Home
last modified time | relevance | path

Searched refs:NUL (Results 1 – 25 of 466) sorted by relevance

12345678910>>...19

/OK3568_Linux_fs/kernel/net/netfilter/
H A Dnf_conntrack_h323_types.c18 {FNAME("strict") NUL, FIXD, 0, 0, SKIP, 0, NULL},
19 {FNAME("loose") NUL, FIXD, 0, 0, SKIP, 0, NULL},
225 {FNAME("create") NUL, FIXD, 0, 0, SKIP, 0, NULL},
226 {FNAME("join") NUL, FIXD, 0, 0, SKIP, 0, NULL},
227 {FNAME("invite") NUL, FIXD, 0, 0, SKIP, 0, NULL},
228 {FNAME("capability-negotiation") NUL, FIXD, 0, 0, SKIP, 0, NULL},
229 {FNAME("callIndependentSupplementaryService") NUL, FIXD, 0, 0, SKIP,
250 {FNAME("pointToPoint") NUL, FIXD, 0, 0, SKIP, 0, NULL},
251 {FNAME("oneToN") NUL, FIXD, 0, 0, SKIP, 0, NULL},
252 {FNAME("nToOne") NUL, FIXD, 0, 0, SKIP, 0, NULL},
[all …]
/OK3568_Linux_fs/kernel/Documentation/userspace-api/media/mediactl/
H A Dmedia-ioc-device-info.rst51 - Name of the driver implementing the media API as a NUL-terminated
61 - Device model name as a NUL-terminated UTF-8 string. The device
67 - Serial number as a NUL-terminated ASCII string.
71 - Location of the device in the system as a NUL-terminated ASCII
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/openssh/
H A Dfix-potential-signed-overflow-in-pointer-arithmatic.patch49 - return(dlen + (s - src)); /* count does not include NUL */
54 + return (dlen + ((uintptr_t)s - (uintptr_t)src)); /* count does not include NUL */
75 - return(s - src - 1); /* count does not include NUL */
80 + return ((uintptr_t)s - (uintptr_t)src - 1); /* count does not include NUL */
/OK3568_Linux_fs/kernel/Documentation/process/
H A Ddeprecated.rst105 NUL or newline terminated.
116 the destination, but rather a count of non-NUL bytes copied (or negative
119 strncpy() on NUL-terminated strings
122 be NUL terminated. This can lead to various linear read overflows and
123 other misbehavior due to the missing termination. It also NUL-pads
126 for callers using only NUL-terminated strings. The safe replacement is
129 destination, but rather a count of non-NUL bytes copied (or negative
130 errno when it truncates). Any cases still needing NUL-padding should
133 If a caller is using non-NUL-terminated strings, strncpy() can
143 if a source string is not NUL-terminated. The safe replacement is strscpy(),
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/go/go-1.18/
H A DCVE-2022-41720.patch7 Do not permit access to Windows reserved device names (NUL, COM1, etc.)
156 + {`NUL`, `NUL`},
175 + if canWriteFile(t, "NUL") {
176 + t.Errorf("can unexpectedly write a file named NUL on Windows")
300 + case "CON", "PRN", "AUX", "NUL":
368 + "/NUL", // don't read from device files on Windows
476 + _, err = d.Open(`NUL`)
478 + t.Errorf(`Open NUL succeeded`)
/OK3568_Linux_fs/kernel/Documentation/translations/it_IT/process/
H A Ddeprecated.rst110 terminata con il carattere NUL o quello di nuova riga.
121 strncpy() su stringe terminate con NUL
124 il buffer di destinazione verrà terminato con il carattere NUL. Questo
131 terminazione con NUL deve aggiungere una chiamata a memset())
133 Se il chiamate no usa stringhe terminate con NUL, allore strncpy()
143 terminata con NUL. La versione sicura da usare è strscpy().
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/share/i18n/charmaps/
HDJIS_C6229-1984-B-ADD.gz1<code_set_name> JIS_C6229-1984-B-ADD 2<comment_char> % 3<escape_char ...
HDJIS_C6229-1984-HAND-ADD.gz1<code_set_name> JIS_C6229-1984-HAND-ADD 2<comment_char> % 3<escape_char ...
HDJIS_C6229-1984-KANA.gz1<code_set_name> JIS_C6229-1984-KANA 2<comment_char> % 3<escape_char> / ...
HDJIS_C6229-1984-A.gz1<code_set_name> JIS_C6229-1984-A 2<comment_char> % 3<escape_char> / ...
HDJIS_C6229-1984-HAND.gz
HDJIS_C6220-1969-JP.gz1<code_set_name> JIS_C6220-1969-JP 2<comment_char> % 3<escape_char> / ...
HDNATS-DANO-ADD.gz1<code_set_name> NATS-DANO-ADD 2<comment_char> % 3<escape_char> / ...
HDNATS-SEFI-ADD.gz1<code_set_name> NATS-SEFI-ADD 2<comment_char> % 3<escape_char> / ...
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/share/i18n/charmaps/
HDJIS_C6229-1984-HAND-ADD.gz1<code_set_name> JIS_C6229-1984-HAND-ADD 2<comment_char> % 3<escape_char ...
HDJIS_C6229-1984-B-ADD.gz1<code_set_name> JIS_C6229-1984-B-ADD 2<comment_char> % 3<escape_char ...
HDJIS_C6229-1984-HAND.gz
HDJIS_C6229-1984-KANA.gz
HDJIS_C6229-1984-A.gz1<code_set_name> JIS_C6229-1984-A 2<comment_char> % 3<escape_char> / ...
HDJIS_C6220-1969-JP.gz1<code_set_name> JIS_C6220-1969-JP 2<comment_char> % 3<escape_char> / ...
HDNATS-DANO-ADD.gz1<code_set_name> NATS-DANO-ADD 2<comment_char> % 3<escape_char> / ...
HDNATS-SEFI-ADD.gz1<code_set_name> NATS-SEFI-ADD 2<comment_char> % 3<escape_char> / ...
/OK3568_Linux_fs/kernel/Documentation/userspace-api/media/v4l/
H A Dvidioc-querycap.rst52 - Name of the driver, a unique NUL-terminated ASCII string. For
60 sure the strings are properly NUL-terminated.
63 - Name of the device, a NUL-terminated UTF-8 string. For example:
73 - Location of the device in the system, a NUL-terminated ASCII
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/audit/audit/
H A D0001-Add-substitue-functions-for-strndupa-rawmemchr.patch62 // Proctitle has arguments separated by NUL bytes
63 // We need to write over the NUL bytes with a space
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/nasm/nasm/
H A D0001-stdlib-Add-strlcat.patch93 + * have no more than size-1 character when the operation finishes. Always NUL
94 + * terminates, unless size == 0 or dest has no NUL terminator. Returns

12345678910>>...19