NOTE: the content is out-of-date. All development is moved to the https://github.com/yurydelendik/wasmception
# locations, e.g.
export WORKDIR=~/llvmwasm; mkdir -p $WORKDIR
export INSTALLDIR=$WORKDIR
#include <functional> | |
namespace functional { | |
template <typename Function> struct function_traits; | |
template <typename ClassType, typename ReturnType, typename... Args> | |
struct function_traits<ReturnType(ClassType::*)(Args...) const> { | |
using function = const std::function<ReturnType(Args...)>; | |
}; |
NOTE: the content is out-of-date. All development is moved to the https://github.com/yurydelendik/wasmception
# locations, e.g.
export WORKDIR=~/llvmwasm; mkdir -p $WORKDIR
export INSTALLDIR=$WORKDIR
#include <unistd.h> | |
static int redirect_nslog(const char *prefix, const char *buffer, int size) | |
{ | |
NSLog(@"%s (%d bytes): %.*s", prefix, size, size, buffer); | |
return size; | |
} | |
static int stderr_redirect_nslog(void *inFD, const char *buffer, int size) | |
{ |
/* | |
Also, need to change in ILI9341pal.js: | |
var LCD_WIDTH = 320; | |
var LCD_HEIGHT = 240; | |
*/ | |
BTN1 = D39 | |
BTN2 = D38 | |
BTN3 = D37 | |
SPKR = D25 |
Recently, news broke about a new possible offline attack on WPA2 using PMKID. To summarize the attack, WPA2 protected APs can end up broadcasting PMKID values which can then be used to offline-brute-force the password.
These PMKID values are computed this way:
PMKID = HMAC-SHA1-128(PMK, "PMK Name" | MAC_AP | MAC_STA)
// Tails has grown a bit and moved out into its own repository: https://github.com/snej/tails/ | |
// Please visit it there! | |
// | |
// If you want to see the tiny original version from May Forth 2021, it's still here; | |
// click the "Revisions" button above, or go to: | |
// https://gist.github.com/snej/9ba59d90689843b22dc5be2730ef0d49/2d55f844b7622aa117b9275bbc9d189613f7ff7f |