Home
last modified time | relevance | path

Searched full:patch (Results 1 – 25 of 2806) sorted by relevance

12345678910>>...113

/third_party/glib/
Dpatch.tar.gz ... freed-on-a-graceful-disconnect.patch patch/backport-openharmony-adapt.patch patch ...
Dbackport-patch.log1 Patch6000: backport-add-version-macros-for-GLib-2.74.patch
2 Patch6001: backport-gtype-Add-G_TYPE_FLAG_NONE.patch
3 Patch6002: backport-gioenums-Add-G_TLS_CERTIFICATE_FLAGS_NONE.patch
4 Patch6003: backport-gtestutils-Add-G_TEST_SUBPROCESS_DEFAULT.patch
5 Patch6004: backport-gsignal-Add-G_CONNECT_DEFAULT.patch
6 Patch6005: backport-giomodule-test-Dont-pass-a-magic-number-to-g_test_trap_subprocess.patch
7 Patch6006: backport-giochannel-Add-G_IO_FLAG_NONE.patch
8 Patch6007: backport-gmarkup-Add-G_MARKUP_PARSE_FLAGS_NONE.patch
9 Patch6008: backport-gregex-Add-G_REGEX_DEFAULT-G_REGEX_MATCH_DEFAULT.patch
10 Patch6009: backport-replace-pcre1-with-pcre2.patch
[all …]
Dglib2.spec9 Patch6000: backport-add-version-macros-for-GLib-2.74.patch
10 Patch6001: backport-gtype-Add-G_TYPE_FLAG_NONE.patch
11 Patch6002: backport-gioenums-Add-G_TLS_CERTIFICATE_FLAGS_NONE.patch
12 Patch6003: backport-gtestutils-Add-G_TEST_SUBPROCESS_DEFAULT.patch
13 Patch6004: backport-gsignal-Add-G_CONNECT_DEFAULT.patch
14 Patch6005: backport-giomodule-test-Dont-pass-a-magic-number-to-g_test_trap_subprocess.patch
15 Patch6006: backport-giochannel-Add-G_IO_FLAG_NONE.patch
16 Patch6007: backport-gmarkup-Add-G_MARKUP_PARSE_FLAGS_NONE.patch
17 Patch6008: backport-gregex-Add-G_REGEX_DEFAULT-G_REGEX_MATCH_DEFAULT.patch
18 Patch6009: backport-replace-pcre1-with-pcre2.patch
[all …]
/third_party/libxml2/
Dinstall.py41 …patch_cmd = ['patch', '-p1', "--fuzz=0", "--no-backup-if-mismatch", '-i', patch_file, '-d', target…
51 "Fix-memleaks-in-xmlXIncludeProcessFlags.patch",
52 "backport-parser-Fix-potential-memory-leak-in-xmlParseAttValue.patch",
53 "Fix-memory-leaks-for-xmlACatalogAdd.patch",
54 "Fix-memory-leaks-in-xmlACatalogAdd-when-xmlHashAddEntry-failed.patch",
55 "backport-CVE-2022-40303-Fix-integer-overflows-with-XML_PARSE_.patch",
56 "backport-CVE-2022-40304-Fix-dict-corruption-caused-by-entity-.patch",
57 "backport-schemas-Fix-null-pointer-deref-in-xmlSchemaCheckCOSS.patch",
58 "libxml2-multilib.patch",
59 "Fix-CVE-2023-25062.patch",
[all …]
Dlibxml2.spec9 Patch0: libxml2-multilib.patch
10 Patch1: Fix-memleaks-in-xmlXIncludeProcessFlags.patch
11 Patch2: Fix-memory-leaks-for-xmlACatalogAdd.patch
12 Patch3: Fix-memory-leaks-in-xmlACatalogAdd-when-xmlHashAddEntry-failed.patch
13 Patch4: backport-CVE-2022-40303-Fix-integer-overflows-with-XML_PARSE_.patch
14 Patch5: backport-CVE-2022-40304-Fix-dict-corruption-caused-by-entity-.patch
15 Patch6: backport-schemas-Fix-null-pointer-deref-in-xmlSchemaCheckCOSS.patch
