actually just bit-for-bit dumps of the frame buffer, so
34399 0 regex/128l ha:pcb-rnd-buffer-v[0-9]+[\ \t\r\n]*[{] pcb-rnd paste buffer content (lihata)
34410 0 regex/128l li:cschem-buffer-v[0-9]+[\ \t\r\n]*[{] sch-rnd/cschem buffer content (lihata)
H A Dmagic私はガラスを食べられます2306 # These are actually just bit-for-bit dumps of the frame buffer, so
34399 0 regex/128l ha:pcb-rnd-buffer-v[0-9]+[\ \t\r\n]*[{] pcb-rnd paste buffer content (lihata)
34410 0 regex/128l li:cschem-buffer-v[0-9]+[\ \t\r\n]*[{] sch-rnd/cschem buffer content (lihata)

Completed in 256 milliseconds

1...<<11121314