Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for bufLen (0.05 sec)

  1. api/go1.14.txt

    pkg syscall (freebsd-arm64), type BpfZbuf struct
    pkg syscall (freebsd-arm64), type BpfZbuf struct, Bufa *uint8
    pkg syscall (freebsd-arm64), type BpfZbuf struct, Bufb *uint8
    pkg syscall (freebsd-arm64), type BpfZbuf struct, Buflen uint64
    pkg syscall (freebsd-arm64), type BpfZbufHeader struct
    pkg syscall (freebsd-arm64), type BpfZbufHeader struct, Kernel_gen uint32
    pkg syscall (freebsd-arm64), type BpfZbufHeader struct, Kernel_len uint32
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Fri Feb 17 20:31:46 UTC 2023
    - 508.9K bytes
    - Viewed (0)
  2. api/go1.20.txt

    pkg syscall (freebsd-riscv64), type BpfZbuf struct, Bufa *uint8 #53466
    pkg syscall (freebsd-riscv64), type BpfZbuf struct, Bufb *uint8 #53466
    pkg syscall (freebsd-riscv64), type BpfZbuf struct, Buflen uint64 #53466
    pkg syscall (freebsd-riscv64), type BpfZbufHeader struct #53466
    pkg syscall (freebsd-riscv64), type BpfZbufHeader struct, Kernel_gen uint32 #53466
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Fri Feb 17 21:23:32 UTC 2023
    - 602.6K bytes
    - Viewed (0)
  3. RELEASE.md

        ([CVE-2021-37649](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37649))
    *   Fixes a segfault and a heap buffer overflow in
        `{Experimental,}DatasetToTFRecord`
        ([CVE-2021-37650](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37650))
    *   Fixes a heap buffer overflow in `FractionalAvgPoolGrad`
        ([CVE-2021-37651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37651))
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Aug 18 20:54:38 UTC 2025
    - 740K bytes
    - Viewed (1)
  4. lib/fips140/v1.0.0.zip

    e], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } encryptBlock(c, dst, src) } func (c *Block) Decrypt(dst, src []byte) { // AES-ECB is not approved in FIPS 140-3 mode. fips140.RecordNonApproved() if len(src) < BlockSize { panic("crypto/aes: input not full block") } if len(dst) < BlockSize { panic("crypto/aes: output not full block") } if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } decryptBlock(c, dst, src) } // EncryptBlockInternal...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
Back to top