Displaying 20 results from an estimated 96 matches for "plen".
Did you mean:
len
2007 May 01
0
BlueZ
...n request failed: Input/output error
I got no PIN requester on either phone and PC.
On the same time on another console I have:
[root at miho ~]# hcidump
HCI sniffer - Bluetooth packet analyzer ver 1.32
device: hci0 snap_len: 1028 filter: 0xffffffff
(scan)
< HCI Command: Inquiry (0x01|0x0001) plen 5
> HCI Event: Command Status (0x0f) plen 4
> HCI Event: Inquiry Result with RSSI (0x22) plen 15
> HCI Event: Inquiry Result with RSSI (0x22) plen 15
> HCI Event: Inquiry Result with RSSI (0x22) plen 15
> HCI Event: Inquiry Result with RSSI (0x22) plen 15
> HCI Event: Inquiry Resu...
2014 Dec 01
2
[LLVMdev] Optimization hints for "constant" loads
...work, but can't prove that it's safe.
As I said in the other thread, !invariant.load and llvm.invariant.* are
not the same. This thread is discussing the later, not the former. The
other thread is discussing the former, but not the later.
>
> Given:
>
> %a = newArray()
> %pLen = gep(%a, <length offset>)
> invariant.start(<size>, %pLen)
> %len = load %pLen
>
> %o = foo() // may deallocate %a
> store %something
> load %o
>
> I want to claim that the LLVM optimizer cannot do the following (but
> don't have a complete line of reaso...
2010 Jul 23
1
Sending files from mobile to CentOS via Bluetooth
...CentOS 5 repositories. I also
tried slightly older versions of bluez-utils and blues-libs as report at
Red Hat Bugzilla suggested this might help, but it didn't really.
- Toralf
------------------------------------------------------------------------
> HCI Event: Connect Request (0x04) plen 10
< HCI Command: Accept Connection Request (0x01|0x0009) plen 7
> HCI Event: Command Status (0x0f) plen 4
> HCI Event: Connect Complete (0x03) plen 11
< HCI Command: Read Remote Supported Features (0x01|0x001b) plen 2
> HCI Event: Command Status (0x0f) plen 4
< HCI Command: Wr...
2014 Dec 01
2
[LLVMdev] Optimization hints for "constant" loads
...the other thread, !invariant.load and llvm.invariant.*
>> are not the same. This thread is discussing the later, not the
>> former. The other thread is discussing the former, but not the later.
>>>
>>> Given:
>>>
>>> %a = newArray()
>>> %pLen = gep(%a, <length offset>)
>>> invariant.start(<size>, %pLen)
>>> %len = load %pLen
>>>
>>> %o = foo() // may deallocate %a
>>> store %something
>>> load %o
>>>
>>> I want to claim that the LLVM optimizer cannot do...
2015 Mar 02
2
Errors on Windows with grep(fixed=TRUE) on UTF-8 strings
On Windows, grep(fixed=TRUE) throws errors with some UTF-8 strings.
Here's an example (must be run on Windows to reproduce the error):
Sys.setlocale("LC_CTYPE", "chinese")
y <- rawToChar(as.raw(c(0xe6, 0xb8, 0x97)))
Encoding(y) <- "UTF-8"
y
# [1] "?"
grep("\n", y, fixed = TRUE)
# Error in grep("\n", y, fixed = TRUE) : invalid
2014 Oct 21
3
[LLVMdev] Optimization hints for "constant" loads
On 10/21/2014 01:44 PM, Andrew Trick wrote:
>> On Oct 21, 2014, at 11:46 AM, Sanjoy Das <sanjoy at playingwithpointers.com> wrote:
>>
>> Thank you for the explanation, I think I misunderstood your solution
>> initially. Is it accurate to say: by making the definition of the
>> source pointer of an !invariant load control (or data) dependent on
>> some
2015 Mar 04
0
Errors on Windows with grep(fixed=TRUE) on UTF-8 strings
...4,27 @@ static int fgrep_one(const char *pat, const char *target,
}
return -1;
}
- if (!useBytes && mbcslocale) { /* skip along by chars */
- mbstate_t mb_st;
+ if (!useBytes && use_UTF8) {
int ib, used;
- mbs_init(&mb_st);
for (ib = 0, i = 0; ib <= len-plen; i++) {
if (strncmp(pat, target+ib, plen) == 0) {
if (next != NULL) *next = ib + plen;
return i;
}
- used = (int) Mbrtowc(NULL, target+ib, MB_CUR_MAX, &mb_st);
+ used = utf8clen(target[ib]);
if (used <= 0) break;
ib += used;
}
- } else if (!useByte...