16 Patch7: backport-parser-Fix-potential-memory-leak-in-xmlParseAttValue.patch
18 Patch6000: backport-Add-whitespace-folding-for-some-atomic-data-types-th.patch
19 Patch6001: backport-Properly-fold-whitespace-around-the-QName-value-when.patch
[all …]
/third_party/mindspore/mindspore-src/source/cmake/external_libs/
Dopenssl.cmake10 set(OPENSSL_PATCH_ROOT ${TOP_DIR}/third_party/patch/openssl)
12 set(OPENSSL_PATCH_ROOT ${CMAKE_SOURCE_DIR}/third_party/patch/openssl)
29 PATCHES ${OPENSSL_PATCH_ROOT}/CVE-2021-3711.patch
30 PATCHES ${OPENSSL_PATCH_ROOT}/CVE-2021-3712.patch
31 PATCHES ${OPENSSL_PATCH_ROOT}/CVE-2021-4160.patch
32 PATCHES ${OPENSSL_PATCH_ROOT}/CVE-2022-0778.patch
33 PATCHES ${OPENSSL_PATCH_ROOT}/CVE-2022-1292.patch
34 PATCHES ${OPENSSL_PATCH_ROOT}/CVE-2022-2068.patch
35 PATCHES ${OPENSSL_PATCH_ROOT}/CVE-2022-2097.patch
36 PATCHES ${OPENSSL_PATCH_ROOT}/CVE-2022-4304.patch
[all …]
/third_party/e2fsprogs/
Dinstall.sh19 patch -p1 < $1/0001-e2fsprogs-set-hugefile-from-4T-to-1T-in-hugefile-tes.patch --fuzz=0 --no-backup…
20 patch -p1 < $1/0002-libss-add-newer-libreadline.so.8-to-dlopen-path.patch --fuzz=0 --no-backup-if-m…
21 patch -p1 < $1/0003-tests-update-expect-files-for-f_mmp_garbage.patch --fuzz=0 --no-backup-if-misma…
22 patch -p1 < $1/0004-tests-update-expect-files-for-f_large_dir-and-f_larg.patch --fuzz=0 --no-backup…
23 patch -p1 < $1/0005-resize2fs-resize2fs-disk-hardlinks-will-be-error.patch --fuzz=0 --no-backup-if-…
24 patch -p1 < $1/0006-e2fsck-exit-journal-recovery-when-find-EIO-ENOMEM-er.patch --fuzz=0 --no-backup…
25 patch -p1 < $1/0007-e2fsck-exit-journal-recovery-when-jounral-superblock.patch --fuzz=0 --no-backup…
26 patch -p1 < $1/0008-e2fsck-add-env-param-E2FS_UNRELIABLE_IO-to-fi.patch --fuzz=0 --no-backup-if-mis…
27 patch -p1 < $1/0009-e2mmpstatus.8.in-detele-filesystem-can-be-UUID-or-LA.patch --fuzz=0 --no-backup…
28 patch -p1 < $1/0010-tests-update-expect-file-for-u_direct_io.patch --fuzz=0 --no-backup-if-mismatch
[all …]
/third_party/json/tests/src/
Dunit-json_patch.cpp20 TEST_CASE("JSON patch")
48 CHECK_NOTHROW(doc1.patch(patch1));
57 CHECK(doc1.patch(patch1) == doc1_ans);
63 …CHECK_THROWS_WITH_AS(doc2.patch(patch1), "[json.exception.out_of_range.403] key 'a' not found", js…
70 …CHECK_THROWS_WITH_AS(doc3.patch(patch2), "[json.exception.out_of_range.403] (/a) key 'b' not found…
72 …CHECK_THROWS_WITH_AS(doc3.patch(patch2), "[json.exception.out_of_range.403] key 'b' not found", js…
81 json const patch = {{{"op", "remove"}, {"path", "/1"}}}; variable
82 CHECK(doc.patch(patch) == json({1, 3, 4}));
92 // A JSON Patch document:
93 json const patch = R"( variable
[all …]
Dunit-merge_patch.cpp17 TEST_CASE("JSON Merge Patch")
31 json const patch = R"({ variable
45 document.merge_patch(patch);
64 json const patch = R"({ variable
87 document.merge_patch(patch);
