search for: hostaddr

Displaying 20 results from an estimated 55 matches for "hostaddr".

Did you mean: host_addr
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...if (*res != NULL) freeaddrinfo(*res); diff -ur openssh/roaming_client.c openssh-sshfp/roaming_client.c --- openssh/roaming_client.c 2010-01-26 02:53:06.000000000 +0100 +++ openssh-sshfp/roaming_client.c 2010-11-28 09:49:06.626052834 +0100 @@ -263,7 +263,7 @@ if (ssh_connect(host, &hostaddr, options.port, options.address_family, 1, &timeout_ms, options.tcp_keep_alive, options.use_privileged_port, - options.proxy_command) == 0 && roaming_resume() == 0) { + options.proxy_command, NULL) == 0 && roaming_resume() == 0) { packet_restore_state(...
2013 Apr 18
9
[PATCH v5 1/2] libxl: Introduce functions to add and remove USB devices to an HVM guest
...l, but "translated" */ +typedef struct libxl__device_usb { + libxl_usb_protocol protocol; + libxl_domid target_domid; + libxl_domid backend_domid; + libxl_domid dm_domid; + libxl_device_usb_type type; + union { + struct { + int hostbus; + int hostaddr; + } hostdev; + } u; +} libxl__device_usb; +_hidden int libxl__qmp_usb_add(libxl__gc *gc, int domid, + libxl__device_usb *dev); +_hidden int libxl__qmp_usb_remove(libxl__gc *gc, int domid, + libxl__device_usb *dev); /* close...
2002 Dec 29
0
[Bug 460] New: ut_addr_v6 not used
...+0100 @@ -609,6 +609,9 @@ construct_utmp(struct logininfo *li, struct utmp *ut) { +# ifdef HAVE_ADDR_V6_IN_UTMP + struct sockaddr_in6 *sa6; +# endif memset(ut, '\0', sizeof(*ut)); /* First fill out fields used for both logins and logouts */ @@ -661,6 +664,19 @@ if (li->hostaddr.sa.sa_family == AF_INET) ut->ut_addr = li->hostaddr.sa_in.sin_addr.s_addr; # endif +# ifdef HAVE_ADDR_V6_IN_UTMP + /* this is just a 128-bit IPv6 address */ + if (li->hostaddr.sa.sa_family == AF_INET6) { + sa6 = ((struct sockaddr_in6 *)&li->hostaddr.sa); + memcpy(ut->ut_add...
2002 May 22
0
[PATCH] connect() timeout
...TCP/IP port on the local machine be forwarded over the secure channel, and the application --- openssh-3.2.2p1/ssh.c.ORIG Tue Apr 23 13:09:46 2002 +++ openssh-3.2.2p1/ssh.c Tue May 21 15:40:06 2002 @@ -677,7 +677,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- openssh-3.2.2p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002 +++ openssh...
2014 Mar 26
1
SSHFP issue
Have you seen this? https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513 --mancha
2002 Jan 26
5
[PATCH] Connect timeout
...m DynamicForward Specifies that a TCP/IP port on the local machine be forwarded over the secure channel, and the application --- ssh.c.OK Mon Nov 12 00:52:04 2001 +++ ssh.c Sat Jan 26 21:44:35 2002 @@ -674,7 +674,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- sshconnect.c.OK Wed Oct 10 07:07:45 2001 +++ sshconnect.c Sat Jan 26 2...
2012 Dec 27
3
[PATCH] hostfile: list known names (if any) for new hostkeys
...*, const char *); void free_hostkeys(struct hostkeys *); HostStatus check_key_in_hostkeys(struct hostkeys *, Key *, diff --git a/sshconnect.c b/sshconnect.c index 07800a6..62306ac 100644 --- a/sshconnect.c +++ b/sshconnect.c @@ -718,13 +718,13 @@ check_host_key(char *hostname, struct sockaddr *hostaddr, u_short port, Key *raw_key = NULL; char *ip = NULL, *host = NULL; char hostline[1000], *hostp, *fp, *ra; - char msg[1024]; + char msg[2048]; const char *type; const struct hostkey_entry *host_found, *ip_found; int len, cancelled_forwarding = 0; int local = sockaddr_is_local(hostaddr)...
