search for: plen

Displaying 20 results from an estimated 97 matches for "plen".

Did you mean: len
2007 May 01
0
BlueZ
...n request failed: Input/output error I got no PIN requester on either phone and PC. On the same time on another console I have: [root at miho ~]# hcidump HCI sniffer - Bluetooth packet analyzer ver 1.32 device: hci0 snap_len: 1028 filter: 0xffffffff (scan) < HCI Command: Inquiry (0x01|0x0001) plen 5 > HCI Event: Command Status (0x0f) plen 4 > HCI Event: Inquiry Result with RSSI (0x22) plen 15 > HCI Event: Inquiry Result with RSSI (0x22) plen 15 > HCI Event: Inquiry Result with RSSI (0x22) plen 15 > HCI Event: Inquiry Result with RSSI (0x22) plen 15 > HCI Event: Inquiry Resu...
2014 Dec 01
2
[LLVMdev] Optimization hints for "constant" loads
...work, but can't prove that it's safe. As I said in the other thread, !invariant.load and llvm.invariant.* are not the same. This thread is discussing the later, not the former. The other thread is discussing the former, but not the later. > > Given: > > %a = newArray() > %pLen = gep(%a, <length offset>) > invariant.start(<size>, %pLen) > %len = load %pLen > > %o = foo() // may deallocate %a > store %something > load %o > > I want to claim that the LLVM optimizer cannot do the following (but > don't have a complete line of reaso...
2010 Jul 23
1
Sending files from mobile to CentOS via Bluetooth
...CentOS 5 repositories. I also tried slightly older versions of bluez-utils and blues-libs as report at Red Hat Bugzilla suggested this might help, but it didn't really. - Toralf ------------------------------------------------------------------------ > HCI Event: Connect Request (0x04) plen 10 < HCI Command: Accept Connection Request (0x01|0x0009) plen 7 > HCI Event: Command Status (0x0f) plen 4 > HCI Event: Connect Complete (0x03) plen 11 < HCI Command: Read Remote Supported Features (0x01|0x001b) plen 2 > HCI Event: Command Status (0x0f) plen 4 < HCI Command: Wr...
2014 Dec 01
2
[LLVMdev] Optimization hints for "constant" loads
...the other thread, !invariant.load and llvm.invariant.* >> are not the same. This thread is discussing the later, not the >> former. The other thread is discussing the former, but not the later. >>> >>> Given: >>> >>> %a = newArray() >>> %pLen = gep(%a, <length offset>) >>> invariant.start(<size>, %pLen) >>> %len = load %pLen >>> >>> %o = foo() // may deallocate %a >>> store %something >>> load %o >>> >>> I want to claim that the LLVM optimizer cannot do...
2015 Mar 02
2
Errors on Windows with grep(fixed=TRUE) on UTF-8 strings
On Windows, grep(fixed=TRUE) throws errors with some UTF-8 strings. Here's an example (must be run on Windows to reproduce the error): Sys.setlocale("LC_CTYPE", "chinese") y <- rawToChar(as.raw(c(0xe6, 0xb8, 0x97))) Encoding(y) <- "UTF-8" y # [1] "?" grep("\n", y, fixed = TRUE) # Error in grep("\n", y, fixed = TRUE) : invalid
2014 Oct 21
3
[LLVMdev] Optimization hints for "constant" loads
On 10/21/2014 01:44 PM, Andrew Trick wrote: >> On Oct 21, 2014, at 11:46 AM, Sanjoy Das <sanjoy at playingwithpointers.com> wrote: >> >> Thank you for the explanation, I think I misunderstood your solution >> initially. Is it accurate to say: by making the definition of the >> source pointer of an !invariant load control (or data) dependent on >> some
2015 Mar 04
0
Errors on Windows with grep(fixed=TRUE) on UTF-8 strings
...4,27 @@ static int fgrep_one(const char *pat, const char *target, } return -1; } - if (!useBytes && mbcslocale) { /* skip along by chars */ - mbstate_t mb_st; + if (!useBytes && use_UTF8) { int ib, used; - mbs_init(&mb_st); for (ib = 0, i = 0; ib <= len-plen; i++) { if (strncmp(pat, target+ib, plen) == 0) { if (next != NULL) *next = ib + plen; return i; } - used = (int) Mbrtowc(NULL, target+ib, MB_CUR_MAX, &mb_st); + used = utf8clen(target[ib]); if (used <= 0) break; ib += used; } - } else if (!useByte...
