Search Results
https://dev.mysql.com/doc/refman/8.4/en/enterprise-encryption-functions.html
str is the non-null data string for which the digest is to be generated. If the arguments are not suitable to permit a function to perform the requested operation, it returns NULL or 0 as appropriate. This occurs, for example, if a function does not ... MySQL Enterprise Encryption functions have these general characteristics: For arguments of the wrong type or an incorrect number of arguments, each function returns an ...
https://dev.mysql.com/doc/refman/8.4/en/locking-service.html
A namespace or lock name specified as NULL, the empty string, or a string longer than 64 characters results in an ER_LOCKING_SERVICE_WRONG_NAME error. lock_names: An array of null-terminated strings that provides the names of the locks to acquire.
https://dev.mysql.com/doc/refman/8.4/en/explain.html
In this case, the statement displays output only for the columns with names matching the string. There is no need to enclose the string within quotation marks unless it contains spaces or other special characters. In practice, the DESCRIBE keyword ...
https://dev.mysql.com/doc/refman/8.4/en/information-schema-columns-table.html
This is NULL if the column has an explicit default of NULL, or if the column definition includes no DEFAULT clause. The value is YES if NULL values can be stored in the column, NO if not. (A UNIQUE index permits multiple NULL values, but you can ...
https://dev.mysql.com/doc/ndbapi/en/ndbapi-examples-common-files.html
*/ class ReadOnlyArrayAdapter { public: ReadOnlyArrayAdapter() {} enum ErrorType {Success, InvalidColumnType, InvalidArrayType, InvalidNullColumn, InvalidNullAttribute, InvalidNullaRef, BytesOutOfRange, UnknownError}; /* Return a C++ string from the ...(Bug #70550, Bug #17592990) The names of these files are listed here: array_adapter.hpp: Contains utility classes for converting between C++ style strings or byte arrays and the format used by NDB internally for VARCHAR, CHAR, and VARBINARY ...
https://dev.mysql.com/doc/c-api/8.4/en/mysql-stmt-bind-named-param.html
In the absence of named parameters, pass in NULL as the array of bind parameter names. It succeeds without any effect (in corner cases) if the bind argument count parameter is zero or if the bind array pointer is NULL. The unnamed parameter has NULL ... bool mysql_stmt_bind_named_param(MYSQL_STMT *stmt, MYSQL_BIND *binds, unsigned n_params, const char **names) Description mysql_stmt_bind_named_param() sets up unnamed and named (query attributes) bind parameters for prepared ...
https://dev.mysql.com/doc/refman/8.4/en/built-in-function-reference.html
WEEK() Return the week number WEEKDAY() Return the weekday index WEEKOFYEAR() Return the calendar week of the date (1-53) WEIGHT_STRING() Return the weight string for a string XOR Logical XOR YEAR() Return the year YEARWEEK() Return the year and ...
https://dev.mysql.com/doc/refman/8.4/en/firewall-usage.html
To name an account for firewall operations, specify it as a single quoted string ('user_name@host_name'). The requirement for naming accounts as a single quoted string for firewall operations means that you cannot use accounts that have embedded @ ... Before using MySQL Enterprise Firewall, install it according to the instructions provided in Section 8.4.7.2, “Installing or Uninstalling MySQL Enterprise ...
https://dev.mysql.com/doc/refman/8.4/en/show-columns.html
Collation The collation for nonbinary string columns, or NULL for other columns. The value is YES if NULL values can be stored in the column, NO if not. (A UNIQUE index permits multiple NULL values, but you can tell whether the column permits NULL ... SHOW [EXTENDED] [FULL] {COLUMNS | FIELDS} {FROM | IN} tbl_name [{FROM | IN} db_name] [LIKE 'pattern' | WHERE expr] SHOW COLUMNS displays information about the columns in a given ...
https://dev.mysql.com/doc/heatwave/en/mys-hwaml-prepare-an-anomaly-detection-model.html
The data has a column, target, that has three possible values: 0 for normal, 1 for anomalous, and NULL for unlabeled. This topic describes how to prepare the data to use for two anomaly detection machine learning models: a semi-supervised anomaly ...