search for: conread

Displaying 5 results from an estimated 5 matches for "conread".

2017 Jan 06
0
[Bug 2583] ssh-keyscan: fatal error in conread() when scanning ssh1 keys without ssh1 support
https://bugzilla.mindrot.org/show_bug.cgi?id=2583 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Blocks| |2647 CC| |djm
2015 Jan 27
0
[Bug 1213] ssh-keyscan exits in mid-way
..._run (ssh=0x7ffff86f4520, mode=0, done=0x7ffff8207178, ctxt=0x7ffff86f4520) at ../dispatch.c:101 #4 0x00007ffff7f85aef in keygrab_ssh2 (c=0x7ffff8207160) at ../ssh-keyscan.c:292 #5 0x00007ffff7f86e99 in congreet (s=149) at ../ssh-keyscan.c:501 #6 0x00007ffff7f86f34 in conread (s=149) at ../ssh-keyscan.c:516 #7 0x00007ffff7f873b5 in conloop () at ../ssh-keyscan.c:587 #8 0x00007ffff7f874cf in do_host ( host=0x7fffffffe27b "foobaz.internal.example.com,X.Y.Z.W") at ../ssh-keyscan.c:613 #9 0x00007ffff7f87d44 in main (argc=6, argv=0x7f...
2015 Jan 30
0
[Bug 1213] ssh-keyscan exits in mid-way
...run (ssh=0x7ffffb6e9cb0, mode=0, done=0x7ffff8207d78, ctxt=0x7ffffb6e9cb0) at ../dispatch.c:101 #3 0x00007ffff7f84cef in keygrab_ssh2 (c=0x7ffff8207d60) at ../ssh-keyscan.c:293 #4 0x00007ffff7f860ba in congreet (s=213) at ../ssh-keyscan.c:503 #5 0x00007ffff7f86155 in conread (s=213) at ../ssh-keyscan.c:518 #6 0x00007ffff7f865d6 in conloop () at ../ssh-keyscan.c:589 #7 0x00007ffff7f866f0 in do_host ( host=0x7fffffffe27c "blarg.internal.example.com,A.B.C.D") at ../ssh-keyscan.c:615 #8 0x00007ffff7f86f65 in main (argc=6, argv=0x7ff...
2012 Nov 24
0
ssh-keyscan continuity patch --
...ow; fd_set *r, *e; con *c; - int i; + int i, s; gettimeofday(&now, NULL); c = TAILQ_FIRST(&tq); @@ -550,20 +599,100 @@ if (FD_ISSET(i, e)) { error("%s: exception!", fdcon[i].c_name); confree(i); - } else if (FD_ISSET(i, r)) + } else if (FD_ISSET(i, r)) { conread(i); +/* + * Break if the read attempt in the `packet.c:packet_read_seqnr()' + * function failed because our "local" timeout was exceeded or because + * the remote host closed the connection before the packet data read + * was complete. The remote closure probably occurred because the...
2016 Dec 16
107
[Bug 2647] New: Tracking bug for OpenSSH 7.5 release
https://bugzilla.mindrot.org/show_bug.cgi?id=2647 Bug ID: 2647 Summary: Tracking bug for OpenSSH 7.5 release Product: Portable OpenSSH Version: -current Hardware: Other OS: Linux Status: NEW Keywords: meta Severity: enhancement Priority: P5 Component: Miscellaneous