Author Archives: daveti

Unknown's avatar

About daveti

Interested in kernel hacking, compilers, machine learning and guitars.

Auth Lib – with DH Key Exchange Algorithm, MD5 Digest Algorithm and Helper APIs

Finally, I’ve got time to summaries the authentication work I’ve done for MGC:) This post gives a useful C lib on authentication focusing on DH key exchange algorithm and MD5 digest helper APIs. Please note this lib should be built/used … Continue reading

Posted in Dave's Tools, Programming | Tagged , , , , | Leave a comment

Bug in g++ 3.X – invalid operands of types `A&’ and `int’ to binary `operator!=’

I am not sure if there is a bug declaration for g++ 3.X (have not checked the doc yet). On the other hand, g++ 4.X, however, could compile the example code below silently. Anyway, seems for g++ 3.X, reference operator … Continue reading

Posted in Programming, Stuff about Compiler | Tagged , | 1 Comment

Random in Shell

This post introduces the ‘$RANDOM’ in Shell including Ksh, Bash and Zsh and gives 2 examples using random processing in Shell. May it help:) 1. Number sequence random order generator # # Number sequence random order generator – nsrog # … Continue reading

Posted in Programming | Tagged , | Leave a comment

Something about Coverity Modeling – for a friend’s question

This post is focusing on general idea of Coverity Modeling based on Coverity 4.5.1 and Coverity 5.4.1 including why and how to do Coverity Modeling. Of course, Coverity official document would always be a good reference to start with. More … Continue reading

Posted in Stuff about Compiler | Tagged | 1 Comment

Encounter – 2/4 of being flawless

This may be my favorite song written all by myself, for  someone I’ve met on someday, for me and my shadow. Wonder if the wheels of fate have been started. Anyway, like Dr House said, “All people’s dying except the … Continue reading

Posted in Music Prose | Tagged , | 1 Comment

Diffie-Hellman key exchange algorithm – deeper and better

In my last post on D-H algorithm (http://daveti.blog.com/2011/04/21/diffiehellman-key-exchange-dh-algorithm-in-c/), we talked about 2 implementation using C. However, I’ve been thinking about one thing here these days – if there is any potential integer overflow risk in both functions (though for unsigned … Continue reading

Posted in Programming | Tagged , , , | Leave a comment

Diffie–Hellman key exchange (DH algorithm in C)

I am recently doing feature on authentication between MGC (Media Gateway Controller) and MG (Media Gateway). One important thing involved in Diffie-Hellman key exchange. Not sure if because the key formula ‘g^a mod(P)’ looks simple and stupid, it is hard … Continue reading

Posted in Programming | Tagged , , | 2 Comments

smell of mango

Smell of rain, smell of the city, smell of somebody, smell of the memory…… Name: Smell of Mango Tune: Am Music: Dave Solo:  Dave Rhythm: Dave Record: Dave Equipment: an unnamed classical guitar with steel strings, Lenovo ThinkPad T61 internal … Continue reading

Posted in Music Prose | Tagged | 2 Comments

IA 32 CPU architecture – NetBurst

Please kindly note that the picture below takes a great reference from the book ‘Professional Assembly Language’ by Richard Blum – which is a very practical book and my first book on assembly programming. The other very useful and important … Continue reading

Posted in OS, Programming | Tagged , , | Leave a comment

x86 assembly programming with GNU – tool tips

1. coding pattern # Pattern used by as and ld .section .data < initialized data here> .section .bss < uninitialized data here> .section .text .globl _start _start: < instruction code here> ———————————- # Pattern used by gcc .section .data < … Continue reading

Posted in Programming | Tagged , , , , , , , , | Leave a comment