search for: plen

Displaying 20 results from an estimated 96 matches for "plen".

Did you mean: len
2007 May 01
0
BlueZ
...n request failed: Input/output error I got no PIN requester on either phone and PC. On the same time on another console I have: [root at miho ~]# hcidump HCI sniffer - Bluetooth packet analyzer ver 1.32 device: hci0 snap_len: 1028 filter: 0xffffffff (scan) < HCI Command: Inquiry (0x01|0x0001) plen 5 > HCI Event: Command Status (0x0f) plen 4 > HCI Event: Inquiry Result with RSSI (0x22) plen 15 > HCI Event: Inquiry Result with RSSI (0x22) plen 15 > HCI Event: Inquiry Result with RSSI (0x22) plen 15 > HCI Event: Inquiry Result with RSSI (0x22) plen 15 > HCI Event: Inquiry Resu...
2014 Dec 01
2
[LLVMdev] Optimization hints for "constant" loads
...work, but can't prove that it's safe. As I said in the other thread, !invariant.load and llvm.invariant.* are not the same. This thread is discussing the later, not the former. The other thread is discussing the former, but not the later. > > Given: > > %a = newArray() > %pLen = gep(%a, <length offset>) > invariant.start(<size>, %pLen) > %len = load %pLen > > %o = foo() // may deallocate %a > store %something > load %o > > I want to claim that the LLVM optimizer cannot do the following (but > don't have a complete line of reaso...
2010 Jul 23
1
Sending files from mobile to CentOS via Bluetooth
...CentOS 5 repositories. I also tried slightly older versions of bluez-utils and blues-libs as report at Red Hat Bugzilla suggested this might help, but it didn't really. - Toralf ------------------------------------------------------------------------ > HCI Event: Connect Request (0x04) plen 10 < HCI Command: Accept Connection Request (0x01|0x0009) plen 7 > HCI Event: Command Status (0x0f) plen 4 > HCI Event: Connect Complete (0x03) plen 11 < HCI Command: Read Remote Supported Features (0x01|0x001b) plen 2 > HCI Event: Command Status (0x0f) plen 4 < HCI Command: Wr...
2014 Dec 01
2
[LLVMdev] Optimization hints for "constant" loads
...the other thread, !invariant.load and llvm.invariant.* >> are not the same. This thread is discussing the later, not the >> former. The other thread is discussing the former, but not the later. >>> >>> Given: >>> >>> %a = newArray() >>> %pLen = gep(%a, <length offset>) >>> invariant.start(<size>, %pLen) >>> %len = load %pLen >>> >>> %o = foo() // may deallocate %a >>> store %something >>> load %o >>> >>> I want to claim that the LLVM optimizer cannot do...
2015 Mar 02
2
Errors on Windows with grep(fixed=TRUE) on UTF-8 strings
On Windows, grep(fixed=TRUE) throws errors with some UTF-8 strings. Here's an example (must be run on Windows to reproduce the error): Sys.setlocale("LC_CTYPE", "chinese") y <- rawToChar(as.raw(c(0xe6, 0xb8, 0x97))) Encoding(y) <- "UTF-8" y # [1] "?" grep("\n", y, fixed = TRUE) # Error in grep("\n", y, fixed = TRUE) : invalid
2014 Oct 21
3
[LLVMdev] Optimization hints for "constant" loads
On 10/21/2014 01:44 PM, Andrew Trick wrote: >> On Oct 21, 2014, at 11:46 AM, Sanjoy Das <sanjoy at playingwithpointers.com> wrote: >> >> Thank you for the explanation, I think I misunderstood your solution >> initially. Is it accurate to say: by making the definition of the >> source pointer of an !invariant load control (or data) dependent on >> some
2015 Mar 04
0
Errors on Windows with grep(fixed=TRUE) on UTF-8 strings
...4,27 @@ static int fgrep_one(const char *pat, const char *target, } return -1; } - if (!useBytes && mbcslocale) { /* skip along by chars */ - mbstate_t mb_st; + if (!useBytes && use_UTF8) { int ib, used; - mbs_init(&mb_st); for (ib = 0, i = 0; ib <= len-plen; i++) { if (strncmp(pat, target+ib, plen) == 0) { if (next != NULL) *next = ib + plen; return i; } - used = (int) Mbrtowc(NULL, target+ib, MB_CUR_MAX, &mb_st); + used = utf8clen(target[ib]); if (used <= 0) break; ib += used; } - } else if (!useByte...
