Displaying 14 results from an estimated 14 matches for "highc".
Did you mean:
high
2019 Jan 23
3
sftp Vs scp
Damien,
Reading the various articles about
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt have
caused me to question the wisdom of using scp. Your observation:
> Date: Tue, 22 Jan 2019 13:48:34 +1100 (AEDT)
> From: Damien Miller <djm at mindrot.org>
> Subject: Re: Status of SCP vulnerability
>
> "Don't use scp with untrusted
2017 Jul 31
0
[PATCH v11 03/10] daemon: utils: New functions unix_canonical_path, utf16le_to_utf8 and tests.
...r outbuf (Char.chr ((c land 0x3f) lor 0x80))
+ )
+ in
+ loop (len-1) c
+ in
+
+ (* Loop over the input UTF16-LE characters. *)
+ let is_high_surrogate c = c >= 0xd800 && c < 0xdc00
+ and is_low_surrogate c = c >= 0xdc00 && c < 0xe000
+ and surrogate_value highc lowc =
+ 0x1_0000 + (highc - 0xd800) * 0x400 + lowc - 0xdc00
+ in
+
+ let len = String.length instr in
+ let rec loop i =
+ if i+1 >= len then ()
+ else (
+ let c = Char.code instr.[i] + (Char.code instr.[i+1] lsl 8) in
+
+ let wc, skip =
+ (* High surrogate - must c...
2019 Jan 24
5
sftp Vs scp
On Jan 24 03:47, Malcolm wrote:
> Quoting Chris High <highc at us.ibm.com>:
>
> > caught my eye. Do you see any 'advantage' to using sftp with an untrusted
> > server? If so, any thoughts about making an easy way to disable scp both
> > client and server side when doing an installation?
>
> SFTP allows file resume,...
2017 Jul 21
10
[PATCH v10 00/10] Reimplement inspection in the daemon.
v9 was here:
https://www.redhat.com/archives/libguestfs/2017-July/msg00139.html
This depends on these three series (the first two being single minor
patches):
https://www.redhat.com/archives/libguestfs/2017-July/msg00207.html
https://www.redhat.com/archives/libguestfs/2017-July/msg00209.html
https://www.redhat.com/archives/libguestfs/2017-July/msg00215.html
There is no substantive change. I
2017 Jul 17
12
[PATCH v9 00/11] Reimplement inspection in the daemon.
This depends on the patch series
"[PATCH 00/27] Reimplement many daemon APIs in OCaml."
(https://www.redhat.com/archives/libguestfs/2017-July/msg00098.html)
v8 was posted here:
https://www.redhat.com/archives/libguestfs/2017-June/msg00274.html
v9:
- I split up the mega-patch into a more reviewable series of
smaller, incremental patches.
There are some other changes vs v8, but
2017 Jul 31
16
[PATCH v11 00/10] Reimplement inspection in the daemon.
v10: https://www.redhat.com/archives/libguestfs/2017-July/msg00245.html
No actual change here, but I rebased and retested. Also this series
now does not depend on any other patch series since everything else
needed is upstream.
Rich.
2017 Jun 19
29
[PATCH v7 00/29] Reimplement inspection in the daemon.
v6 was posted here:
https://www.redhat.com/archives/libguestfs/2017-June/msg00103.html
and this requires the utilities refactoring posted here:
https://www.redhat.com/archives/libguestfs/2017-June/msg00169.html
Inspection is now complete[*], although not very well tested. I'm
intending to compare the output of many guests using old & new
virt-inspector to see if I can find any
2017 Jun 15
45
[PATCH v6 00/41] Refactor utilities, reimplement inspection in the daemon.
v5:
https://www.redhat.com/archives/libguestfs/2017-June/msg00065.html
Since v5, this now implements inspection almost completely for Linux
and Windows guests.
Rich.
2017 Jun 21
45
[PATCH v8 00/42] Refactor utilities and reimplement inspection.
v7 was:
https://www.redhat.com/archives/libguestfs/2017-June/msg00169.html
https://www.redhat.com/archives/libguestfs/2017-June/msg00184.html
I believe this addresses all comments received so far.
Also it now passes a test where I compared about 100 disk images
processed with old and new virt-inspector binaries. The output is
identical in all cases except one which is caused by a bug in blkid
2007 May 08
0
Security.html is out of date.
Openssh team;
It has come to my attention that the information at:
http://www.openssh.org/security.html
does not include any security issues for openssh beyond 3.7. While I do
appreciate that the the security information is highlighted at release
publication, eg:
http://lists.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
many folks are going to go to the main site,
2012 Oct 09
0
AUTO: Chris High/Endicott/IBM is out of the office until 07/08/2002. (returning 10/15/2012)
I am out of the office until 10/15/2012.
On vacation, access to LN will be spotty at best.
Will be out Friday AFTERNOON 10/5 through 10/14, returning to the office
Monday 10/15.
Specific issue coverage:
Eliminate Synchronized Passwords (ESP) - Diane Moos/Long Beach/IBM
Topics related to IAM's picking up of Pre-production ID Provisioning from
SSO-SMD - Doug Barlett/Rochester/IBM
2012 Nov 21
0
AUTO: Chris High/Endicott/IBM is out of the office until 07/08/2002. (returning 12/03/2012)
I am out of the office until 12/03/2012.
Vacation 1/2 day, starting 1pm ET 11/20
Vacation day 11/21 (may attend an SSAE16 crit sit meeting, otherwise not
available)
US Holiday 11/22
Site Holiday 11/23
Sun: Travel to Schaumberg Ill Nov 25 business, generally not available.
Mon-Fri Off site crit sit meeting for SSAE16 9am-9pm. I will do my best to
respond, but most items will have to wait until
2012 Dec 09
0
AUTO: Chris High/Endicott/IBM is out of the office until 07/08/2002. (returning 12/10/2012)
I am out of the office until 12/10/2012.
Out sick through Friday 12/7, Dr's orders. Expect to return Monday 12/10.
11/23 - 24 no cover.
11/26-30 -self - cover - call 720 395 9374 and leave a message. I will
return your call w/in one business day.
Specific issue coverage:
Questions regard AG sudo deployment, including questions about sudo
templates?
Sudo Deployment AG/Hartford/IBM,
2013 Mar 06
0
AUTO: Chris High/Endicott/IBM is out of the office until 07/08/2002. (returning 03/07/2013)
I am out of the office until 03/07/2013.
Out sick today.
Sudo review items - Sudo Deployment AG/Hartford/IBM,
SSAE16 'hot topic' items - Pat Brady
Issues requiring immediate management attention may be referred to my
manager, Harish Dindigal/Whippany/IBM
Note: This is an automated response to your message "openssh-unix-dev
Digest, Vol 119, Issue 6" sent on 03/06/2013