Skip to content

Instantly share code, notes, and snippets.

Avatar

Wataru Ashihara wataash

View GitHub Profile
View lr_peg.py
"""
http://www.vpri.org/pdf/tr2007002_packrat.pdf
Packrat Parsers Can Support Left Recursion
"""
import dataclasses
import enum
import typing as t
View compile_commands.json
[
{
"arguments": [
"gcc",
"-c",
"-Wp,-MMD,drivers/tty/vt/.vt.o.d",
"-nostdinc",
"-isystem",
"/usr/lib/gcc/x86_64-linux-gnu/9/include",
"-I/home/wsh/qc/linux/arch/x86/include",
@wataash
wataash / linux-esp-decryption.hs
Last active Sep 1, 2020
linux L2TP/IPsec ESP decryption
View linux-esp-decryption.hs
$ sudo ip xfrm state
info for localremote direction IPsec tunnel(ESP)
src 192.168.0.2 dst 10.0.0.1
proto esp spi 0xaaaaaaaa reqid 1 mode transport
replay-window 0
auth-trunc hmac(sha1) 0xbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 96
enc cbc(aes) 0xcccccccccccccccccccccccccccccccccccccccccccccccccccccccc
encap type espinudp sport 4500 dport 4500 addr 0.0.0.0
anti-replay context: seq 0x0, oseq 0xaab, bitmap 0x00000000
sel src 192.168.0.2/32 dst 10.0.0.1/32
@wataash
wataash / dragon.c
Created Jun 27, 2020
Compilers: Principles, Techniques, and Tools, 1st Edition (1986) Section 2.9
View dragon.c
// Compilers: Principles, Techniques, and Tools, 1st Edition (1986)
// by Alfred V. Aho, Ravi. Sethi, Jeffrey D. Ullman
// Section 2.9
// http://basen.oru.se/kurser/koi/2010-2011-p1/asu-86/29/files.html
/* global.h */
#include <stdio.h> /* include declarations for i/o routines */
#include <ctype.h> /* ... and for character test routines */
View wsl-glibc-2.31-hack.sh
# MIT License
#
# Copyright (c) 2020 Wataru Ashihara
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
View stack_queue_perf.py
# based on
# https://qiita.com/saba/items/107c4237206e31acdbef
# Pythonのスタックとキューには何を使えばいいのか(各データ構造の速度比較)
# by @saba (https://qiita.com/saba)
from collections import deque
import logging
from queue import Queue
import time
import typing as t
View bison2.3_ada-exp.c
/* A Bison parser, made by GNU Bison 2.3. */
/* Skeleton implementation for Bison's Yacc-like parsers in C
Copyright (C) 1984, 1989, 1990, 2000, 2001, 2002, 2003, 2004, 2005, 2006
Free Software Foundation, Inc.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2, or (at your option)
@wataash
wataash / teams.md
Last active Dec 4, 2020
Microsoft Teams incoming webhook example
View teams.md

Heading

  • list 1
    • list 1.1
  • Italic
  • Bold
  • Strike-through (not work)
  • link
  • inline code
View loop_hello.c
#include <stdio.h>
#define loop() do { \
fprintf(stderr, "\x1b[36m %s loop \x1b[0m\n", __func__); \
_loop(); \
fprintf(stderr, "\x1b[36m %s exit loop \x1b[0m\n", __func__); \
} while (0)
void _loop(void);
@wataash
wataash / juniper-ipsec.md
Last active Sep 13, 2019
Juniper SRX日本語マニュアル 05.ポリシーベース IPsec VPNのCLI設定 の正誤
View juniper-ipsec.md