Displaying 7 results from an estimated 7 matches for "fdcon".
Did you mean:
fbcon
2006 Mar 03
3
Using DTrace to locate memory leak
...pting to isolate the location of a memory leak in a 4GL program,
and have hit a bit of a snag. When I LD_PRELOAD libumem and run the
application server, "::findleaks -fdv" reports numerous leaks:
CACHE LEAKED BUFCTL CALLER
0000000100b49068 15 0000000100ef2d50 fdcon+0x6c4
0000000100b50028 1 0000000100b72ac0 fdcon+0x6c4
0000000100b49068 2 0000000100cdfb30 fdcon+0x6c4
0000000100b44368 93 0000000100c98ee0 rnrq+0x204
0000000100b44028 1 0000000100c6e8f0 rnrq+0x204
0000000100b44028 17 0000000100c6ef10 rnrq+0x204
0000000100b3b6e8 1 0...
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...rport, &hints, &aitop)) != 0)
fatal("getaddrinfo %s: %s", host, gai_strerror(gaierr));
@@ -311,7 +393,7 @@
}
static int
-conalloc(char *iname, char *oname)
+conalloc(char *iname, char *oname, int keytype)
{
int s;
char *namebase, *name, *namelist;
@@ -340,6 +422,7 @@
fdcon[s].c_data = (char *) &fdcon[s].c_plen;
fdcon[s].c_len = 4;
fdcon[s].c_off = 0;
+ fdcon[s].c_keytype = keytype;
gettimeofday(&fdcon[s].c_tv, NULL);
fdcon[s].c_tv.tv_sec += timeout;
TAILQ_INSERT_TAIL(&tq, &fdcon[s], c_link);
@@ -359,6 +442,7 @@
if (fdcon[s].c_status == CS_...
2017 Jun 29
5
[Bug 2734] New: close() is called twice in confree()
...ee: unassigned-bugs at mindrot.org
Reporter: bagajjal at microsoft.com
close() is called twice in confree()
Current code -
ssh_packet_close() internally calls the close() again.
confree(int s)
{
......
......
close(s);
......
......
if (fdcon[s].c_ssh) {
ssh_packet_close(fdcon[s].c_ssh);
......
......
}
Fix -
confree(int s)
{
......
......
if (fdcon[s].c_ssh) {
ssh_packet_close(fdcon[s].c_ssh);
free(fdcon[s].c_ssh);
fdcon[s].c_ssh...
2001 May 14
2
openssh-2.9p1
Hi,
1. I think you should apply the attached patch to openssh-2.9p1,
otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous
timeout delays.
2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys??
regards
Peter Breitenlohner <peb at mppmu.mpg.de>
-------------- next part --------------
diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2012 Nov 24
0
ssh-keyscan continuity patch --
...amp;aitop)) != 0) {
+ error("getaddrinfo %s: %s", host, ssh_gai_strerror(gaierr));
+ s = -1;
+ return s;
+ }
for (ai = aitop; ai; ai = ai->ai_next) {
s = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
if (s < 0) {
@@ -388,8 +413,20 @@
{
con *c = &fdcon[s];
int ret;
+ char *name;
- ret = conalloc(c->c_namelist, c->c_output_name, c->c_keytype);
+/*
+ * If "connclosed" isn't set, do the next host from c->c_namelist. Else,
+ * restore the original string in c->c_namebase and redo the current
+ * host.
+ */
+ name = c-...
2002 Jan 22
2
ssh-keyscan: xmalloc out of memory error
hi all,
I got "xmalloc: out of memory" when i used
ssh-keyscan to a remote host that is using
SSH protocol 2 and only protocol 2 (no fallback
to SSH protocol 1).
Looks to me more like ssh-keyscan doesn't talk
SSH protocol 2 to the server.
Please help.
Here is the exact error:
# /usr/local/bin/ssh-keyscan -v miad_1
# miad_1 SSH-2.0-OpenSSH_3.0.2p1
xmalloc: out of memory
2010 Mar 06
1
ssh-keyscan bug (not really exploitable)
...1.78 2009/01/22 10:02:34 djm Exp $ */
+/* $OpenBSD: ssh-keyscan.c,v 1.81 2010/01/09 23:04:13 dtucker Exp $ */
/*
* Copyright 1995, 1996 by David Mazieres <dm at lcs.mit.edu>.
*
@@ -99,122 +99,6 @@ typedef struct Connection {
TAILQ_HEAD(conlist, Connection) tq; /* Timeout Queue */
con *fdcon;
-/*
- * This is just a wrapper around fgets() to make it usable.
- */
-
-/* Stress-test. Increase this later. */
-#define LINEBUF_SIZE 16
-
-typedef struct {
- char *buf;
- u_int size;
- int lineno;
- const char *filename;
- FILE *stream;
- void (*errfun) (const char *,...);
-} Linebuf;
-
-sta...