Searched refs:buf2 (Results 1 – 3 of 3) sorted by relevance
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-10229/ |
D | poc.c | 51 char buf1[10], buf2[10], buf3[10]; in udp_recv() local 61 memset(buf2, 0, sizeof(buf2)); in udp_recv() 69 iov[1].iov_base = buf2; in udp_recv() 70 iov[1].iov_len = sizeof(buf2); in udp_recv() 74 memset(buf2, 0, sizeof(buf2)); // buf2 is zeroed here. in udp_recv() 84 printf("%s\n", buf2); // If buf2 has contents OVERWRITE, a vuln has occured. in udp_recv()
|
/cts/tests/tests/util/src/android/util/cts/ |
D | InstallUtilTest.java | 85 byte[] buf2 = new byte[64]; in assertSameResource() 88 int n2 = is2.read(buf2); in assertSameResource() 91 assertThat(buf1).isEqualTo(buf2); in assertSameResource()
|
/cts/tests/tests/media/src/android/media/cts/ |
D | DecoderTest.java | 1466 ByteBuffer buf2 = ByteBuffer.allocate(1024*1024); in testDecodeFragmented() local 1478 int n2 = ex2.readSampleData(buf2, 0); in testDecodeFragmented() 1486 buf2.limit(n2); in testDecodeFragmented() 1488 buf2.rewind(); in testDecodeFragmented() 1493 n2, buf2.limit()); in testDecodeFragmented() 1495 assertEquals("buffer data did not match on track " + i, buf1, buf2); in testDecodeFragmented()
|