2014 Jan 14
1
[PATCH] hivex: Make empty strings in REG_MULTI_SZ values available.
...duled removals, the second file name of any pair stored in + * PendingFileRenameOperations is an empty string. + */ char ** hivex_value_multiple_strings (hive_h *h, hive_value_h value) { @@ -490,8 +510,8 @@ hivex_value_multiple_strings (hive_h *h, hive_value_h value) char *p = data; size_t plen; - while (p < data + len && - (plen = _hivex_utf16_string_len_in_bytes_max (p, data + len - p)) > 0) { + while (p < data + len) { + plen = _hivex_utf16_string_len_in_bytes_max (p, data + len - p); nr_strings++; char **ret2 = realloc (ret, (1 + nr_strings) *...
2004 Oct 17
0
OpenSSH 3.9.1 fix for IRIX 5.3 cc
...quot;, SSH_CIPHER_SSH2, 16, 5, EVP_acss }, + { "acss at openssh.org", SSH_CIPHER_SSH2, 16, 5, (const EVP_CIPHER *(*)(void)) EVP_acss }, #endif { NULL, SSH_CIPHER_INVALID, 0, 0, NULL } }; @@ -415,7 +415,7 @@ Cipher *c = cc->cipher; int plen = 0; - if (c->evptype == EVP_rc4 || c->evptype == EVP_acss) { + if (c->evptype == (const EVP_CIPHER *(*)(void)) EVP_rc4 || c->evptype == (const EVP_CIPHER *(*)(void)) EVP_acss) { plen = EVP_X_STATE_LEN(cc->evp); if (dat == NULL)...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...ward request from %.100s port %d."); + */ + return 0; +} + +/* Jarno Huuskonen: This is called when server receives + * SSH2_MSG_GLOBAL_REQUEST. Handles both "tcpip-forward" and + * "cancel-tcpip-forward" requests. + */ +void +channel_server_global_request(int type, int plen) +{ + char *rtype; + char want_reply; + int success = 0; + + rtype = packet_get_string(NULL); + want_reply = packet_get_char(); + debug("server received: %.100s request (reply=%d)",rtype, + (int)want_reply); + + if ( strcmp(rtype, "tcpip-forward") == 0 ) { + char *address_...
2010 Jul 24
0
[PATCH] chain.c: allocation fixes
...->lba_last - gp->lba_first + 1; /* The length of the hand-over */ - int synth_size = + uint32_t synth_size = sizeof(struct part_entry) + sizeof(uint32_t) + cur_part->private.gpt.size; /* Will point to the partition record length in the hand-over */ uint32_t *plen; /* Allocate the hand-over record */ - record = malloc(synth_size); - if (!record) { + hand_area = malloc(synth_size); + if (!hand_area) { error("Could not build GPT hand-over record!\n"); goto bail; } /* Synthesize the record */ - memset(reco...
2017 Mar 07
0
Potential clue for Bug 16975 - lme fixed sigma - inconsistent REML estimation
...b", "varFunc") val } varWeights.varSum <- function(object) { apply(as.data.frame(lapply(object, varWeights)), 1, function(x){ 1/sqrt(sum((1/x)^2)) }) } Initialize.varSum <- function(object, data, ...) { val <- lapply(object, Initialize, data) attr(val, "plen") <- unlist(lapply(val, function(el) length(coef(el)))) class(val) <- c("varSum","varComb", "varFunc") val } logLik.varSum <- function(object, ...) { lls <- lapply(object, logLik) lls2 <- apply(as.data.frame(lapply(object, varWeights)), 1, fu...
2001 Feb 04
4
next build
> *** openbsd-compat/bsd-nextstep.h.orig Sun Feb 4 00:16:16 2001 > --- openbsd-compat/bsd-nextstep.h Sun Feb 4 00:19:09 2001 > *************** > *** 48,52 **** > --- 48,56 ---- > speed_t cfgetispeed(const struct termios *t); > int cfsetospeed(struct termios *t, int speed); > int cfsetispeed(struct termios *t, int speed); > + > + /* LIMITS */ > + #define
2001 Oct 26
2
Patch to add "warn" value to ForwardX11 and ForwardAgent
...= -1) + *intptr = value; + break; case oUsePrivilegedPort: intptr = &options->use_privileged_port; --- clientloop.c.O Fri Oct 26 11:47:19 2001 +++ clientloop.c Fri Oct 26 13:32:26 2001 @@ -1234,6 +1234,40 @@ } xfree(rtype); } +static void +client_input_agent_open(int type, int plen, void *ctxt) +{ + if (!options.forward_agent) { + deny_input_open(type, plen, ctxt); + return; + } + if (options.forward_agent == 2) { + error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"); + error("@ ssh WARNING: received agent open request from the...
