search for: uchar

Displaying 20 results from an estimated 101 matches for "uchar".

Did you mean: char
2020 May 24
3
[PATCH] file_checksum() optimization
...; + buf = map_file(fd, len, MAX_MAP_SIZE, CHUNK_SIZE); switch (checksum_type) { case CSUM_MD5: { @@ -302,8 +302,8 @@ void file_checksum(const char *fname, const STRUCT_STAT *st_p, char *sum) MD5_Init(&m5); - for (i = 0; i + CSUM_CHUNK <= len; i += CSUM_CHUNK) - MD5_Update(&m5, (uchar *)map_ptr(buf, i, CSUM_CHUNK), CSUM_CHUNK); + for (i = 0; i + CHUNK_SIZE <= len; i += CHUNK_SIZE) + MD5_Update(&m5, (uchar *)map_ptr(buf, i, CHUNK_SIZE), CHUNK_SIZE); remainder = (int32)(len - i); if (remainder > 0) @@ -319,8 +319,8 @@ void file_checksum(const char *fname, const STRU...
2002 Feb 13
1
x509 test patch - can't compile
...with prototype: prototype: pointer to uint : "./key.h", line 75 argument : pointer to int "key.c", line 501: warning: argument #3 is incompatible with prototype: prototype: pointer to char : "./uuencode.h", line 29 argument : pointer to uchar "key.c", line 679: warning: argument #2 is incompatible with prototype: prototype: pointer to const char : "./buffer.h", line 33 argument : pointer to uchar "key.c", line 741: warning: improper pointer/integer combination: arg #2 "key.c", line...
2008 Oct 22
1
BUG: Bad passwords from Vampire / NT migration
> 3. The only evidence of any problem from the vampire command is the > events logged on the PDC, and the invalid passwords. I tried > deleting the trust account on the PDC and rejoining several times, > with Samba on, off, and nmbd on and off. The result is always the > same. The bad password hashes are always the same for each account. > If I change a password on the PDC
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...DIGEST_LEN; default: /* paranoia to prevent missing case values */ exit_cleanup(RERR_UNSUPPORTED); } @@ -121,30 +128,48 @@ uint32 get_checksum1(char *buf1, int32 len) return (s1 & 0xffff) + (s2 << 16); } +static void get_checksum2_lib(void *buf, int32 len, void *sum) +{ + uchar seedbuf[4]; + MDLIB_MD_CTX *mdctx; + + mdctx = mdlib_new_ctx(); + if (!mdctx) + out_of_memory("get_checksum2"); + + if (xfersum_type == CSUM_MD5) + mdlib_init_md5(mdctx); + else if (xfersum_type == CSUM_SHA1) + mdlib_init_sha1(mdctx); + else + out_of_memory("wrong checksum")...
2002 Apr 18
5
mixed case file systems.
I am having trouble with rsync when I am trying to synchronize a Windows NT volume mounted with smb_fs (FreeBSD) and a unix volume which is also exported with Samba. There are instances where the DOS short name on the NT volume ends up as upper case and then doesn't match filenames which are used in the unix volumes which have been exported by Samba. I don't know if this is a Samba
2005 May 24
1
rsync incorrectly deletes files ?
rsync -e 'ssh -x' --log-format="%o /%n %b" -tLr --delete --files-from=files-to-sync --exclude-from=files-to-exclude user@host:/ /temp/ del. /etc/mail/spamfilter/mx1/whitelist.conf 0 del. /etc/mail/spamfilter/mx1/blacklist.conf 0 recv /etc/mail/spamfilter/mx1/ 0 recv /etc/mail/spamfilter/mx1/blacklist.conf 211 recv /etc/mail/spamfilter/mx1/whitelist.conf 924 Why does rsync
2024 Oct 08
0
Question: Is CAREFUL_ALIGNMENT=1 needed for rsync on RISC-V
...| defined __i486__ || defined __i586__ || defined __i686__ || __amd64 #define CAREFUL_ALIGNMENT 0 #endif #ifndef CAREFUL_ALIGNMENT #define CAREFUL_ALIGNMENT 1 #endif ``` Thus, when copying 4-bit integers (just an example), rsync uses direct copies on x86: ```c static inline uint32 IVALu(const uchar *buf, int pos) { ?? ?union { ?? ???? const uchar *b; ?? ???? const uint32 *num; ?? ?} u; ?? ?u.b = buf + pos; ?? ?return *u.num; } ``` On RISC-V (and any other architectures), it copies bytes one by one: ```c static inline uint32 IVALu(const uchar *buf, int pos) { ?? ?return UVAL(buf, pos)...
