Searched refs:oversized (Results 1 – 7 of 7) sorted by relevance
1072 bool oversized = sizeof fbuf <= (size_t)f_prefix_copy_size; in istrftime() local1073 char *f_prefix_copy = oversized ? xmalloc(f_prefix_copy_size) : fbuf; in istrftime()1078 if (oversized) in istrftime()
552 int oversized; in do_entry() local559 oversized = ((ent->trsize > 0) && (ent->fsize >= ent->trsize)); in do_entry()594 !oversized) { in do_entry()650 } else if (oversized) { in do_entry()
1449 * Windows: ntpd DoS by oversized UDP packet1615 * [Bug 3059] Potential buffer overrun from oversized hash <perlinger@ntp.org>1866 is made to read that oversized value.5215 * Windows: ntpd DoS by oversized UDP packet5381 * [Bug 3059] Potential buffer overrun from oversized hash <perlinger@ntp.org>5632 is made to read that oversized value.
659 * [Sec 3110] Windows: ntpd DoS by oversized UDP packet687 * [Bug 3059] Potential buffer overrun from oversized hash <perlinger@ntp.org>
22191 [Sec 3110] Windows: ntpd DoS by oversized UDP packet22197 [Sec 3110] Windows: ntpd DoS by oversized UDP packet22200 [Sec 3110] Windows: ntpd DoS by oversized UDP packet22204 [Sec 3110] Windows: ntpd DoS by oversized UDP packet22210 [Sec 3110] Windows: ntpd DoS by oversized UDP packet22246 [Bug 3059] Potential buffer overrun from oversized hash22249 [Bug 3059] Potential buffer overrun from oversized hash22252 [Bug 3059] Potential buffer overrun from oversized hash[all...]
7582 record limits will reject an oversized certificate before it is parsed.8783 record limits will reject an oversized certificate before it is parsed.14591 supply an oversized master key in Kerberos-enabled versions.16743 supply an oversized session ID to a client. ([CVE-2002-0656])16748 supply an oversized client master key. ([CVE-2002-0656])
135882 oversized