Blog homepage:https://blog.csdn.net/wkd_007 Blog content:Embedded development, Linux, C language, C++, data structure, audio and video Content of this article:Introduction to Ogg packaging format Golden sentence sharing:Confucius said: A gentleman is magnanimous, but a villain has long-term relationships. –“The Analects of Confucius·Shuerpian”. It means that a gentleman is open-minded and calm; a villain is preoccupied and worried […]
Tag: rfc
URL RFC3987 Internationalization Rules Security Character Set and Related Security Regularity Recommendations
1. Absolutely internationalized IRI regularity. /^[a-z](?:[-a-z0-9\ + \.])*:(?:\/\/(?:(?:%[0-9a-f][0- 9a-f]|[-a-z0-9\._~\x{A0}-\x{D7FF}\x{F900}-\x{FDCF}\x{FDF0}-\x{FFEF}\ x{10000}-\x{1FFFD}\x{20000}-\x{2FFFD}\x{30000}-\x{3FFFD}\x{40000}-\x{4FFFD}\x{50000}-\ x{5FFFD}\x{60000}-\x{6FFFD}\x{70000}-\x{7FFFD}\x{80000}-\x{8FFFD}\x{90000}-\x{9FFFD}\x {A0000}-\x{AFFFD}\x{B0000}-\x{BFFFD}\x{C0000}-\x{CFFFD}\x{D0000}-\x{DFFFD}\x{E1000}-\x {EFFFD}!\$ & amp;’\(\)\*\ + ,;=:])*@)?(?:\[(?:(?:(?:[0-9a-f]{ 1,4}:){6}(?:[0-9a-f]{1,4}:[0-9a-f]{1,4}|(?:[0-9]|[1- 9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(?:\.(?:[0- 9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])){3}) |::(?:[0-9a-f]{1,4}:){5}(?:[0-9a-f]{1,4}:[0-9a-f]{1,4 }|(?:[0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0- 5])(?:\.(?:[0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9 ]|25[0-5])){3})|(?:[0-9a-f]{1,4})?::(?:[0-9a-f]{1,4}: ){4}(?:[0-9a-f]{1,4}:[0-9a-f]{1,4}|(?:[0-9]|[1-9][0- 9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(?:\.(?:[0-9]|[1 -9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])){3})|(?:( ?:[0-9a-f]{1,4}:){0,1}[0-9a-f]{1,4})?::(?:[0-9a-f]{1, 4}:){3}(?:[0-9a-f]{1,4}:[0-9a-f]{1,4}|(?:[0-9]|[1-9] [0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(?:\.(?:[0-9] |[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])){3})|( ?:(?:[0-9a-f]{1,4}:){0,2}[0-9a-f]{1,4})?::(?:[0-9a-f] {1,4}:){2}(?:[0-9a-f]{1,4}:[0-9a-f]{1,4}|(?:[0-9]|[1 -9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(?:\.(?:[0 -9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])){3} )|(?:(?:[0-9a-f]{1,4}:){0,3}[0-9a-f]{1,4})?::[0-9a-f] {1,4}:(?:[0-9a-f]{1,4}:[0-9a-f]{1,4}|(?:[0-9]|[1-9][ 0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(?:\.(?:[0-9]| [1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])){3})|(? :(?:[0-9a-f]{1,4}:){0,4}[0-9a-f]{1,4})?::(?:[0-9a-f]{ 1,4}:[0-9a-f]{1,4}|(?:[0-9]|[1-9][0-9]|1[0-9][0-9]| 2[0-4][0-9]|25[0-5])(?:\.(?:[0-9]|[1-9][0-9]|1[0-9] [0-9]|2[0-4][0-9]|25[0-5])){3})|(?:(?:[0-9a-f]{1,4}: ){0,5}[0-9a-f]{1,4})?::[0-9a-f]{1,4}|(?:(?:[0-9a-f]{1 ,4}:){0,6}[0-9a-f]{1,4})?::)|v[0-9a-f] + \.[-a-z0-9\._~ !\$ & amp;’\(\)\*\ + ,;=:] + )\]|(?:[0-9]|[1-9][0-9]|1[0-9 ][0-9]|2[0-4][0-9]|25[0-5])(?:\.(?:[0-9]|[1-9][0-9] […]
The tRFC maximum violation during No Op problem occurs in ddr3 simulation in xilinx
1. Problem description This problem occurs when calling the DDR3 simulation model. The length of WREADY raised does not match the actual burst length. You can also observe that the rows and columns of the print window at this time, and the values of banks are all X. 2. Troubleshooting Step 1: Suspect the AXI […]
