Displaying 6 results from an estimated 6 matches for "3d9e".
Did you mean:
3d6e
2019 Jan 09
2
LTO, ifuncs, and lld
...gt;
> Thanks,
>
> --
> Shawn Webb
> Cofounder and Security Engineer
> HardenedBSD
>
> Tor-ified Signal: +1 443-546-8752
> Tor+XMPP+OTR: lattera at is.a.hacker.sx
> GPG Key ID: 0x6A84658F52456EEE
> GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE
>
> On Sat, Dec 01, 2018 at 08:56:16AM -0500, Shawn Webb wrote:
> > Thanks for providing the patch! I got around to testing it this
> > morning and it appears it fixes compilation, but produces a
> > non-working system.
> >
> > I know that...
2018 Dec 01
2
LTO, ifuncs, and lld
...tus update so you
didn't think you were being ignored.
Thanks,
--
Shawn Webb
Cofounder and Security Engineer
HardenedBSD
Tor-ified Signal: +1 443-546-8752
Tor+XMPP+OTR: lattera at is.a.hacker.sx
GPG Key ID: 0x6A84658F52456EEE
GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE
On Wed, Nov 28, 2018 at 09:16:24PM -0800, Peter Collingbourne wrote:
> https://reviews.llvm.org/D55046 fixes your reproducer here. Let me know if
> that works for you.
>
> Note that I had to rebuild one of your bitcode files to be a regular object
> file, this i...
2018 Nov 29
2
LTO, ifuncs, and lld
...https://hardenedbsd.org/~shawn/2018-11-28_reproduce-01.tar
Thanks,
--
Shawn Webb
Cofounder and Security Engineer
HardenedBSD
Tor-ified Signal: +1 443-546-8752
Tor+XMPP+OTR: lattera at is.a.hacker.sx
GPG Key ID: 0x6A84658F52456EEE
GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE
On Wed, Nov 28, 2018 at 05:30:57PM -0800, Peter Collingbourne wrote:
> Hi Shawn,
>
> Can you please create a reproducer tarball (using ld.lld --reproduce) so
> that we don't need to install HardenedBSD in order to reproduce?
>
> Peter
>
> On Wed,...
2018 Nov 29
2
LTO, ifuncs, and lld
...me know if you have any questions, comments, or concerns.
Thanks,
--
Shawn Webb
Cofounder and Security Engineer
HardenedBSD
Tor-ified Signal: +1 443-546-8752
Tor+XMPP+OTR: lattera at is.a.hacker.sx
GPG Key ID: 0x6A84658F52456EEE
GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20181128/dcc1c721/attachment.sig>
2015 May 21
1
asterisk 13 webrtc
..."cervenka"<sip:vr1a882 at vhXXX.example.com>;tag=RDmpGm2Mubc5xQQ8NMli
To: <sip:887 at ipbx>
Contact:
"cervenka"<sips:vr1a882 at df7jal23ls0d.invalid;rtcweb-breaker=no;click2call=no;transport=wss>;+g.oma.sip-im;language="en,fr"
Call-ID: cf2990ba-3f12-3d9e-adb6-52889c414ed3
CSeq: 41942 INVITE
Content-Type: application/sdp
Content-Length: 1250
Max-Forwards: 70
Authorization: Digest
username="vr1a882",realm="pbx",nonce="0edd0f1f",uri="sip:887 at ipbx",response="46f10b5c84accd119fea0c65bdad3dee",algorit...
2004 Apr 20
3
[Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
...vulnerability
> Date: Tue, 20 Apr 2004 18:19:58 -0400
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt
>
>
>
> Darren Bounds, CISSP
>
> 443D 628D 0AC7 CACF 6085
> C0E0 B2FC 534B 3D9E 69AF
>
> - --
> Intrusense - Securing Business As Usual
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.4 (Darwin)
>
> iD8DBQFAhaITsvxTSz2eaa8RAtQWAKCvKFFp0oS7VkjswUelIlOIhESoPgCeLqg4
> 2DmvTJTfsx8af50acb+OJ9g=
> =zPCJ
> -----END PGP SIGNATURE-----
>...