Skip to content

Instantly share code, notes, and snippets.

View fredemmott's full-sized avatar

Fred Emmott fredemmott

View GitHub Profile
diff --git a/./openxr-tracing-old/gen/include/OXRTracing/forward_declarations.gen.hpp b/./openxr-tracing/gen/include/OXRTracing/forward_declarations.gen.hpp
index 0919d9a..0b9a590 100644
--- a/./openxr-tracing-old/gen/include/OXRTracing/forward_declarations.gen.hpp
+++ b/./openxr-tracing/gen/include/OXRTracing/forward_declarations.gen.hpp
@@ -252,6 +252,24 @@ extern PFN_xrGetEyeGazesFB next_xrGetEyeGazesFB;
extern PFN_xrPassthroughLayerSetKeyboardHandsIntensityFB
next_xrPassthroughLayerSetKeyboardHandsIntensityFB;
extern PFN_xrGetDeviceSampleRateFB next_xrGetDeviceSampleRateFB;
+extern PFN_xrCreateVirtualKeyboardMETA next_xrCreateVirtualKeyboardMETA;
+extern PFN_xrDestroyVirtualKeyboardMETA next_xrDestroyVirtualKeyboardMETA;
diff --git a/./openxr-tracing-old/gen/include/OXRTracing/forward_declarations.gen.hpp b/./openxr-tracing/gen/include/OXRTracing/forward_declarations.gen.hpp
index 0919d9a..0b9a590 100644
--- a/./openxr-tracing-old/gen/include/OXRTracing/forward_declarations.gen.hpp
+++ b/./openxr-tracing/gen/include/OXRTracing/forward_declarations.gen.hpp
@@ -252,6 +252,24 @@ extern PFN_xrGetEyeGazesFB next_xrGetEyeGazesFB;
extern PFN_xrPassthroughLayerSetKeyboardHandsIntensityFB
next_xrPassthroughLayerSetKeyboardHandsIntensityFB;
extern PFN_xrGetDeviceSampleRateFB next_xrGetDeviceSampleRateFB;
+extern PFN_xrCreateVirtualKeyboardMETA next_xrCreateVirtualKeyboardMETA;
+extern PFN_xrDestroyVirtualKeyboardMETA next_xrDestroyVirtualKeyboardMETA;
|-------------- 200ms --------------|
90hz | | | | | | | | | | | | | | | | | | |
72hz |🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡|
60hz | | | | | | | | | | | | |
45hz | | | | | | | | | |
30hz | | | | | | |
10hz | | |
TIme\now(): mono
Time\now_unix() unix
mono - not guaranteed to be comparable between machines?
… vs …
DateTime::getTimestamp() - unix? would expect mono for consistency with now()
Naming: Timestamp vs timepoint. ‘timestamp’ can imply unix
diff --git a/src/injectables/OculusD3D11Kneeboard.cpp b/src/injectables/OculusD3D11Kneeboard.cpp
index 91102f0..a95a1eb 100644
--- a/src/injectables/OculusD3D11Kneeboard.cpp
+++ b/src/injectables/OculusD3D11Kneeboard.cpp
@@ -19,6 +19,7 @@
*/
#include "OculusD3D11Kneeboard.h"
+#include <DIrectXTK/SpriteBatch.h>
#include <OVR_CAPI_D3D.h>
$ hhvm test.hack
Hello, world.
$ echo $?
0
$ hhvm test.hack > /dev/full
Fatal error: Uncaught exception 'HH\Lib\OS\ErrnoException' with message 'ENOSPC(28): Errno 28: No space left on device' in /tmp/test.hack:5
Stack trace:
#0 (): Closure$HH\Lib\_Private\_OS\get_throw_errno_impl#4()
#1 (): HH\Lib\_Private\_OS\throw_errno()
@fredemmott
fredemmott / aaa-individual-cla.md
Last active February 20, 2022 21:47
OpenKneeboard CLA

Individual Contributor Non-Exclusive License Agreement

Thank you for your interest in contributing to Frederick Emmott's OpenKneeboard ("We" or "Us").

The purpose of this contributor agreement ("Agreement") is to clarify and document the rights granted by contributors to Us. To make this document effective, please follow the instructions at https://github.com/fredemmott/OpenKneeboard/blob/master/CONTRIBUTING.md.

How to use this Contributor Agreement

If You are an employee and have created the Contribution as part of your employment, You need to have Your employer approve this Agreement or sign the Entity version of this document. If You do not own the Copyright in the entire work of authorship, any other author of the Contribution should also sign this – in any event, please contact Us at openkneeboard-cla@fred.fredemmott.com

$ hhvm test.hack
Constructed leaker
Constructed main
Disposed main
In member function reading instance property from main
$
Script:
declarations:
NodeList[4]:
0:
MarkupSection:
hashbang:
HashbangToken:
leading: NodeList[0]:
text: '#!/usr/bin/env hhvm'
trailing: NodeList[1]: 0: EndOfLine:

Binary Handshake Protocol

This protocol provides authentication and initializes stream encryption for later protocols.

  1. server confirms the client knows the password (don't allow random people to start broadcasting your webcam to the internet)
  2. client confirms the server knows the password (probably not neccessary for this case, but why not)
  3. establish a secure client-to-server stream
  4. establish a secure server-to-client stream
  5. be replay-resistent, both for servers and clients (don't allow someone who sniffed your wifi to start broadcasting your webcam to the internet)