2014 Jan 14
1
[PATCH] hivex: Make empty strings in REG_MULTI_SZ values available.
...duled removals, the second file name of any pair stored in
+ * PendingFileRenameOperations is an empty string.
+ */
char **
hivex_value_multiple_strings (hive_h *h, hive_value_h value)
{
@@ -490,8 +510,8 @@ hivex_value_multiple_strings (hive_h *h, hive_value_h value)
char *p = data;
size_t plen;
- while (p < data + len &&
- (plen = _hivex_utf16_string_len_in_bytes_max (p, data + len - p)) > 0) {
+ while (p < data + len) {
+ plen = _hivex_utf16_string_len_in_bytes_max (p, data + len - p);
nr_strings++;
char **ret2 = realloc (ret, (1 + nr_strings) *...
2004 Oct 17
0
OpenSSH 3.9.1 fix for IRIX 5.3 cc
...quot;, SSH_CIPHER_SSH2, 16, 5, EVP_acss },
+ { "acss at openssh.org", SSH_CIPHER_SSH2, 16, 5, (const EVP_CIPHER *(*)(void)) EVP_acss },
#endif
{ NULL, SSH_CIPHER_INVALID, 0, 0, NULL }
};
@@ -415,7 +415,7 @@
Cipher *c = cc->cipher;
int plen = 0;
- if (c->evptype == EVP_rc4 || c->evptype == EVP_acss) {
+ if (c->evptype == (const EVP_CIPHER *(*)(void)) EVP_rc4 || c->evptype == (const EVP_CIPHER *(*)(void)) EVP_acss) {
plen = EVP_X_STATE_LEN(cc->evp);
if (dat == NULL)...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...ward request from %.100s port %d.");
+ */
+ return 0;
+}
+
+/* Jarno Huuskonen: This is called when server receives
+ * SSH2_MSG_GLOBAL_REQUEST. Handles both "tcpip-forward" and
+ * "cancel-tcpip-forward" requests.
+ */
+void
+channel_server_global_request(int type, int plen)
+{
+ char *rtype;
+ char want_reply;
+ int success = 0;
+
+ rtype = packet_get_string(NULL);
+ want_reply = packet_get_char();
+ debug("server received: %.100s request (reply=%d)",rtype,
+ (int)want_reply);
+
+ if ( strcmp(rtype, "tcpip-forward") == 0 ) {
+ char *address_...
2010 Jul 24
0
[PATCH] chain.c: allocation fixes
...->lba_last - gp->lba_first + 1;
/* The length of the hand-over */
- int synth_size =
+ uint32_t synth_size =
sizeof(struct part_entry) + sizeof(uint32_t) +
cur_part->private.gpt.size;
/* Will point to the partition record length in the hand-over */
uint32_t *plen;
/* Allocate the hand-over record */
- record = malloc(synth_size);
- if (!record) {
+ hand_area = malloc(synth_size);
+ if (!hand_area) {
error("Could not build GPT hand-over record!\n");
goto bail;
}
/* Synthesize the record */
- memset(reco...
2017 Mar 07
0
Potential clue for Bug 16975 - lme fixed sigma - inconsistent REML estimation
...b", "varFunc")
val
}
varWeights.varSum <-
function(object)
{
apply(as.data.frame(lapply(object, varWeights)), 1, function(x){
1/sqrt(sum((1/x)^2))
})
}
Initialize.varSum <-
function(object, data, ...)
{
val <- lapply(object, Initialize, data)
attr(val, "plen") <- unlist(lapply(val, function(el) length(coef(el))))
class(val) <- c("varSum","varComb", "varFunc")
val
}
logLik.varSum <-
function(object, ...)
{
lls <- lapply(object, logLik)
lls2 <- apply(as.data.frame(lapply(object, varWeights)), 1, fu...
