search for: timeout_

Displaying 10 results from an estimated 10 matches for "timeout_".

Did you mean: timeout
2020 May 14
1
system(timeout=) may timeout with 0 exit code
...EMERGENCY_TIMEOUT 20 kicked in, adding 20 seconds. I don't have a reproducible example, but following code, and output file below should be enough to ensure that there is a problem there (exit code 0 despite timeout). warn = NULL p = proc.time()[[3L]] tryCatch( ret <- system(cmd, timeout=timeout_s), warning = function(w) { warn <<- w[["message"]] } ) if (length(warn) && ret==0L) cat(sprintf("command '%s' timed out(?) but still exited with 0 code, timeout %ss, took %ss, warning '%s'\n", cmd, timeout_s, proc.time()[[3L]...
2015 May 23
5
Name based SSH proxy
...h-6.6p1/roaming_client.c --- openssh-6.6p1/roaming_client.c.original 2014-01-10 00:58:53.000000000 +0100 +++ openssh-6.6p1/roaming_client.c 2015-05-23 12:58:12.193450191 +0200 @@ -147,7 +147,7 @@ roaming_resume(void) resume_in_progress = 1; /* Exchange banners */ - ssh_exchange_identification(timeout_ms); + ssh_exchange_identification(timeout_ms, ""); packet_set_nonblocking(); /* Send a kexinit message with resume at appgate.com as only kex algo */ diff -up openssh-6.6p1/sshconnect.c.original openssh-6.6p1/sshconnect.c --- openssh-6.6p1/sshconnect.c.original 2015-05-23 11:56:55.2...
2019 Jul 17
1
Re: [PATCH libnbd] examples: Include an example of integrating with the glib main loop.
...| 9 + > examples/Makefile.am | 22 ++ > examples/glib-main-loop.c | 501 ++++++++++++++++++++++++++++++++++++++ > 5 files changed, 535 insertions(+) > Rough review (since I've never used a glib main loop before)... > +static gboolean > +prepare (GSource *sp, gint *timeout_) > +{ > + struct NBDSource *source = (struct NBDSource *) sp; > + > + /* When the NBD handle moves out of the created state (which means > + * that it first has a socket associated with it) we must initialize > + * and register the pollfd. > + */ > + if (!source-&gt...
2019 Jul 15
0
[PATCH libnbd] examples: Include an example of integrating with the glib main loop.
...rom_nbd (struct nbd_handle *nbd) +{ + int dir = nbd_aio_get_direction (nbd); + int r = 0; + + if ((dir & LIBNBD_AIO_DIRECTION_READ) != 0) + r |= G_IO_IN; + if ((dir & LIBNBD_AIO_DIRECTION_WRITE) != 0) + r |= G_IO_OUT; + return r; +} + +static gboolean +prepare (GSource *sp, gint *timeout_) +{ + struct NBDSource *source = (struct NBDSource *) sp; + + /* When the NBD handle moves out of the created state (which means + * that it first has a socket associated with it) we must initialize + * and register the pollfd. + */ + if (!source->poll_registered && !nbd_aio_is_...
2019 Jul 15
2
[PATCH libnbd] examples: Include an example of integrating with the glibc main loop.
** NOT WORKING ** This patch shows how to integrate libnbd and the glib main loop. Posted mainly as a point of discussion as it doesn't quite work yet. Rich.
2019 Jul 17
0
[PATCH libnbd v2] examples: Include an example of integrating with the glib main loop.
...rom_nbd (struct nbd_handle *nbd) +{ + int dir = nbd_aio_get_direction (nbd); + int r = 0; + + if ((dir & LIBNBD_AIO_DIRECTION_READ) != 0) + r |= G_IO_IN; + if ((dir & LIBNBD_AIO_DIRECTION_WRITE) != 0) + r |= G_IO_OUT; + return r; +} + +static gboolean +prepare (GSource *sp, gint *timeout_) +{ + struct NBDSource *source = (struct NBDSource *) sp; + int new_fd; + int events; + + /* The poll file descriptor can change or become invalid at any + * time. + */ + new_fd = nbd_aio_get_fd (source->nbd); + if (source->fd != new_fd) { + if (source->tag != NULL) { + g...
2019 Jul 17
2
[PATCH libnbd v2] examples: Include an example of integrating with glib main loop.
This is working now, and incorporates all of the changes in Eric's review, *except* that it still doesn't retire commands (although this seems to make no obvious difference, except possibly a performance and memory impact). Rich.
2015 May 26
2
Name based SSH proxy
...achieve what I am looking for. diff -up openssh-6.6p1/sshconnect.c.original openssh-6.6p1/sshconnect.c --- openssh-6.6p1/sshconnect.c.original 2015-05-23 11:56:55.235217137 +0200 +++ openssh-6.6p1/sshconnect.c 2015-05-27 01:14:02.563652677 +0200 @@ -560,6 +560,9 @@ ssh_exchange_identification(int timeout_ if (options.protocol == SSH_PROTO_2) { enable_compat20(); send_client_banner(connection_out, 0); + packet_send_ignore(0); + packet_send(); + packet_write_wait(); client_banner_sent = 1; } The question then is, would the security implications of adding these three lines be much wors...
2015 May 26
6
Name based SSH proxy
On 26/05/15 15.50, Daniel Kahn Gillmor wrote: > The argument that the DNS lookup leaks this metadata is a bad argument: > if we followed this line of reasoning, then every problem that has > multiple contributors could never be solved (A says "but my fixing > things is useless if B does nothing", while B says "but my fixing things > is useless if A does nothing"
2020 Feb 04
0
Always Be Conferencing v16e - pure AEL-based dial plan solution
...${type_},,,,,); return; } /* PUBLIC */ /* SMH but IANAL */ macro pngnpbx-abc-tincan(type_) { &pngnpbx-abc-init(${type_},,,,,tincan); return; } /* PUBLIC */ /* The "init" macro (re)sets up several things for the conference room. */ macro pngnpbx-abc-init(type_,record_,conftimeout_,abcid_,announce_,tincan_) { Set(LOCAL(startstamp)=${STRFTIME(,UTC,%F %H:%M:%S.%3q)} UTC); local cnftmt=; DumpChan(5); if( ${LEN(${type_})} > 0 ) { Set(pngnpbx_abc_type=${type_}); } else { Set(pngnpbx_abc_type=default); } Set(CHANNEL(accountcode)=${pngn...