Home
last modified time | relevance | path

Searched refs:buf2 (Results 1 – 3 of 3) sorted by relevance

/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-10229/
Dpoc.c51 char buf1[10], buf2[10], buf3[10]; in udp_recv() local
61 memset(buf2, 0, sizeof(buf2)); in udp_recv()
69 iov[1].iov_base = buf2; in udp_recv()
70 iov[1].iov_len = sizeof(buf2); in udp_recv()
74 memset(buf2, 0, sizeof(buf2)); // buf2 is zeroed here. in udp_recv()
84 printf("%s\n", buf2); // If buf2 has contents OVERWRITE, a vuln has occured. in udp_recv()
/cts/tests/tests/util/src/android/util/cts/
DInstallUtilTest.java85 byte[] buf2 = new byte[64]; in assertSameResource()
88 int n2 = is2.read(buf2); in assertSameResource()
91 assertThat(buf1).isEqualTo(buf2); in assertSameResource()
/cts/tests/tests/media/src/android/media/cts/
DDecoderTest.java1466 ByteBuffer buf2 = ByteBuffer.allocate(1024*1024); in testDecodeFragmented() local
1478 int n2 = ex2.readSampleData(buf2, 0); in testDecodeFragmented()
1486 buf2.limit(n2); in testDecodeFragmented()
1488 buf2.rewind(); in testDecodeFragmented()
1493 n2, buf2.limit()); in testDecodeFragmented()
1495 assertEquals("buffer data did not match on track " + i, buf1, buf2); in testDecodeFragmented()