2001 Feb 04
4
next build
> *** openbsd-compat/bsd-nextstep.h.orig Sun Feb 4 00:16:16 2001
> --- openbsd-compat/bsd-nextstep.h Sun Feb 4 00:19:09 2001
> ***************
> *** 48,52 ****
> --- 48,56 ----
> speed_t cfgetispeed(const struct termios *t);
> int cfsetospeed(struct termios *t, int speed);
> int cfsetispeed(struct termios *t, int speed);
> +
> + /* LIMITS */
> + #define
2001 Oct 26
2
Patch to add "warn" value to ForwardX11 and ForwardAgent
...= -1)
+ *intptr = value;
+ break;
case oUsePrivilegedPort:
intptr = &options->use_privileged_port;
--- clientloop.c.O Fri Oct 26 11:47:19 2001
+++ clientloop.c Fri Oct 26 13:32:26 2001
@@ -1234,6 +1234,40 @@
}
xfree(rtype);
}
+static void
+client_input_agent_open(int type, int plen, void *ctxt)
+{
+ if (!options.forward_agent) {
+ deny_input_open(type, plen, ctxt);
+ return;
+ }
+ if (options.forward_agent == 2) {
+ error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@");
+ error("@ ssh WARNING: received agent open request from the...
2001 Jul 22
1
[patch] ignore SSH2_MSG_IGNORE packets
Hi,
protocolkeepalives sends ssh_msg_ignore, which the ssh2 server handles
incorrectly (i.e. it produces some output to syslog, instead of
ignoring the packet):
Jul 9 11:58:07 ren sshd[16580]: error: Hm, dispatch protocol error:
type 32 plen 4
This patch implements a highly advanced function to ignore these
packets ;)
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: msgignore.diff
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/7022ca8e/attach...
2003 Oct 12
4
[PATCH]: Call pam_chauthtok from keyboard-interactive.
Hi All.
This patch calls pam_chauthtok() to change an expired password via PAM
during keyboard-interactive authentication (SSHv2 only). It is tested on
Redhat 8 and Solaris 8.
In theory, it should have simply been a matter of calling pam_chauthtok
with the PAM_CHANGE_EXPIRED_AUTHTOK flag, it'd only change the password is
if it's expired, right? From the Solaris pam_chauthtok man page:
2020 Feb 17
3
sshd crashes
Hi,
sshd crashes at below location.
After compilation, when I start sshd it crashes in ?sshbuf-misc.c? file
inside ?sshbuf_b64tod? function at line size_t plen = strlen(b64);
The call trace is as below,
Sshd main function -> sshkey_load_public -> sshkey_try_load_public ->
sshkey_read -> sshbuf_b64tod
During compilation a warning is thrown. Is this the trigger point for the
crash?
"sshkey.c", : warning #2223-D: function "strndu...
2012 Jul 23
2
[PATCH V2] qemu-xen-traditionnal, Fix dirty logging during migration.
...8_t *buffer, target_phys_addr_t len, int w) {};
#endif /* defined(MAPCACHE) */
diff --git a/i386-dm/exec-dm.c b/i386-dm/exec-dm.c
index 96274d9..493146b 100644
--- a/i386-dm/exec-dm.c
+++ b/i386-dm/exec-dm.c
@@ -820,10 +820,6 @@ void *cpu_physical_memory_map(target_phys_addr_t addr,
if ((*plen) > l)
*plen = l;
#endif
- if (xen_logdirty_enable)
- xc_hvm_modified_memory(xc_handle, domid, addr >> TARGET_PAGE_BITS,
- ((addr + l + TARGET_PAGE_SIZE - 1) >> TARGET_PAGE_BITS)
- - (addr >> TARGET_PAGE_BITS));
return...
2000 Jan 19
3
AIX openssh patches
...ern char *optarg;
extern int optind;
! #ifdef _AIX
! unsigned long aux;
! #else
! int aux;
! #endif
! int opt, sock_in, sock_out, newsock, i, pid, on = 1;
int remote_major, remote_minor;
int silentrsa = 0;
struct pollfd fds;
***************
*** 988,994 ****
packet_read_expect(&plen, SSH_CMSG_USER);
/* Get the user name. */
! user = packet_get_string(&ulen);
packet_integrity_check(plen, (4 + ulen), SSH_CMSG_USER);
/* Destroy the private and public keys. They will no longer be needed. */
--- 993,999 ----
packet_read_expect(&plen, SSH_CMSG_USER);...
2000 Nov 30
2
Problem talking to SSH 2.3.0 server
...-1.1 as shipped with Debian 2.2).
server: sparc-sun-solaris2.7,
SSH-2.0-2.3.0 SSH Secure Shell (non-commercial)
Problem: some time after logging into the server (few minutes to few
hours, happens even if the session is mostly idle), I get this error
message:
Hm, dispatch protocol error: type 20 plen 136
and no more data can be received from the server (the other direction
appears to be OK - the server gets the commands I type, but I can't see
them echoed back). The ~. escape closes the connection as it should.
Thanks,
Marek
PS. Yes, I will try to convince the admin of that server to i...