2005 Oct 09
0
Fw: problem in encoder/decoder
...sult+encoded_bytes ,lenbytes,1); encoded_bytes++; CopyMemory(result+encoded_bytes ,encodedstr,nbBytes); encoded_bytes+= nbBytes; } // save again to message buffer if(pMsg->m_pBuffer != NULL) { delete pMsg->m_pBuffer; pMsg->m_pBuffer = NULL; } pMsg->m_pBuffer = new UCHAR[encoded_bytes]; CopyMemory(pMsg->m_pBuffer,result,encoded_bytes); pMsg->m_nBufferSize = encoded_bytes; // destroy and free resources... speex_bits_destroy(&bits); speex_encoder_destroy(enc_state); delete[] result; delete[] input_frame ; delete[] encodedstr; result = N...
2005 Apr 25
2
How about a --min-size option, next to --max-size
There's a rather old bug report in Debian's bug tracking system (see http://bugs.debian.org/27126) about wanting to be able to specify the maximum file size, as well as the minimum file size. Here's the text: Sometimes, it's useful to specify a file size range one is interested in. For example, I'd like to keep an up-to-date mirror of Debian, but I currently
2007 Apr 18
1
How to call stored procedure on iodbc
...returnVal = SQLBindParameter(hstmt, 1, SQL_PARAM_OUTPUT, SQL_C_SLONG, SQL_INTEGER, 0,0, &returnCode,0, &bindReturnCode); //strcpy(sqlString,"{call PI_ShBlobData (?, 0, 0, 0, EMPTY_BLOB(), null)}"); returnVal = SQLExecDirectA(hstmt, (UCHAR*)sqlString, SQL_NTS); refPk = returnCode; bRetVal = true; ptrDB->CommitTrans(); } SQLFreeStmt(hstmt, SQL_DROP); Thanks for help in advance. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Ruby...
1999 Apr 25
0
swat: bug located
...rust_account, BOOL add_user, BOOL enable_user, BOOL disable_user, BOOL set_no_password, char *new_passwd, char *err_str, size_t err_str_len, char *msg_str, size_t msg_str_len) { struct passwd *pwd; void *vp; struct smb_passwd *smb_pwent; uchar new_p16[16]; uchar new_nt_p16[16]; *err_str = '\0'; *msg_str = '\0'; pwd = getpwnam(user_name); /* * Check for a machine account. */ if(trust_account && !pwd) { slprintf(err_str, err_str_len - 1, "User %s does...
1998 Mar 12
0
Code to check Password Server Group Memberships
...involves opening pipes and allot of non intuitive packets. I just haven't had the time to try to figure out how they work. If someone knows the breakdown, I would try to code some other possibly nice features in. Clay L Jones /* Some bytes to be copied into the get grouplist request */ uchar gpipe[] = { 0x1A, /* Unsure what this should be, I have seen 1A and F0 */ '\\', 0, 'P', 0, 'I', 0, 'P', 0, 'E', 0, '\\', 0, 'L', 0, 'A', 0, 'N', 0, 'M', 0,...
1999 Apr 25
0
swat core dump and debug information
...trust_account, BOOL add_user, BOOL enable_user, BOOL disable_user, BOOL set_no_password, char *new_passwd, char *err_str, size_t err_str_len, char *msg_str, size_t msg_str_len) { struct passwd *pwd; void *vp; struct smb_passwd *smb_pwent; uchar new_p16[16]; uchar new_nt_p16[16]; *err_str = '\0'; *msg_str = '\0'; pwd = getpwnam(user_name); /* * Check for a machine account. */ if(trust_account && !pwd) { slprintf(err_str, err_str_len - 1, "User %s does not...