96 json const patch = R"({"a":"c"})"_json; variable
99 original.merge_patch(patch);
106 json const patch = R"({"b":"c"})"_json; variable
109 original.merge_patch(patch);
116 json const patch = R"({"a":null})"_json; variable
[all …]
/third_party/cups/
Dinstall.py42 "ohos_ip_conflict.patch",
43 "backport-CVE-2022-26691.patch",
44 "backport-CVE-2023-32324.patch",
45 "backport-CVE-2023-34241.patch",
46 "ohos-multi-file-print.patch",
47 "ohos-modify-pthread.patch",
48 "ohos-add-openssl.patch",
49 "backport-CVE-2023-4504.patch",
50 "backport-CVE-2024-35235.patch",
51 "ohos-usb-manager.patch",
[all …]
/third_party/lwip/
Dlwip.spec12 Patch6001: backport-tcp-fix-sequence-number-comparison.patch
13 Patch6002: backport-tcp-tighten-up-checks-for-received-SYN.patch
15 Patch9000: 0001-add-makefile.patch
16 Patch9001: 0002-adapt-lstack.patch
17 Patch9002: 0003-fix-the-occasional-coredump-when-the-lwip-exits.patch
18 Patch9003: 0004-fix-error-of-deleting-conn-table-in-connect.patch
19 Patch9004: 0005-syn-rcvd-state-reg-conn-into-conntable.patch
20 Patch9005: 0006-fix-coredump-in-etharp.patch
21 Patch9006: 0007-gazelle-fix-epoll_ctl-EPOLLET-mode-error.patch
22 Patch9007: 0008-gazelle-fix-lwip_accept-memcpy-sockaddr-large.patch
[all …]
/third_party/cJSON/tests/json-patch-tests/
Dtests.json4 "patch": [], array
7 { "comment": "empty patch list",
9 "patch": [], array
14 "patch": [], array
19 "patch": [], array
24 "patch": [], array
29 "patch": [{"op": "add", "path": "/foo", "value":1}], array
34 "patch": [{"op": "add", "path": "/0", "value": "foo"}], array
39 "patch": [], array
44 "patch": [{"op": "add", "path": "/foo", "value": "1"}], array
[all …]
/third_party/python/Lib/unittest/test/testmock/
Dtestpatch.py16 MagicMock, Mock, NonCallableMagicMock, patch, _patch,
101 @patch.object(Something, 'attribute', sentinel.Patched)
107 "patch not restored")
112 patch.object('Something', 'do_something')
118 @patch.object(Something, 'attribute', None)
124 "patch not restored")
132 @patch.object(Something, 'attribute', sentinel.Patched)
133 @patch.object(Something, 'next_attribute', sentinel.Patched2)
142 "patch not restored")
144 "patch not restored")
[all …]
/third_party/skia/site/docs/dev/contrib/
Dpatch.md7 externally-submitted patch, this is how to do it. (This technique is useful in
8 other situations too, like if you just want to try out somebody else's patch
14 patch into your local checkout: https://codereview.appspot.com/6201055/
16 there is no standard Windows "patch" tool.
19 …velopers/contributing-code#TOC-Instructions-for-Reviewer:-Checking-in-the-patch-for-a-non-committe…
24 git cl patch 6201055
29 1. Prepare your local workspace to accept the patch.
32 want to apply the patch.
34 enough" for your purposes). If the codereview patch was against an old
38 2. Download the raw patch set.
