search for: klen

Displaying 20 results from an estimated 21 matches for "klen".

Did you mean: kleen
2024 Feb 20
2
[PATCH] [v4] nouveau: add command-line GSP-RM registry support
...it unsigned integer */ + REGISTRY_TABLE_ENTRY_TYPE_BINARY = 2, /* Binary blob */ + REGISTRY_TABLE_ENTRY_TYPE_STRING = 3, /* Null-terminated string */ +}; + +/** + * registry_list_entry - linked list member for a registry key/value + * @head: list_head struct + * @type: dword, binary, or string + * @klen: the length of name of the key + * @vlen: the length of the value + * @v.dword: the data, if REGISTRY_TABLE_ENTRY_TYPE_DWORD + * @v.binary: the data, if TYPE_BINARY or TYPE_STRING + * @key: the key name + * + * Every registry key/value is represented internally by this struct. + * + * Type DWORD is...
2024 Mar 20
1
[PATCH] [v4] nouveau: add command-line GSP-RM registry support
...+ REGISTRY_TABLE_ENTRY_TYPE_STRING = 3, /* Null-terminated string > > */ > > +}; > > + > > +/** > > + * registry_list_entry - linked list member for a registry key/value > > + * @head: list_head struct > > + * @type: dword, binary, or string > > + * @klen: the length of name of the key > > + * @vlen: the length of the value > > + * @v.dword: the data, if REGISTRY_TABLE_ENTRY_TYPE_DWORD > > + * @v.binary: the data, if TYPE_BINARY or TYPE_STRING > > + * @key: the key name > > + * > > + * Every registry key/value is...
2014 Mar 03
6
[Bug 2207] New: Potential NULL deference, found using coverity
...d of if statement path:/c/amesh/142/src/crypto/openssh/authfile.c:291: cond_false: Condition "kdfp == NULL", taking false branch path:/c/amesh/142/src/crypto/openssh/authfile.c:294: if_end: End of if statement path:/c/amesh/142/src/crypto/openssh/authfile.c:295: cond_true: Condition "klen > 0", taking true branch path:/c/amesh/142/src/crypto/openssh/authfile.c:296: cond_false: Condition "(cp = buffer_append_space(&kdf, klen)) == NULL", taking false branch path:/c/amesh/142/src/crypto/openssh/authfile.c:299: if_end: End of if statement path:/c/amesh/142/src/cryp...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches? --- Scott Neugroschl | XYPRO Technology Corporation 4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2003 Sep 22
1
[Bug 704] 3.7.1p1 does not compile on FreeBSD 4.2
...e cipher.c:75: warning: initialization from incompatible pointer type cipher.c:76: warning: initialization from incompatible pointer type cipher.c: In function `cipher_init': cipher.c:230: warning: assignment discards qualifiers from pointer target type cipher.c:209: warning: unused variable `klen' cipher.c: In function `cipher_get_keycontext': cipher.c:403: warning: comparison of distinct pointer types lacks a cast cipher.c: In function `cipher_set_keycontext': cipher.c:418: warning: comparison of distinct pointer types lacks a cast gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitia...
2017 Oct 28
5
[Bug 1199] New: nft_set_hash fast lookup broken for 2 byte keys
https://bugzilla.netfilter.org/show_bug.cgi?id=1199 Bug ID: 1199 Summary: nft_set_hash fast lookup broken for 2 byte keys Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: major Priority: P5 Component: kernel Assignee: pablo at netfilter.org
2016 Nov 02
0
v2.2.26.0 released
...d != NULL); -#if OPENSSL_VERSION_NUMBER >= 0x10100000L +#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ctx->ctx = HMAC_CTX_new(); if (ctx->ctx == NULL) return dcrypt_openssl_error(error_r); ec = HMAC_Init_ex(ctx->ctx, ctx->key, ctx->klen, ctx->md, NULL); @@ -484,7 +484,7 @@ static bool dcrypt_openssl_ctx_hmac_update(struct dcrypt_context_hmac *ctx, const unsigned char *data, size_t data_len, const char **error_r) { int ec; -#if OPENSSL_VERSION_NUMBER >= 0x10100000L +#if OPENSSL_VERSION_NUMBER >= 0x10100000L &&...