2014 Jan 14
1
[PATCH] hivex: Make empty strings in REG_MULTI_SZ values available.
...duled removals, the second file name of any pair stored in + * PendingFileRenameOperations is an empty string. + */ char ** hivex_value_multiple_strings (hive_h *h, hive_value_h value) { @@ -490,8 +510,8 @@ hivex_value_multiple_strings (hive_h *h, hive_value_h value) char *p = data; size_t plen; - while (p < data + len && - (plen = _hivex_utf16_string_len_in_bytes_max (p, data + len - p)) > 0) { + while (p < data + len) { + plen = _hivex_utf16_string_len_in_bytes_max (p, data + len - p); nr_strings++; char **ret2 = realloc (ret, (1 + nr_strings) *...
2004 Oct 17
0
OpenSSH 3.9.1 fix for IRIX 5.3 cc
...quot;, SSH_CIPHER_SSH2, 16, 5, EVP_acss }, + { "acss at openssh.org", SSH_CIPHER_SSH2, 16, 5, (const EVP_CIPHER *(*)(void)) EVP_acss }, #endif { NULL, SSH_CIPHER_INVALID, 0, 0, NULL } }; @@ -415,7 +415,7 @@ Cipher *c = cc->cipher; int plen = 0; - if (c->evptype == EVP_rc4 || c->evptype == EVP_acss) { + if (c->evptype == (const EVP_CIPHER *(*)(void)) EVP_rc4 || c->evptype == (const EVP_CIPHER *(*)(void)) EVP_acss) { plen = EVP_X_STATE_LEN(cc->evp); if (dat == NULL)...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...ward request from %.100s port %d."); + */ + return 0; +} + +/* Jarno Huuskonen: This is called when server receives + * SSH2_MSG_GLOBAL_REQUEST. Handles both "tcpip-forward" and + * "cancel-tcpip-forward" requests. + */ +void +channel_server_global_request(int type, int plen) +{ + char *rtype; + char want_reply; + int success = 0; + + rtype = packet_get_string(NULL); + want_reply = packet_get_char(); + debug("server received: %.100s request (reply=%d)",rtype, + (int)want_reply); + + if ( strcmp(rtype, "tcpip-forward") == 0 ) { + char *address_...
2010 Jul 24
0
[PATCH] chain.c: allocation fixes
...->lba_last - gp->lba_first + 1; /* The length of the hand-over */ - int synth_size = + uint32_t synth_size = sizeof(struct part_entry) + sizeof(uint32_t) + cur_part->private.gpt.size; /* Will point to the partition record length in the hand-over */ uint32_t *plen; /* Allocate the hand-over record */ - record = malloc(synth_size); - if (!record) { + hand_area = malloc(synth_size); + if (!hand_area) { error("Could not build GPT hand-over record!\n"); goto bail; } /* Synthesize the record */ - memset(reco...
2025 Feb 13
4
[PATCH 0/4] [PATCH] Immediately report interactive instructions
From: "Marco Trevisan" <marco at ubuntu.com> This serie of patches have been already submitted via [1], but i'm sending them again to the ML, to see if they can get some more traction. The patches are already part of Ubuntu openssh since 24.04, and they basically allow proper immediate instruction reporting to clients using PAM (as per RFC4256). This follows the approach
2017 Mar 07
0
Potential clue for Bug 16975 - lme fixed sigma - inconsistent REML estimation
...b", "varFunc") val } varWeights.varSum <- function(object) { apply(as.data.frame(lapply(object, varWeights)), 1, function(x){ 1/sqrt(sum((1/x)^2)) }) } Initialize.varSum <- function(object, data, ...) { val <- lapply(object, Initialize, data) attr(val, "plen") <- unlist(lapply(val, function(el) length(coef(el)))) class(val) <- c("varSum","varComb", "varFunc") val } logLik.varSum <- function(object, ...) { lls <- lapply(object, logLik) lls2 <- apply(as.data.frame(lapply(object, varWeights)), 1, fu...
