- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for bufLen (0.05 sec)
-
api/go1.14.txt
pkg syscall (freebsd-arm64), type BpfZbuf struct pkg syscall (freebsd-arm64), type BpfZbuf struct, Bufa *uint8 pkg syscall (freebsd-arm64), type BpfZbuf struct, Bufb *uint8 pkg syscall (freebsd-arm64), type BpfZbuf struct, Buflen uint64 pkg syscall (freebsd-arm64), type BpfZbufHeader struct pkg syscall (freebsd-arm64), type BpfZbufHeader struct, Kernel_gen uint32 pkg syscall (freebsd-arm64), type BpfZbufHeader struct, Kernel_len uint32
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Fri Feb 17 20:31:46 UTC 2023 - 508.9K bytes - Viewed (0) -
api/go1.20.txt
pkg syscall (freebsd-riscv64), type BpfZbuf struct, Bufa *uint8 #53466 pkg syscall (freebsd-riscv64), type BpfZbuf struct, Bufb *uint8 #53466 pkg syscall (freebsd-riscv64), type BpfZbuf struct, Buflen uint64 #53466 pkg syscall (freebsd-riscv64), type BpfZbufHeader struct #53466 pkg syscall (freebsd-riscv64), type BpfZbufHeader struct, Kernel_gen uint32 #53466
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Fri Feb 17 21:23:32 UTC 2023 - 602.6K bytes - Viewed (0) -
RELEASE.md
([CVE-2021-37649](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37649)) * Fixes a segfault and a heap buffer overflow in `{Experimental,}DatasetToTFRecord` ([CVE-2021-37650](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37650)) * Fixes a heap buffer overflow in `FractionalAvgPoolGrad` ([CVE-2021-37651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37651))
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (1) -
lib/fips140/v1.0.0.zip
e], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } encryptBlock(c, dst, src) } func (c *Block) Decrypt(dst, src []byte) { // AES-ECB is not approved in FIPS 140-3 mode. fips140.RecordNonApproved() if len(src) < BlockSize { panic("crypto/aes: input not full block") } if len(dst) < BlockSize { panic("crypto/aes: output not full block") } if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } decryptBlock(c, dst, src) } // EncryptBlockInternal...
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 29 15:10:35 UTC 2025 - 635K bytes - Viewed (0)