Java connects SAP RFC to realize data extraction
Package management First of all, two packages are required to connect to SAP, namely sapjco3.jar and sapjco3.dll. Remember that these two packages need to be placed in the same directory; otherwise, an error will be reported. I first tried to send these two packages to the private server, and then introduced them in the pom.xml […]
PerfCollect insight into the CPU explosion of C# programs on Linux
One: Background 1. Tell a story If you want to analyze the CPU explosion of .NET programs on Linux, according to my previous personality, I must grab a dump and analyze it afterwards. Although this analysis mode is not important, it is not light, and it requires a certain amount of underlying knowledge. Is there […]
Use perfcollect to gain insight into the CPU explosion of .NET programs on Linux
One: Background 1. Tell a story If you want to analyze the CPU explosion of .NET programs on Linux, according to my previous personality, I must grab a dump and analyze it afterwards. Although this analysis mode is not important, it is not light, and it requires a certain amount of underlying knowledge. Is there […]
Use perfcollect to gain insight into the CPU explosion of .NET programs on Linux
one: background 1. Tell a story If you want to analyze the CPU explosion of .NET programs on Linux, according to my previous personality, I must grab a dump and analyze it afterwards. Although this analysis mode is not important, it is not light, and it requires a certain amount of underlying knowledge. Is there […]
PFCG Role Assignment Users – PRGN_RFC_CHANGE_USERS_IN_AGRS
Directory 1. Program source code 2. Data template 1. Program source code * &——————————————- ————————–* * & Report ZFIU024 * & * &———————————————- ———————–* * & * & * &———————————————- ———————–* REPORT ZFIU024. TABLES: SSCRFIELDS. SELECTION-SCREEN FUNCTION KEY 1. TYPES: BEGIN OF TYP_UPLOAD, AGR_NAME TYPE STR_AGRS-AGR_NAME, UNAME TYPE STR_AGRS-UNAME, ZSEL TYPE CHAR1, ICON TYPE ICON-NAME, […]
PFCG root role assigned to composite role – PRGN_RFC_ADD_AGRS_TO_COLL_AGR / PRGN_RFC_DEL_AGRS_IN_COLL_AGR
Directory 1. Program source code 2. Data template 1. Program source code * &——————————————- ————————–* * & Report ZFIU025 * & * &———————————————- ———————–* * & * & * &———————————————- ———————–* REPORT ZFIU028. TABLES: SSCRFIELDS. SELECTION-SCREEN FUNCTION KEY 1. TYPES: BEGIN OF TYP_UPLOAD, AGR_NAME TYPE STR_AGRS-AGR_NAME,”composite role AGR_NAME_SON TYPE STR_AGRS-AGR_NAME,”root role ZSEL TYPE CHAR1, ICON […]
PFCG root role creation/deletion – PRGN_RFC_CREATE_AGR_MULTIPLE / PRGN_ACTIVITY_GROUP_DELETE
Directory 1. Batch source code 2. Batch data template 1. Batch source code * &——————————————- ————————–* * & Report ZFIU025 * & * &———————————————- ———————–* * & * & * &———————————————- ———————–* REPORT ZFIU025. TABLES: SSCRFIELDS. SELECTION-SCREEN FUNCTION KEY 1. TYPES: BEGIN OF TYP_UPLOAD, AGR_NAME TYPE STR_AGRS-AGR_NAME,”Role AGR_TEXT TYPE AGR_TEXTS-TEXT,” character description ZSEL TYPE CHAR1, […]