search for: pbkac

Displaying 7 results from an estimated 7 matches for "pbkac".

Did you mean: pebkac
2014 Aug 12
3
doveadm pw with SHA512-CRYPT won't roundtrip
Hi, Not sure if this is a PBKAC or not:- root at ds3:/usr/share/postfixadmin# doveadm pw -s SHA512-CRYPT -p password {SHA512-CRYPT}$6$aUgGXP0UshkMj7hY$9JV4yMRsjIe/98CzmglYrMjf.9NJ.FXzxcLE9B0v3doCRUWo2wRncc6hg6VCs0DCUHQbeC/bRDZdGCge/nB/h/ root at ds3:/usr/share/postfixadmin# doveadm pw -t {SHA512-CRYPT}$6$aUgGXP0UshkMj7hY$9JV4yM...
2018 Feb 07
0
retpoline mitigation and 6.0
On Wed, 2018-02-07 at 10:11 -0800, Guenter Roeck wrote: > On Wed, Feb 07, 2018 at 10:49:25AM +0000, David Woodhouse wrote: > > Hm, please could we also have the %V asm constraint modifier? That > > allows us to emit calls to the thunks from inline asm using the > > register that the compiler chose for us: > > > >  asm volatile ("call
2018 Feb 07
3
retpoline mitigation and 6.0
...> care about CET compatibility there, so I'm OK to implement the bare > ret-equivalent __x86_indirect_thunk. > > The former... wtf? Can you show me the code that actually *calls* that. > I am having difficulty imagining any situation in which that's sane. Turns out this was PBKAC. That was with chromeos-4.14, which does not yet include the upstream patch removing __x86_indirect_thunk_esp. I don't see it with ToT. The "U" was from ./arch/x86/lib/lib-ksyms.o, meaning it was internally generated. Sorry for the noise. Guenter
2007 Jun 21
8
feature request - prevent user stupidity (eg mine)
I foolishly made the following typo: " disk = [ ''phy:/dev/vg00/virt-smtp1-root,0301,w'', ''phy:/dev/vg00/virt-smtp1-root,0302,w'' ] " instead of: " disk = [ ''phy:/dev/vg00/virt-smtp1-root,0301,w'', ''phy:/dev/vg00/virt-smtp1-swap,0302,w'' ]" (the type was that the same Dom0 block device is used twice in the
2018 Feb 07
0
retpoline mitigation and 6.0
...lity there, so I'm OK to implement the bare > > ret-equivalent __x86_indirect_thunk. > > > > The former... wtf? Can you show me the code that actually *calls* that. > > I am having difficulty imagining any situation in which that's sane. > > Turns out this was PBKAC. That was with chromeos-4.14, which does not yet > include the upstream patch removing __x86_indirect_thunk_esp. I don't > see it with ToT. The "U" was from ./arch/x86/lib/lib-ksyms.o, meaning it > was internally generated. Sorry for the noise. OK... which __x86_indirect_thu...
2018 Feb 07
2
retpoline mitigation and 6.0
On Wed, Feb 07, 2018 at 10:49:25AM +0000, David Woodhouse wrote: > On Wed, 2018-02-07 at 06:20 +0000, Chandler Carruth wrote: > > I've landed the patch in r324449. > > > > Before we merge this into two different Clang release branches and > > almost immediately release one of them, I would really like someone > > to confirm that this patch works well with the
2003 Oct 27
92
Help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 dragen@pbsi.org ?rta: | I am hacing trouble. I can see my linux box from my windows box, I can connect | and browse but I cant delete or modify files. Do I have something wrong? | | The is my smb.conf | | [global] | netbios name = dragenlinux | server string = "DragenLinux" | workgroup = WORKGROUP | security = share | log file =