2003 Sep 18
1
[Bug 675] cipher.c error when building against openssl 0.9.5a on Mandrake 7.2
...ype cipher.c:75: warning: initialization from incompatible pointer type cipher.c:76: warning: initialization from incompatible pointer type cipher.c: In function `cipher_init': cipher.c:230: warning: assignment discards qualifiers from pointer target type cipher.c:209: warning: unused variable `klen' cipher.c: In function `cipher_get_keycontext': cipher.c:403: warning: comparison of distinct pointer types lacks a cast cipher.c: In function `cipher_set_keycontext': cipher.c:418: warning: comparison of distinct pointer types lacks a cast gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitia...
2002 Mar 08
1
Problems with Solaris 8 and OpenSSH 3.1p1
When compiling the software it breaks with an error on the cipher.c file. Lot's of warnings and error of undeclared stuff. Snippet follows: gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I. -I/usr/local/ssl/include -Iyes -I/usr/local/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\"
2002 Mar 07
12
[Bug 141] openssh-3.1p1-1.src.rpm will not build on RedHat Linux 6.1
http://bugzilla.mindrot.org/show_bug.cgi?id=141 markus at openbsd.org changed: What |Removed |Added ---------------------------------------------------------------------------- Summary| openssh-3.1p1-1.src.rpm |openssh-3.1p1-1.src.rpm will |will not build on RedHat |not build on RedHat Linux |Linux 6.1
2002 Mar 07
20
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138 mouring at eviladmin.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |vjo at dulug.duke.edu ------- Additional Comments From mouring at eviladmin.org 2002-03-08 04:49 ------- *** Bug 139 has been
2016 Nov 02
2
v2.2.26.0 released
If the standard way works, I am happy to include the original patch I sent, amended so that it checks for presence of LIBRESSL_VERSION_NUMBER. If they keep this promise, then we should have no worries about things breaking up. Aki On 02.11.2016 14:24, Michael A. Peters wrote: > Indeed, which is why I use it. > > But it also is in the minority which is why I find it acceptable for
2004 Jan 01
1
[PATCH] Add winbind-backed NTLMSSP support to Cyrus-SASL
...add NUL */ - } - else { - *str = NULL; - } - - if (outlen) *outlen = len; - - return SASL_OK; + return SASL_OK; } -/* - * NTLM encryption/authentication routines per section 2.10 of - * draft-leach-cifs-v1-spec-02 - */ -static void E(unsigned char *out, unsigned char *K, unsigned Klen, - unsigned char *D, unsigned Dlen) - -{ - unsigned k, d; - des_cblock K64; - des_key_schedule ks; - unsigned char *Dp; -#define KEY_SIZE 7 -#define BLOCK_SIZE 8 - - for (k = 0; k < Klen; k += KEY_SIZE, K += KEY_SIZE) { - /* convert 56-bit key to 64-bit */ - K64[0]...
2017 Oct 11
1
[PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support
...0, %r10d - leaq _aesni_enc4, %r11 - leaq _aesni_dec4, %rax + leaq _aesni_enc4(%rip), %r11 + leaq _aesni_dec4(%rip), %rax cmovel %r10d, %ecx cmoveq %rax, %r11 - movdqa .Lgf128mul_x_ble_mask, GF128MUL_MASK + movdqa .Lgf128mul_x_ble_mask(%rip), GF128MUL_MASK movups (IVP), IV mov 480(KEYP), KLEN diff --git a/arch/x86/crypto/aesni-intel_avx-x86_64.S b/arch/x86/crypto/aesni-intel_avx-x86_64.S index faecb1518bf8..488605b19fe8 100644 --- a/arch/x86/crypto/aesni-intel_avx-x86_64.S +++ b/arch/x86/crypto/aesni-intel_avx-x86_64.S @@ -454,7 +454,8 @@ _get_AAD_rest0\@: vpshufb and an array of shuf...
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2018 May 23
33
[PATCH v3 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v3: - Update on message to describe longer term PIE goal. - Minor change on ftrace if condition. - Changed code using xchgq. - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends