search for: request_typ

Displaying 20 results from an estimated 20 matches for "request_typ".

Did you mean: request_type
2019 Oct 10
1
[PATCH NOT WORKING nbdkit] vddk: Restructure plugin to allow greater parallelism.
We had a query yesterday about the VDDK plugin and making it actually obey the weird "Multithreading Considerations" rules in the VDDK documentation (https://vdc-download.vmware.com/vmwb-repository/dcr-public/8f96698a-0e7b-4d67-bb6c-d18a1d101540/ef536a47-27cd-481a-90ef-76b38e75353c/vsphere-vddk-671-programming-guide.pdf) This patch is my attempt to implement this. The idea is that the
2019 Oct 11
3
[PATCH NOT WORKING nbdkit v2 0/2] vddk: Restructure plugin to allow greater parallelism.
This is my second attempt at this. The first version (also not working) was here: https://www.redhat.com/archives/libguestfs/2019-October/msg00062.html In part 1/2 I introduce a new .ready_to_serve plugin method which is called after forking and just before accepting any client connection. The idea would be that plugins could start background threads here. However this doesn't work well in
2007 Apr 30
2
has_many :through polymorphic
...#39;transactions.transaction_id'' in ''on clause'' It generates the following SQL (which appears to be incorrect): SELECT postings.* FROM postings INNER JOIN transactions ON postings.id = transactions.transaction_id WHERE ((transactions.request_id = 14) AND (transactions.request_type = ''PickAndPackRequest'')) The "ON" clause appears to be wrong, I would have thought it would be: ON postings.transaction_id = transaction.id Can anybody point out what I''m doing wrong, because I''m stumped! Cheers Matthew. --~--~---------~--~-...
2018 Jan 10
1
[PATCH 1/6] Documentation: crypto: document crypto engine API
...ment > +----------- > +You have to put at start of your tfm_ctx the struct crypto_engine_reqctx > +struct your_tfm_ctx { > + struct crypto_engine_reqctx enginectx; > + ... > +}; > +Why: Since CE manage only crypto_async_request, it cannot know the underlying > +request_type and so have access only on the TFM. > +So using container_of for accessing __ctx is impossible. > +Furthermore, the crypto engine cannot know the "struct your_tfm_ctx", > +so it must assume that crypto_engine_reqctx is at start of it. > + > +Order of operations > +-----...
2000 Aug 15
0
Experimental -R support patch for openssh client
...konen: + * ssh2 + * This called after client has received SSH2_MSG_GLOBAL_REQUEST/ + * "forwarded-tcpip". + * Checks if creating the channel is ok. And connects to required host. + * returns new channel if OK or NULL for failure. + */ +Channel* +client_forwarded_tcpip_request(const char *request_type, int rchan, + int rwindow, int rmaxpack) +{ + Channel* c = NULL; + int sock; + char *connected_address; /* Remote address that is listening for the + connection */ + int connected_port; /* Remote port connected */ + + char* client_address; /* Client that connec...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...= listen_port; + num_permitted_opens++; + } +} + +/* Jarno Huuskonen: + * This gets called after ssh client has received + * SSH2_MSG_GLOBAL_REQUEST type "forwarded-tcpip". + * + * returns new channel if OK or NULL for failure. + */ +Channel* +client_forwarded_tcpip_request(const char *request_type, int rchan, + int rwindow, int rmaxpack) +{ + Channel* c = NULL; + int sock; + char *listen_address; /* Remote (server) address that is listening + for the connection */ + int listen_port; + char* originator_address; /* Address of the client connecting to + list...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...= listen_port; + num_permitted_opens++; } } +/* Jarno Huuskonen: + * This gets called after ssh client has received + * SSH2_MSG_GLOBAL_REQUEST type "forwarded-tcpip". + * + * returns new channel if OK or NULL for failure. + */ +Channel* +client_forwarded_tcpip_request(const char *request_type, int rchan, + int rwindow, int rmaxpack) +{ + Channel* c = NULL; + int sock; + char *listen_address; /* Remote (server) address that is listening + for the connection */ + int listen_port; + char* originator_address; /* Address of the client connecting to +...
2007 Jul 21
2
tincctl patches
(Second try to send this. I wonder if the first one gotten eaten by a spam filter; I'll link to patches instead of attaching them.) Here are the tincctl patches I've been working on. They apply to http://www.tinc-vpn.org/svn/tinc/branches/1.1@1545. I intend to commit them once the crypto stuff's fixed. Since they're basically done, I'm emailing them now for review and in case
2007 Dec 11
14
Attachment-fu + Story Runner
Hi all, I''m trying to run a Story Runner integration test that uploads a file through Attachment-fu. I''ve tried various ways of specifying the file data, from custom mocks: class MockFile < Struct.new (:original_filename, :read, :content_type); end fdata = MockFile.new "test_upload.txt", "Test Upload", "text/plain" to
2018 Jan 03
0
[PATCH 1/6] Documentation: crypto: document crypto engine API
...), is a crypto queue manager. + +Requirement +----------- +You have to put at start of your tfm_ctx the struct crypto_engine_reqctx +struct your_tfm_ctx { + struct crypto_engine_reqctx enginectx; + ... +}; +Why: Since CE manage only crypto_async_request, it cannot know the underlying +request_type and so have access only on the TFM. +So using container_of for accessing __ctx is impossible. +Furthermore, the crypto engine cannot know the "struct your_tfm_ctx", +so it must assume that crypto_engine_reqctx is at start of it. + +Order of operations +------------------- +You have to ob...
2011 Jul 07
0
Rails3 Mailer html / text versions order
...9;another_template'' } end end MY USER MAILER ======= def analysis_received(user_id, clip_id, request_id) ...... skipped lines ...... @template = "user_mailer/#{I18n.locale.to_s}/ analysis_received.erb" mail(:to => @user[:email], :subject => "#{@request_type.capitalize}") do |format| format.html { render :template => @template } format.text {render :layout => false, :template => @template} end end end -- You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk&q...
2001 Oct 24
2
disable features
...s/cvs/ssh/clientloop.c,v retrieving revision 1.84 diff -u -r1.84 clientloop.c --- clientloop.c 11 Oct 2001 15:24:00 -0000 1.84 +++ clientloop.c 22 Oct 2001 18:23:38 -0000 @@ -1042,6 +1042,7 @@ quit_pending = 1; } +#ifdef WITH_TCPFWD static Channel * client_request_forwarded_tcpip(const char *request_type, int rchan) { @@ -1078,7 +1079,9 @@ xfree(listen_address); return c; } +#endif /* WITH_TCPFWD */ +#ifdef WITH_X11FWD static Channel* client_request_x11(const char *request_type, int rchan) { @@ -1118,7 +1121,9 @@ c->force_drain = 1; return c; } +#endif /* WITH_X11FWD */ +#ifde...
2007 Oct 18
0
[PATCH] Use credentials and permissions on control socket where available
...< 0) { logger(LOG_ERR, _("Can't bind to %s: %s\n"), controlsocketname, strerror(errno)); close(control_socket); diff --git a/src/control_common.h b/src/control_common.h index 0975826..6384651 100644 --- a/src/control_common.h +++ b/src/control_common.h @@ -41,6 +41,7 @@ enum request_type { /* This greeting is sent by the server on socket open. */ typedef struct tinc_ctl_greeting_t { int version; + pid_t pid; } tinc_ctl_greeting_t; /* A single request or response header. */ diff --git a/src/tincctl.c b/src/tincctl.c index 7e08629..6aa1e3e 100644 --- a/src/tincctl.c +++ b/sr...
2019 Mar 29
2
Call for testing: OpenSSH 8.0
...pkt_send(ssh)) != 0 || (r = ssh_packet_write_wait(ssh)) != 0) - fatal("%s: %s", __func__, ssh_err(r)); + fatal("%s: send disconnect: %s", __func__, ssh_err(r)); channel_free_all(ssh); @@ -1502,7 +1502,7 @@ client_request_forwarded_tcpip(struct ssh *ssh, const char *request_type, (r = sshpkt_get_cstring(ssh, &originator_address, NULL)) != 0 || (r = sshpkt_get_u32(ssh, &originator_port)) != 0 || (r = sshpkt_get_end(ssh)) != 0) - fatal("%s: %s", __func__, ssh_err(r)); + fatal("%s: parse packet: %s", __func__, ssh_err(r));...
2007 Oct 18
0
[PATCH] Use a control socket directory to restrict access
...cket != -1) { + close(control_socket); + control_socket = -1; + } + chdir("/"); + return false; } void exit_control() { diff --git a/src/control_common.h b/src/control_common.h index 0975826..6384651 100644 --- a/src/control_common.h +++ b/src/control_common.h @@ -41,6 +41,7 @@ enum request_type { /* This greeting is sent by the server on socket open. */ typedef struct tinc_ctl_greeting_t { int version; + pid_t pid; } tinc_ctl_greeting_t; /* A single request or response header. */ diff --git a/src/tincctl.c b/src/tincctl.c index 7e08629..f46a643 100644 --- a/src/tincctl.c +++ b/sr...
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up a tunnel using ssh, e.g.: ssh -f -o Tunnel=ethernet <server_ip> true I was wondering if there's a way to subsequently acquire the names of the local and remote tun/tap interfaces (e.g., using the default "-w any:any") for subsequent automatic tunnel configuration, e.g.: ip link set $TapDev up ip link set
2018 Jan 03
11
[PATCH 0/6] crypto: engine - Permit to enqueue all async requests
Hello The current crypto_engine support only ahash and ablkcipher request. My first patch which try to add skcipher was Nacked, it will add too many functions and adding other algs(aead, asymetric_key) will make the situation worst. This patchset remove all algs specific stuff and now only process generic crypto_async_request. The requests handler function pointer are now moved out of struct
2018 Jan 26
10
[PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
Hello The current crypto_engine support only ahash and ablkcipher request. My first patch which try to add skcipher was Nacked, it will add too many functions and adding other algs(aead, asymetric_key) will make the situation worst. This patchset remove all algs specific stuff and now only process generic crypto_async_request. The requests handler function pointer are now moved out of struct
2018 Jan 26
10
[PATCH v2 0/6] crypto: engine - Permit to enqueue all async requests
Hello The current crypto_engine support only ahash and ablkcipher request. My first patch which try to add skcipher was Nacked, it will add too many functions and adding other algs(aead, asymetric_key) will make the situation worst. This patchset remove all algs specific stuff and now only process generic crypto_async_request. The requests handler function pointer are now moved out of struct
2019 Mar 27
26
Call for testing: OpenSSH 8.0
Hi, OpenSSH 8.0p1 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is also available via git using the instructions at