[all …]
/third_party/skia/third_party/externals/brotli/c/include/brotli/
Dport.h28 #define BROTLI_GNUC_VERSION_CHECK(major, minor, patch) \ argument
29 (BROTLI_GNUC_VERSION >= BROTLI_MAKE_VERSION(major, minor, patch))
31 #define BROTLI_GNUC_VERSION_CHECK(major, minor, patch) (0) argument
50 #define BROTLI_MSVC_VERSION_CHECK(major, minor, patch) (0) argument
52 #define BROTLI_MSVC_VERSION_CHECK(major, minor, patch) \ argument
53 (_MSC_FULL_VER >= ((major * 10000000) + (minor * 100000) + (patch)))
55 #define BROTLI_MSVC_VERSION_CHECK(major, minor, patch) \ argument
56 (_MSC_FULL_VER >= ((major * 1000000) + (minor * 10000) + (patch)))
58 #define BROTLI_MSVC_VERSION_CHECK(major, minor, patch) \ argument
73 #define BROTLI_INTEL_VERSION_CHECK(major, minor, patch) \ argument
[all …]
/third_party/python/Lib/test/
Dtest_getpass.py17 @mock.patch('os.environ')
42 with mock.patch('os.getuid') as uid, \
43 mock.patch('pwd.getpwuid') as getpw:
65 with mock.patch('sys.stderr') as stderr:
69 @mock.patch('sys.stdin')
75 @mock.patch('sys.stdin')
101 with mock.patch('os.open') as open, \
102 mock.patch('io.FileIO') as fileio, \
103 mock.patch('io.TextIOWrapper') as textio:
115 with mock.patch('os.open') as open, \
[all …]
/third_party/json/docs/mkdocs/docs/api/basic_json/
Dpatch.md1 # <small>nlohmann::basic_json::</small>patch
4 basic_json patch(const basic_json& json_patch) const;
7 [JSON Patch](http://jsonpatch.com) defines a JSON document structure for expressing a sequence of o…
8 a JSON document. With this function, a JSON Patch is applied to the current JSON value by executing…
9 the patch.
14 : JSON patch document
26 …r.104`](../../home/exceptions.md#jsonexceptionparse_error104) if the JSON patch does not consist of
28 …r.105`](../../home/exceptions.md#jsonexceptionparse_error105) if the JSON patch is malformed (e.g.,
31 …nge.403`](../../home/exceptions.md#jsonexceptionout_of_range403) if a JSON pointer inside the patch
40 Linear in the size of the JSON value and the length of the JSON patch. As usually only a fraction o…
[all …]
Dpatch_inplace.md7 [JSON Patch](http://jsonpatch.com) defines a JSON document structure for expressing a sequence of o…
8 a JSON document. With this function, a JSON Patch is applied to the current JSON value by executing…
9 the patch. This function applies a JSON patch in place and returns void.
14 : JSON patch document
18 No guarantees, value may be corrupted by an unsuccessful patch operation.
22 …r.104`](../../home/exceptions.md#jsonexceptionparse_error104) if the JSON patch does not consist of
24 …r.105`](../../home/exceptions.md#jsonexceptionparse_error105) if the JSON patch is malformed (e.g.,
27 …nge.403`](../../home/exceptions.md#jsonexceptionout_of_range403) if a JSON pointer inside the patch
36 Linear in the size of the JSON value and the length of the JSON patch. As usually only a fraction o…
37 affected by the patch, the complexity can usually be neglected.
[all …]
Dmerge_patch.md7 The merge patch format is primarily intended for use with the HTTP PATCH method as a means of descr…
8 modifications to a target resource's content. This function applies a merge patch to the current JS…
11 [RFC 7396 (JSON Merge Patch)](https://tools.ietf.org/html/rfc7396):
14 define MergePatch(Target, Patch):
15 if Patch is an Object:
18 for each Name/Value pair in Patch:
