similar to: problem in entropy.c if no getrusage

Displaying 16 results from an estimated 16 matches similar to: "problem in entropy.c if no getrusage"

2000 Nov 02
2
misc. minor patches
I've had these laying about for a while, can't remember whether I sent them before. diff -u openssh-2.1.1p1.orig/entropy.c openssh-2.1.1p1/entropy.c --- openssh-2.1.1p1.orig/entropy.c Wed Jun 7 08:20:23 2000 +++ openssh-2.1.1p1/entropy.c Thu Jun 15 13:58:25 2000 @@ -201,7 +201,9 @@ total_entropy_estimate += stir_gettimeofday(1.0); total_entropy_estimate +=
2006 Mar 02
1
Failing to understand getrusage()
I'm failing to understand how getrusage() works, which is a bit perplexing, because it doesn't seem like it would be terribly complicated. I've attached the code. My aim is to verify that I can use getrusage() to do (admittedly crude) instrumentation of which functions in my program are allocating lots of memory[1]. So I figure I can call getrusage() at various points and look at
2000 May 12
1
Patch: OpenSSH 2.1.0 under Solaris 8, Solaris 7 and other sys tems, too
> -----Urspr?ngliche Nachricht----- > Von: Andre Lucas [SMTP:andre.lucas at dial.pipex.com] > Gesendet am: Freitag, 12. Mai 2000 16:37 > An: Bladt Norbert > Cc: 'Karsten Thygesen'; 'openssh-unix-dev at mindrot.org'; > 'carl at bl.echidna.id.au' > Betreff: Re: Patch: OpenSSH 2.1.0 under Solaris 8, Solaris 7 and > other systems, too > > Well
2003 Jun 22
16
[Bug 600] compilation of ssh-askpass or ssh-rand-helper fails on NCR MP-RAS v3.02
http://bugzilla.mindrot.org/show_bug.cgi?id=600 Summary: compilation of ssh-askpass or ssh-rand-helper fails on NCR MP-RAS v3.02 Product: Portable OpenSSH Version: -current Platform: ix86 OS/Version: other Status: NEW Severity: normal Priority: P2 Component: Build system
2001 Feb 01
0
warnings on aix325
Hi, I'm trying to compile openssh2.3.0p1 on aix3.2.5. Can I ignore this list of warning messages? bsd-bindresvport.c: In function `bindresvport_af': bsd-bindresvport.c:94: warning: implicit declaration of function `bind' bsd-rresvport.c: In function `rresvport_af': bsd-rresvport.c:64: warning: implicit declaration of function `bzero' bsd-rresvport.c:82: warning: implicit
2009 Aug 12
0
Problem with Linux x86_64 RODBC and Netezza (PR#13889)
Full_Name: Kenneth Cater Version: 2.9.1 OS: Linux x86_64 Submission from: (NULL) (171.159.192.10) It appears that R closes my connection to the Netezza device before the Netezza has completed its return of data, below are two files clean_test.log which tracks the systems call made when running the test.r file, and clean_test.out which is the output generated when test.r is executed. Notice how
2023 Jan 14
1
[klibc:time64] resource: Avoid using <linux/resource.h>
Commit-ID: d4ab7343978bbec7141f8462236ba6a47574205f Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=d4ab7343978bbec7141f8462236ba6a47574205f Author: Ben Hutchings <ben at decadent.org.uk> AuthorDate: Sat, 14 Jan 2023 03:15:20 +0100 Committer: Ben Hutchings <ben at decadent.org.uk> CommitDate: Sat, 14 Jan 2023 18:09:28 +0100 [klibc] resource: Avoid using
2000 Jun 20
2
Critical EGD handling in 2.1.1p1
Hi, when running OpenSSH with EGD as entropy source, the sshd server connects to the EGD socket and leaves it open to re-seed on the fly. Unfortunately the connection is not checked when re-seeding, so that a failure or restart of EGD will lead to a "fatal()" abort of the sshd server process. Since a dying server process can not be accepted, I would recommend to not have sshd call it
2000 Jun 12
0
getrusage() privileged on Solaris 2.5.1
The builtin entropy gathering code in OpenSSH 2.1.1p1 tries to use getrusage() if it's available. This function is available on Solaris 2.5.1, but you must have root permissions to run it. However, configure.in uses only AC_CHECK_FUNCS() to look for getrusage, and this only tests for a successful link. For this function you need to do a more thorough check and actually try to run a test
2006 Oct 31
0
6288308 Unintialized struct causes getrusage(3C) to return bogus data
Author: johansen Repository: /hg/zfs-crypto/gate Revision: 975d44f4cb80f31c669fd814d1fdeea15318aa5b Log message: 6288308 Unintialized struct causes getrusage(3C) to return bogus data Files: update: usr/src/uts/common/syscall/rusagesys.c
2001 Feb 16
7
OpenSSH 2.5.0p1
Known issues: 1) Linux 'sleep 20' -- Unfixable before 2.5.0 (known work around) 2) HP/UX signal issue -- Patched and HP/UX 11 works in v2 3) SCO 2/ Native Compiler -- Unfixable before 2.5.0 (known work around) 4) NeXTStep -- Resynced, MAX_GROUPS vs NGROUPS unresolved (not major) 5) DG/UX regcomp/regexec -- Fixed. 6) Cray signal issues -- ??? 7) Solaris '$PATH' issue -- ??
2010 Jul 07
0
[git pull v2] x86_32, sh4, getrusage()
hello hpa, here my birthday submission :) please pull: git pull git://git.debian.org/users/maks/klibc.git maks Sam fixed a longstanding x86_32 build bug, thus it seems a good time to flush the queue of the piled up patches, the shortlog tells it: Aurelien Jarno (1): [klibc] sh4: syscalls fixes Benjamin Cama (1): [klibc] fstype: btrfs size endianness fix Mike Waychison (2):
2010 Oct 04
0
Python resource module returns just zeros
I'm using a call to the resource module's getrusage method. On openSUSE this works, on CentOS [python26-2.6.5-3.el5] it 'works' but just returns zeros for the memory utilization values. resource.getrusage(resource.RUSAGE_SELF).ru_maxrss openSUSE: returns 5512 CentOS: returns 0 Anyone know what condition causes this? Or is there a better / more-reliable way to check memory
2006 Mar 17
1
[PATCH] OpenSSL RNG initialization
Hi, dovecot tries to use OpenSSL's PRNG to generate random numbers if there is no /dev/urandom found. Unfortunately, it is flawed in its present form, since the PRNG is not seeded before RAND_bytes() is called in src/lib/randgen.c (on systems which have /dev/urandom, OpenSSL automatically seeds its PRNG from the urandom device). Here's a patch to address this issue: it tries to seed
2000 Aug 25
1
[patch] configurable ssh_prng_cmds
The following patch against openssh-SNAP-20000823 allows to override the compile-time "ssh_prng_cmds" file at run time by adding new options to the server and client configurations. (We move binaries around a bit, and this was the only absolute path that couldn't be fixed at run-time). Regards Jan diff -ur openssh-SNAP-20000823.orig/entropy.c openssh-SNAP-20000823.new/entropy.c
2002 Aug 10
3
ext3_readdir error
Hi, I am getting the following errors on /boot partition on a production server running 2.4.18 kernel. ------------- Aug 10 00:19:37 kernel: EXT3-fs error (device sd(8,1)): ext3_readdir: bad entry in directory #2: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, name_len=0 ------------- /boot is not readable at all and attempt to do an ls will return the same error.