2001 Feb 04
4
next build
> *** openbsd-compat/bsd-nextstep.h.orig Sun Feb 4 00:16:16 2001 > --- openbsd-compat/bsd-nextstep.h Sun Feb 4 00:19:09 2001 > *************** > *** 48,52 **** > --- 48,56 ---- > speed_t cfgetispeed(const struct termios *t); > int cfsetospeed(struct termios *t, int speed); > int cfsetispeed(struct termios *t, int speed); > + > + /* LIMITS */ > + #define
2001 Oct 26
2
Patch to add "warn" value to ForwardX11 and ForwardAgent
...= -1) + *intptr = value; + break; case oUsePrivilegedPort: intptr = &options->use_privileged_port; --- clientloop.c.O Fri Oct 26 11:47:19 2001 +++ clientloop.c Fri Oct 26 13:32:26 2001 @@ -1234,6 +1234,40 @@ } xfree(rtype); } +static void +client_input_agent_open(int type, int plen, void *ctxt) +{ + if (!options.forward_agent) { + deny_input_open(type, plen, ctxt); + return; + } + if (options.forward_agent == 2) { + error("@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@"); + error("@ ssh WARNING: received agent open request from the...
2001 Jul 22
1
[patch] ignore SSH2_MSG_IGNORE packets
Hi, protocolkeepalives sends ssh_msg_ignore, which the ssh2 server handles incorrectly (i.e. it produces some output to syslog, instead of ignoring the packet): Jul 9 11:58:07 ren sshd[16580]: error: Hm, dispatch protocol error: type 32 plen 4 This patch implements a highly advanced function to ignore these packets ;) Matthew -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... Name: msgignore.diff Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/7022ca8e/attach...
2003 Oct 12
4
[PATCH]: Call pam_chauthtok from keyboard-interactive.
Hi All. This patch calls pam_chauthtok() to change an expired password via PAM during keyboard-interactive authentication (SSHv2 only). It is tested on Redhat 8 and Solaris 8. In theory, it should have simply been a matter of calling pam_chauthtok with the PAM_CHANGE_EXPIRED_AUTHTOK flag, it'd only change the password is if it's expired, right? From the Solaris pam_chauthtok man page:
2020 Feb 17
3
sshd crashes
Hi, sshd crashes at below location. After compilation, when I start sshd it crashes in ?sshbuf-misc.c? file inside ?sshbuf_b64tod? function at line size_t plen = strlen(b64); The call trace is as below, Sshd main function -> sshkey_load_public -> sshkey_try_load_public -> sshkey_read -> sshbuf_b64tod During compilation a warning is thrown. Is this the trigger point for the crash? "sshkey.c", : warning #2223-D: function "strndu...
2012 Jul 23
2
[PATCH V2] qemu-xen-traditionnal, Fix dirty logging during migration.
...8_t *buffer, target_phys_addr_t len, int w) {}; #endif /* defined(MAPCACHE) */ diff --git a/i386-dm/exec-dm.c b/i386-dm/exec-dm.c index 96274d9..493146b 100644 --- a/i386-dm/exec-dm.c +++ b/i386-dm/exec-dm.c @@ -820,10 +820,6 @@ void *cpu_physical_memory_map(target_phys_addr_t addr, if ((*plen) > l) *plen = l; #endif - if (xen_logdirty_enable) - xc_hvm_modified_memory(xc_handle, domid, addr >> TARGET_PAGE_BITS, - ((addr + l + TARGET_PAGE_SIZE - 1) >> TARGET_PAGE_BITS) - - (addr >> TARGET_PAGE_BITS)); return...
2000 Jan 19
3
AIX openssh patches
...ern char *optarg; extern int optind; ! #ifdef _AIX ! unsigned long aux; ! #else ! int aux; ! #endif ! int opt, sock_in, sock_out, newsock, i, pid, on = 1; int remote_major, remote_minor; int silentrsa = 0; struct pollfd fds; *************** *** 988,994 **** packet_read_expect(&plen, SSH_CMSG_USER); /* Get the user name. */ ! user = packet_get_string(&ulen); packet_integrity_check(plen, (4 + ulen), SSH_CMSG_USER); /* Destroy the private and public keys. They will no longer be needed. */ --- 993,999 ---- packet_read_expect(&plen, SSH_CMSG_USER);...