search for: m_len

Displaying 8 results from an estimated 8 matches for "m_len".

Did you mean: s_len
2005 Jul 29
1
Samba, VPN, and Mac OSX 10.4.2
...PSec VPN. After upgrading to Tiger, they still work fine when on our LAN. But if they try to connect to a share over the VPN, Finder hangs. The Mac logs the following messages in /var/log/system.log during the hang: Jul 29 09:59:46 brian-daniels-powerbook-g4-15 kernel[0]: bug: ecnt = 32, but m_len = 0 and m_next = 0 (please report) Jul 29 09:59:46 brian-daniels-powerbook-g4-15 kernel[0]: bug: ecnt = 33, but m_len = 0 and m_next = 0 (please report) Jul 29 09:59:46 brian-daniels-powerbook-g4-15 kernel[0]: bug: ecnt = 32, but m_len = 0 and m_next = 0 (please report) Jul 29 09:59:46 brian-dani...
2002 Aug 05
5
[patch] read-devices
...de and usage of map_ptr() required the file size to be known in advance. This is impossible for devices and FIFOs. To address this, I changed the interface of map_ptr. It now returns void rather than char*, and updates two new members of map_struct: - m_ptr contains the pointer to the new data - m_len contains the length of the new data (at most the length requested, but less if EOF encountered) Also, the map_struct->file_size field is now updated by map_ptr() when it encounters an EOF. I updated all invocations of map_ptr() to use the new interface, and act correctly when a premature EO...
2002 Apr 24
2
RSA_verify question on OpenSSH Client w/ OpenSSL0.9.6a
Using OpenSSH 2.3.1 client and OpenSSL 0.9.6a When trying to ssh to OpenSSH server of higher versions SSH-1.99-OpenSSH_2.5.2p2 or such, I see error in RSA key exchange: RSA_verify(..)routine. I see: error at:int RSA_verify(int dtype, unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa) { int i,ret=0,sigtype; unsigned char *p,*s; X509_SIG *sig=NULL; if (siglen != (unsigned int)RSA_size(rsa)) { RSAerr(RSA_F_RSA_VERIFY,RSA_R_WRONG_SIGNATURE_LENGTH); return(0); } deb...
2002 Jul 20
0
opensc smartcard support does not work
.../* FIXME: length of sigret correct? */ /* FIXME: check 'type' and modify flags accordingly */ ! flags = SC_ALGORITHM_RSA_PAD_PKCS1 | SC_ALGORITHM_RSA_HASH_SHA1; r = sc_pkcs15_compute_signature(p15card, key_obj, flags, ! m, m_len, sigret, RSA_size(rsa)); sc_unlock(card); if (r < 0) { error("sc_pkcs15_compute_signature() failed: %s", sc_strerror(r)); goto err; } *siglen = r; return 1; err: --- 194,253 ---- uns...
2006 Jan 20
1
Tiger 10.4.4 Finder hangs browsing over VPN
...> when on our LAN. But if they try to connect to a [Samba 3.0.10-1] > share over the [IPsec] VPN, Finder hangs. The Mac logs the > following messages in /var/log/system.log during the hang: > > Jul 29 09:59:46 brian-daniels-powerbook-g4-15 kernel[0]: bug: ecnt > = 32, but m_len = 0 and m_next = 0 (please report) > > It keeps logging these errors until Finder is forced to quit. > Interestingly, if the server connected to has only a few files > (<~30) in the root directory, then the hang does not occur. But if > the user then tries to cd to a dir co...
2012 Jul 24
2
Broadcom NetXtreme bcm5720 in the 9.1 beta
Team I have a Dell PowerEdge R720xd, with the Broadcom NetXtreme bcm5720. I found the following thread: http://forums.freebsd.org/showthread.php?t=31769 I find I am unable to use the NIC's (there are 4 on the server). When we put a cable into it we get a "watchdog timeout -- resetting" error, and the machine will pause for 5 or so seconds. IP may or may not come up randomly.
2004 Apr 20
1
[patch] Raw sockets in jails
Although RAW sockets can be used when specifying the source address of packets (defeating one of the aspects of the jail) some people may find it usefull to use utilities like ping(8) or traceroute(8) from inside jails. Enclosed is a patch I have written which gives you the option of allowing prison-root to create raw sockets inside the prison, so
2012 Sep 17
9
[PATCH] Upgrade vtpmd to berlios version 0.7.4
...or-0.4/tpm/tpm_marshalling.c 2006-06-23 03:37:07.000000000 -0700 -+++ tpm_emulator/tpm/tpm_marshalling.c 2006-07-24 14:35:35.000000000 -0700 -@@ -1312,7 +1312,7 @@ int tpm_unmarshal_TPM_STANY_FLAGS(BYTE * - - int tpm_marshal_RSA(BYTE **ptr, UINT32 *length, rsa_private_key_t *v) - { -- UINT32 m_len, e_len, q_len; -+ size_t m_len, e_len, q_len; - if (*length < sizeof_RSA((*v))) return -1; - if (v->size > 0) { - rsa_export_modulus(v, &(*ptr)[6], &m_len); -@@ -1460,6 +1460,66 @@ int tpm_unmarshal_TPM_PERMANENT_DATA(BYT - return 0; - } - -+int tpm_marshal_TPM_STCLEAR_D...