/PHP-7.4/sapi/phpdbg/ |
H A D | phpdbg.h | 309 char *buffer; /* buffer */ variable
|
H A D | phpdbg.c | 149 pg->buffer = NULL; in php_phpdbg_globals_ctor() 235 if (PHPDBG_G(buffer)) { in PHP_MSHUTDOWN_FUNCTION() 236 free(PHPDBG_G(buffer)); in PHP_MSHUTDOWN_FUNCTION() 237 PHPDBG_G(buffer) = NULL; in PHP_MSHUTDOWN_FUNCTION() 1207 char buffer[20] = {0}; in phpdbg_remote_init() local 1211 inet_ntop(AF_INET, &(((struct sockaddr_in *)&address)->sin_addr), buffer, sizeof(buffer)); in phpdbg_remote_init() 1213 phpdbg_rlog(fileno(stderr), "connection established from %s", buffer); in phpdbg_remote_init()
|
/PHP-7.4/ext/phar/ |
H A D | zip.c | 27 static inline void phar_write_32(char buffer[4], uint32_t value) in phar_write_32() 29 buffer[3] = (unsigned char) ((value & 0xff000000) >> 24); in phar_write_32() 30 buffer[2] = (unsigned char) ((value & 0xff0000) >> 16); in phar_write_32() 31 buffer[1] = (unsigned char) ((value & 0xff00) >> 8); in phar_write_32() 32 buffer[0] = (unsigned char) (value & 0xff); in phar_write_32() 34 static inline void phar_write_16(char buffer[2], uint32_t value) in phar_write_16() 36 buffer[1] = (unsigned char) ((value & 0xff00) >> 8); in phar_write_16() 37 buffer[0] = (unsigned char) (value & 0xff); in phar_write_16()
|
/PHP-7.4/Zend/ |
H A D | zend_language_parser.y | 1336 char buffer[120]; variable 1370 snprintf(buffer, sizeof(buffer), "'%.*s' %.*s", len, str, toklen, tok1); 1372 snprintf(buffer, sizeof(buffer), "'%.*s'", len, str); 1374 yystpcpy(yyres, buffer);
|
/PHP-7.4/ext/soap/ |
H A D | php_packet_soap.c | 24 int parse_packet_soap(zval *this_ptr, char *buffer, int buffer_size, sdlFunctionPtr fn, char *fn_na… in parse_packet_soap() argument 42 response = soap_xmlParseMemory(buffer, buffer_size); in parse_packet_soap()
|
H A D | soap.c | 2134 char buffer[1024]; local 2139 buffer_len = vslprintf(buffer, sizeof(buffer)-1, format, argcopy); 2142 buffer[sizeof(buffer)-1]=0; 2143 if (buffer_len > sizeof(buffer) - 1 || buffer_len == (size_t)-1) { 2144 buffer_len = sizeof(buffer) - 1; 2173 char buffer[1024]; local 2187 strcpy(buffer, "Internal Error"); 2193 buffer_len = vslprintf(buffer, sizeof(buffer)-1, format, argcopy); 2196 buffer[sizeof(buffer)-1]=0; 2197 if (buffer_len > sizeof(buffer) - 1 || buffer_len == (size_t)-1) { [all …]
|
/PHP-7.4/win32/ |
H A D | ioutil.c | 1032 char buffer[MAXIMUM_REPARSE_DATA_BUFFER_SIZE]; in php_win32_ioutil_readlink_int() local 1033 …HP_WIN32_IOUTIL_REPARSE_DATA_BUFFER *reparse_data = (PHP_WIN32_IOUTIL_REPARSE_DATA_BUFFER*) buffer; in php_win32_ioutil_readlink_int() 1042 buffer, in php_win32_ioutil_readlink_int() 1043 sizeof buffer, in php_win32_ioutil_readlink_int()
|
/PHP-7.4/ext/hash/ |
H A D | hash_haval.c | 300 memcpy((unsigned char*) & context->buffer[index], (unsigned char*) input, partLen); in PHP_HAVALUpdate() 301 context->Transform(context->state, context->buffer); in PHP_HAVALUpdate() 313 memcpy((unsigned char*) &context->buffer[index], (unsigned char*) &input[i], inputLen - i); in PHP_HAVALUpdate()
|
/PHP-7.4/ |
H A D | NEWS | 13 . Fixed bug #81738: buffer overflow in hash_update() on long parameter. 265 . Fixed bug #76448: Stack buffer overflow in firebird_info_cb. 1145 . Fixed bug #79171 (heap-buffer-overflow in phar_extract_file). 1659 . Fixed bug #78510 (Partially uninitialized buffer returned by 1704 with fixed length buffer). (Albert Casademont) 1842 . Fixed bug #78559 (Heap buffer overflow in mb_eregi). (cmb) 1855 . Fixed bug #78510 (Partially uninitialized buffer returned by 1901 with fixed length buffer). (Albert Casademont) 2029 . Fixed bug #77988 (heap-buffer-overflow on php_jpg_get16). 2402 . Fixed bug #77371 (heap buffer overflow in mb regex functions [all …]
|
/PHP-7.4/ext/standard/tests/strings/ |
H A D | wordwrap_error.phpt | 6 * Description: Wraps buffer to selected number of characters using string break char
|
/PHP-7.4/ext/oci8/tests/ |
H A D | bug27303_4.phpt | 7 // The bind buffer size edge cases seem to change each DB version.
|
H A D | bug27303_1.phpt | 7 // The bind buffer size edge cases seem to change each DB version.
|
H A D | bug27303_1_11gR1.phpt | 7 // The bind buffer size edge cases seem to change each DB version.
|
H A D | bug27303_2.phpt | 7 // The bind buffer size edge cases seem to change each DB version.
|
H A D | bug27303_2_11gR1.phpt | 7 // The bind buffer size edge cases seem to change each DB version.
|
H A D | bug27303_4_11gR1.phpt | 7 // The bind buffer size edge cases seem to change each DB version.
|
/PHP-7.4/tests/output/ |
H A D | ob_start_basic_004.phpt | 2 ob_start() chunk_size: confirm buffer is flushed after any output call that causes its length to eq…
|
/PHP-7.4/ext/openssl/ |
H A D | openssl.c | 1299 char buffer[MAXPATHLEN]; in php_openssl_load_rand_file() local 1305 file = RAND_file_name(buffer, sizeof(buffer)); in php_openssl_load_rand_file() 1329 char buffer[MAXPATHLEN]; in php_openssl_write_rand_file() local 1338 file = RAND_file_name(buffer, sizeof(buffer)); in php_openssl_write_rand_file() 3210 memcpy(buffer, type, len); in php_openssl_make_REQ() 3211 buffer[len] = '\0'; in php_openssl_make_REQ() 3212 type = buffer; in php_openssl_make_REQ() 6955 zend_string *buffer = NULL; in php_openssl_random_pseudo_bytes() local 6986 return buffer; in php_openssl_random_pseudo_bytes() 6993 zend_string *buffer = NULL; in PHP_FUNCTION() local [all …]
|
H A D | xp_ssl.c | 760 BIO *buffer; in php_openssl_load_stream_cafile() local 784 buffer = BIO_new(BIO_s_mem()); in php_openssl_load_stream_cafile() 794 BIO_puts(buffer, line); in php_openssl_load_stream_cafile() 810 BIO_puts(buffer, line); in php_openssl_load_stream_cafile() 812 cert = PEM_read_bio_X509(buffer, NULL, 0, NULL); in php_openssl_load_stream_cafile() 813 BIO_free(buffer); in php_openssl_load_stream_cafile() 825 BIO_free(buffer); in php_openssl_load_stream_cafile()
|
/PHP-7.4/main/ |
H A D | php_output.h | 127 php_output_buffer buffer; member
|
/PHP-7.4/ext/exif/ |
H A D | exif.c | 2433 char buffer[64], *val, *name, uname[64]; in add_assoc_image_info() local 2533 snprintf(buffer, sizeof(buffer), "%u/%u", info_value->ur.num, info_value->ur.den); in add_assoc_image_info() 2535 add_assoc_string(&tmpi, name, buffer); in add_assoc_image_info() 2537 add_index_string(&array, ap, buffer); in add_assoc_image_info() 2559 snprintf(buffer, sizeof(buffer), "%i/%i", info_value->sr.num, info_value->sr.den); in add_assoc_image_info() 2561 add_assoc_string(&tmpi, name, buffer); in add_assoc_image_info() 2563 add_index_string(&array, ap, buffer); in add_assoc_image_info() 3795 static void exif_process_APP12(image_info_type *ImageInfo, char *buffer, size_t length) in exif_process_APP12() argument 3799 if ((l1 = php_strnlen(buffer+2, length-2)) > 0) { in exif_process_APP12() 3800 exif_iif_add_tag(ImageInfo, SECTION_APP12, "Company", TAG_NONE, TAG_FMT_STRING, l1, buffer+2, l1); in exif_process_APP12() [all …]
|
/PHP-7.4/ext/phar/tests/tar/files/ |
H A D | make.dangerous.tar.php.inc | 3 // this tarmaker makes a malicious tar with a header designed to overflow the buffer
|
/PHP-7.4/ext/standard/tests/file/ |
H A D | userstreams.phpt | 7 * user streams and also gives the seek/gets/buffer 184 /* some default seeks that will cause buffer/cache misses */
|
/PHP-7.4/ext/libxml/ |
H A D | libxml.c | 382 static int php_libxml_streams_IO_read(void *context, char *buffer, int len) in php_libxml_streams_IO_read() argument 384 return php_stream_read((php_stream*)context, buffer, len); in php_libxml_streams_IO_read() 387 static int php_libxml_streams_IO_write(void *context, const char *buffer, int len) in php_libxml_streams_IO_write() argument 389 return php_stream_write((php_stream*)context, buffer, len); in php_libxml_streams_IO_write()
|
/PHP-7.4/ext/mbstring/libmbfl/mbfl/ |
H A D | mbfl_convert.c | 292 p = src->buffer; in mbfl_convert_filter_devcat()
|