2001 Jul 22
1
[patch] ignore SSH2_MSG_IGNORE packets
Hi, protocolkeepalives sends ssh_msg_ignore, which the ssh2 server handles incorrectly (i.e. it produces some output to syslog, instead of ignoring the packet): Jul 9 11:58:07 ren sshd[16580]: error: Hm, dispatch protocol error: type 32 plen 4 This patch implements a highly advanced function to ignore these packets ;) Matthew -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... Name: msgignore.diff Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/7022ca8e/attach...
2003 Oct 12
4
[PATCH]: Call pam_chauthtok from keyboard-interactive.
Hi All. This patch calls pam_chauthtok() to change an expired password via PAM during keyboard-interactive authentication (SSHv2 only). It is tested on Redhat 8 and Solaris 8. In theory, it should have simply been a matter of calling pam_chauthtok with the PAM_CHANGE_EXPIRED_AUTHTOK flag, it'd only change the password is if it's expired, right? From the Solaris pam_chauthtok man page:
2020 Feb 17
3
sshd crashes
Hi, sshd crashes at below location. After compilation, when I start sshd it crashes in ?sshbuf-misc.c? file inside ?sshbuf_b64tod? function at line size_t plen = strlen(b64); The call trace is as below, Sshd main function -> sshkey_load_public -> sshkey_try_load_public -> sshkey_read -> sshbuf_b64tod During compilation a warning is thrown. Is this the trigger point for the crash? "sshkey.c", : warning #2223-D: function "strndu...
2012 Jul 23
2
[PATCH V2] qemu-xen-traditionnal, Fix dirty logging during migration.
...8_t *buffer, target_phys_addr_t len, int w) {}; #endif /* defined(MAPCACHE) */ diff --git a/i386-dm/exec-dm.c b/i386-dm/exec-dm.c index 96274d9..493146b 100644 --- a/i386-dm/exec-dm.c +++ b/i386-dm/exec-dm.c @@ -820,10 +820,6 @@ void *cpu_physical_memory_map(target_phys_addr_t addr, if ((*plen) > l) *plen = l; #endif - if (xen_logdirty_enable) - xc_hvm_modified_memory(xc_handle, domid, addr >> TARGET_PAGE_BITS, - ((addr + l + TARGET_PAGE_SIZE - 1) >> TARGET_PAGE_BITS) - - (addr >> TARGET_PAGE_BITS)); return...
2000 Jan 19
3
AIX openssh patches
...ern char *optarg; extern int optind; ! #ifdef _AIX ! unsigned long aux; ! #else ! int aux; ! #endif ! int opt, sock_in, sock_out, newsock, i, pid, on = 1; int remote_major, remote_minor; int silentrsa = 0; struct pollfd fds; *************** *** 988,994 **** packet_read_expect(&plen, SSH_CMSG_USER); /* Get the user name. */ ! user = packet_get_string(&ulen); packet_integrity_check(plen, (4 + ulen), SSH_CMSG_USER); /* Destroy the private and public keys. They will no longer be needed. */ --- 993,999 ---- packet_read_expect(&plen, SSH_CMSG_USER);...
2000 Nov 30
2
Problem talking to SSH 2.3.0 server
...-1.1 as shipped with Debian 2.2). server: sparc-sun-solaris2.7, SSH-2.0-2.3.0 SSH Secure Shell (non-commercial) Problem: some time after logging into the server (few minutes to few hours, happens even if the session is mostly idle), I get this error message: Hm, dispatch protocol error: type 20 plen 136 and no more data can be received from the server (the other direction appears to be OK - the server gets the commands I type, but I can't see them echoed back). The ~. escape closes the connection as it should. Thanks, Marek PS. Yes, I will try to convince the admin of that server to i...