26 return Patch
29 Thereby, `Target` is the current object; that is, the patch is applied to the current value.
34 : the patch to apply
44 The following code shows how a JSON Merge Patch is applied to a JSON document.
[all …]
/third_party/skia/third_party/externals/opengl-registry/extensions/NV/
DNV_tessellation_program5.txt50 This extension adds a new basic primitive type, called a patch, which
51 consists of an array of vertices plus some associated per-patch state. It
53 that transforms a patch into a new patch and a tessellation evaluation
59 variable-size input patch and produces a new fixed-size output patch. The
60 output patch consists of an array of vertices, and a set of per-patch
61 attributes. The per-patch attributes include tessellation levels that
62 control how finely the patch will be tessellated. For each patch
64 -- one per output patch vertex. Each tessellation control program
65 invocation writes all the attributes of its corresponding output patch
68 and write shared per-patch outputs. The tessellation control program
[all …]
/third_party/openGLES/extensions/NV/
DNV_tessellation_program5.txt50 This extension adds a new basic primitive type, called a patch, which
51 consists of an array of vertices plus some associated per-patch state. It
53 that transforms a patch into a new patch and a tessellation evaluation
59 variable-size input patch and produces a new fixed-size output patch. The
60 output patch consists of an array of vertices, and a set of per-patch
61 attributes. The per-patch attributes include tessellation levels that
62 control how finely the patch will be tessellated. For each patch
64 -- one per output patch vertex. Each tessellation control program
65 invocation writes all the attributes of its corresponding output patch
68 and write shared per-patch outputs. The tessellation control program
[all …]
/third_party/cares/
Dinstall.sh35 "0000-Use-RPM-compiler-options.patch"
36 "backport-disable-live-tests.patch"
37 "backport-add-str-len-check-in-config_sortlist-to-avoid-stack-overflow.patch"
38 "backport-CVE-2023-32067.patch"
39 "backport-001-CVE-2023-31130.patch"
40 "backport-002-CVE-2023-31130.patch"
41 "backport-003-CVE-2023-31130.patch"
42 "backport-001-CVE-2023-31147.patch"
43 "backport-002-CVE-2023-31124_CVE-2023-31147.patch"
44 "backport-003-CVE-2023-31147.patch"
[all …]
/third_party/freetype/
Dinstall.py35 "backport-CVE-2023-2004.patch",
36 "backport-freetype-2.2.1-enable-valid.patch",
37 "backport-freetype-2.3.0-enable-spr.patch",
38 "backport-freetype-2.6.5-libtool.patch",
39 "backport-freetype-2.8-multilib.patch",
40 "backport-freetype-2.10.0-internal-outline.patch",
41 "backport-freetype-2.10.1-debughook.patch",
42 "backport-freetype-2.12.1-enable-funcs.patch",
43 "backport-Minimal-stop-gap-fix-for-CVE-2025-27363.patch",
64 …patch_cmd = ['patch', '-p1', "--fuzz=0", "--no-backup-if-mismatch", '-i', patch_file, '-d', target…
[all …]
/third_party/libunwind/
Dinstall.py34 "0001-fix-byte_order_is_valid-function-logic.patch",
35 "backport-check-namespace.sh-adjust-aarch64-symbols.patch",
36 "backport-tests-run-coredump-unwind-Skip-test-if-no-coredump-h.patch",
37 "backport-aarch64-unw_step-validates-address-before-calling-dwarf_get.patch",
38 "backport-avoid-calling-printf-because-OE-glibc-2.34-used-mno-.patch",
39 "backport-fix-run-ptrace-mapper-test-case-failed.patch",
40 "ohos-configure.patch",
41 "ohos-access-mem-crash-fix.patch"
53 …patch_cmd = ['patch', '-p1', "--fuzz=0", "--no-backup-if-mismatch", '-i', patch_file, '-d', target…
56 print(f"apply_patch error! patch: {patch_file}")
[all …]
/third_party/grpc/
Dinstall.sh19 patch -p1 < $1/src_core_lib_debug.patch
20 patch -p1 < $1/src_core_lib_iomgr.patch
21 patch -p1 < $1/backport-Ignore-Connection-Aborted-errors-on-accept-29318.patch
22 patch -p1 < $1/backport-iomgr-EventEngine-Improve-server-handling-o.patch
23 patch -p1 < $1/fix-CVE-2023-33953-add-header-limit.patch
24 patch -p1 < $1/fix-CVE-2023-44487.patch
25 patch -p1 < $1/fix-memory-leak.patch

12345678910>>...113