- Sort Score
- Num 10 results
- Language All
Results 1 - 5 of 5 for buffer (0.08 seconds)
-
RELEASE.md
([CVE-2021-37649](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37649)) * Fixes a segfault and a heap buffer overflow in `{Experimental,}DatasetToTFRecord` ([CVE-2021-37650](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37650)) * Fixes a heap buffer overflow in `FractionalAvgPoolGrad` ([CVE-2021-37651](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37651))Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Mon Mar 30 18:31:38 GMT 2026 - 746.5K bytes - Click Count (3) -
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
* Get the value for the key 'log.notification.buffer.size'. <br> * The value is, e.g. 1000 <br> * comment: Maximum number of events to buffer in memory. * @return The value of found property. (NotNull: if not found, exception but basically no way) */ String getLogNotificationBufferSize(); /** * Get the value for the key 'log.notification.buffer.size' as {@link Integer}. <br>
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 28 06:59:19 GMT 2026 - 576.9K bytes - Click Count (2) -
lib/fips140/v1.26.0.zip
e], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } encryptBlock(c, dst, src) } func (c *Block) Decrypt(dst, src []byte) { // AES-ECB is not approved in FIPS 140-3 mode. fips140.RecordNonApproved() if len(src) < BlockSize { panic("crypto/aes: input not full block") } if len(dst) < BlockSize { panic("crypto/aes: output not full block") } if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } decryptBlock(c, dst, src) } // EncryptBlockInternal...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Jan 08 17:58:32 GMT 2026 - 660.3K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
e], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } encryptBlock(c, dst, src) } func (c *Block) Decrypt(dst, src []byte) { // AES-ECB is not approved in FIPS 140-3 mode. fips140.RecordNonApproved() if len(src) < BlockSize { panic("crypto/aes: input not full block") } if len(dst) < BlockSize { panic("crypto/aes: output not full block") } if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } decryptBlock(c, dst, src) } // EncryptBlockInternal...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
api/go1.20.txt
pkg syscall (freebsd-riscv64), type BpfZbuf struct, Bufa *uint8 #53466 pkg syscall (freebsd-riscv64), type BpfZbuf struct, Bufb *uint8 #53466 pkg syscall (freebsd-riscv64), type BpfZbuf struct, Buflen uint64 #53466 pkg syscall (freebsd-riscv64), type BpfZbufHeader struct #53466 pkg syscall (freebsd-riscv64), type BpfZbufHeader struct, Kernel_gen uint32 #53466
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Fri Feb 17 21:23:32 GMT 2023 - 602.6K bytes - Click Count (0)