2002 Aug 05
5
[patch] read-devices
...ecksum_seed = 0; extern int remote_version; +extern int read_devices; /* a simple 32 bit checksum that can be upadted from either end (inspired by Mark Adler's Adler-32 checksum) @@ -73,43 +74,40 @@ for(i = 0; i + CSUM_CHUNK <= len; i += CSUM_CHUNK) { mdfour_update(&m, (uchar *)(buf1+i), CSUM_CHUNK); } - if (len - i > 0) { + if (len - i > 0) { /* make this ">=" to address http://lists.samba.org/pipermail/rsync/2002-August/008011.html */ mdfour_update(&m, (uchar *)(buf1+i), (len-i)); } mdfour_result(&m, (uchar *)sum); } -void...
2012 Jun 09
2
[patch] NFSv4/ZFS ACLs
This is a PoC patch for NFSv4/ZFS ACLs. The objective of the patch is that rsync --acls support NFSv4/ZFS ACLs without requiring a new command line option NFSv4 ACLs can't be represented using POSIX draft ACLs, if an NFSv4 ACL is present a separate POSIX draft ACL will not be present and there are new APIs to access NFSv4 ACLs. So we need to distinguish between NFSv4 ACLs and POSIX ACLs in
2006 Sep 29
4
[PATCH 4/6] xen: export NUMA topology in physinfo hcall
...est(u_sysctl, sysctl, 1) ) ret = -EFAULT; } diff -r 6f3c6fb05af3 xen/include/public/arch-x86_32.h --- a/xen/include/public/arch-x86_32.h Mon Sep 11 13:45:23 2006 -0500 +++ b/xen/include/public/arch-x86_32.h Mon Sep 11 13:45:23 2006 -0500 @@ -48,6 +48,7 @@ __DEFINE_XEN_GUEST_HANDLE(uchar, unsigne __DEFINE_XEN_GUEST_HANDLE(uchar, unsigned char); __DEFINE_XEN_GUEST_HANDLE(uint, unsigned int); __DEFINE_XEN_GUEST_HANDLE(ulong, unsigned long); +__DEFINE_XEN_GUEST_HANDLE(u64, uint64_t); DEFINE_XEN_GUEST_HANDLE(char); DEFINE_XEN_GUEST_HANDLE(int); DEFINE_XEN_GUEST_HANDLE(long); dif...
2012 Sep 11
4
[PATCH] x86: retrieve keyboard shift status flags from BIOS
Recent Linux tries to make use of this, and has no way of getting at these bits without Xen assisting it. There doesn''t appear to be a way to obtain the same information from UEFI. Signed-off-by: Jan Beulich <jbeulich@suse.com> --- a/xen/arch/x86/boot/trampoline.S +++ b/xen/arch/x86/boot/trampoline.S @@ -184,11 +184,16 @@ trampoline_boot_cpu_entry: * 1. Get memory map.
2004 Feb 25
3
[patch] Correct configure test for sin_len to compile on Tru64 Unix
The last versions of rsync fail to compile on Tru64 Unix (alpha), because of a typo in configure.in. The problem is that the code in configure check for sockaddr.sa_len, while the code uses sockaddr.sin_len. This patch fixes the problem. Please include it in the next version of rsync. diff -ur src-2.6.0/configure.in src-2.6.0-local/configure.in --- src-2.6.0-local/configure.in
2004 May 04
5
Microsoft hotfix MS04-011, breaks Samba password change.
Hi all, I wanted to give an update on this as I know this MS Hotfix is critical and must be applied to protect against the (latest) Microsoft worm. I think I've found the problem in the code, and am currently testing a fix for this (not in the release to others to test stage yet). As soon as I'm reasonably confident I'll put a patch out there for others to test, and we'll
2016 Jan 22
3
[cfe-dev] [3.8 Release] RC1 has been tagged
...izer.getpwent_r > SanitizerCommon-Unit :: > Sanitizer-x86_64-Test/SanitizerLinux.ThreadDescriptorSize > ThreadSanitizer :: Linux/mutex_robust.cc > ThreadSanitizer :: Linux/mutex_robust2.cc > ThreadSanitizer :: thread_name2.cc > libc++ :: std/depr/depr.c.headers/uchar_h.pass.cpp > This is caused because the system does not provide a uchar.h header. > libc++ :: > std/localization/locale.categories/category.time/locale.time.get.byname/get_monthname.pass.cpp > libc++ :: > std/localization/locale.categories/category.time/locale.time.get.byn...