2006 May 15
2
[PATCH 10/12 bugfix: openssh-4.3p2: memory leak
...diff -uprN openssh-4.3p2/sshconnect.c openssh-4.3p2-kylie/sshconnect.c --- openssh-4.3p2/sshconnect.c 2005-12-13 02:29:03.000000000 -0600 +++ openssh-4.3p2-kylie/sshconnect.c 2006-05-04 10:07:57.000000000 -0500 @@ -937,6 +937,7 @@ ssh_login(Sensitive *sensitive, const ch } else { ssh_kex(host, hostaddr); ssh_userauth1(local_user, server_user, host, sensitive); + xfree(local_user); } }
2017 Jan 12
3
proposed change to ssh_connect_direct()
On Sat, Jan 7, 2017 at 2:30 PM, Peter Moody <mindrot at hda3.com> wrote: > so I spent a bit of time looking at this and it seems like the only > way to go, at least if I want to keep it in ssh_connect_direct(), is > to use pthreads. further, it seems like getting that accepted is > something of a long shot: Sorry, pthreads is a non-starter. I would have thought that using
2001 Nov 17
0
[PATCH] Connect timeout
...pts; /* Max number of password * prompts. */ int cipher; /* Cipher to use. */ --- openssh-3.0.1p1/ssh.c.ORIG Sat Nov 17 22:49:09 2001 +++ openssh-3.0.1p1/ssh.c Sat Nov 17 22:49:47 2001 @@ -674,7 +674,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- openssh-3.0.1p1/sshconnect.c.ORIG Sat Nov 17 22:49:09 2001 +++ openssh...
2002 Oct 16
3
ssh-3.5p1 core dumps on Solaris 2.6
...2 0xef4e5c88 in vsnprintf () #3 0x42bfc in do_log (level=SYSLOG_LEVEL_DEBUG1, fmt=0xb9e28 "using hostkeyalias: %s", args=0xefffe510) at log.c:385 #4 0x42574 in debug (fmt=0xb9e28 "using hostkeyalias: %s") at log.c:159 #5 0x20c04 in check_host_key (host=0x5a "", hostaddr=0xf3560, host_key=0xffaa8, readonly=0, user_hostfile=0x81 "", system_hostfile=0x69 " -v pf-i400") at sshconnect.c:561 #6 0x21634 in verify_host_key (host=0xfa790 "pf-i400", hostaddr=0xf3560, host_key=0xffaa8) at sshconnect.c:810 #7 0x2446c in verify_host_key_...
2003 Apr 15
0
Connect timeout patch
...rompts; /* Max number of password * prompts. */ int cipher; /* Cipher to use. */ --- openssh-3.6.1p1/ssh.c.ORIG Tue Apr 15 23:06:30 2003 +++ openssh-3.6.1p1/ssh.c Tue Apr 15 23:08:28 2003 @@ -619,7 +619,7 @@ /* Open a connection to the remote host. */ if (ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, #ifdef HAVE_CYGWIN options.use_privileged_port, #else --- openssh-3.6.1p1/ssh_config.0.ORIG Tue Apr 15 23:06:30 2003 +++ openssh-3.6.1p1/ssh_config.0 Tue Apr 15 23:11:06...
2002 Apr 03
1
[PATCH] connect() timeout
...at a TCP/IP port on the local machine be forwarded over the secure channel, and the application --- openssh-3.1p1/ssh.c.ORIG Tue Feb 19 05:20:58 2002 +++ openssh-3.1p1/ssh.c Wed Apr 3 23:33:48 2002 @@ -674,7 +674,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- openssh-3.1p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002 +++ openssh-3...
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
...ecifies whether to try rhosts based authentication. Note that this diff -u --recursive openssh-2.3.0p1/ssh.c openssh-2.3.0p1-new/ssh.c --- openssh-2.3.0p1/ssh.c Fri Oct 27 23:19:58 2000 +++ openssh-2.3.0p1-new/ssh.c Tue Nov 14 07:59:56 2000 @@ -620,7 +620,7 @@ */ ok = ssh_connect(host, &hostaddr, options.port, - options.connection_attempts, + options.connection_attempts, options.retry_delay, !options.rhosts_authentication && !options.rhosts_rsa_authentication, original_real_uid, diff -u --recursive openssh-2.3.0p1/ssh.h openssh-2.3.0p1-new/ssh.h --- openssh-2.3...
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
...rd_prompts; /* Max number of password * prompts. */ int cipher; /* Cipher to use. */ --- openssh-3.5p1/ssh.c.ORIG Thu Sep 19 04:05:04 2002 +++ openssh-3.5p1/ssh.c Wed Oct 16 14:59:12 2002 @@ -616,7 +616,7 @@ /* Open a connection to the remote host. */ if (ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, #ifdef HAVE_CYGWIN options.use_privileged_port, #else --- openssh-3.5p1/ssh_config.0.ORIG Fri Oct 4 03:31:47 2002 +++ openssh-3.5p1/ssh_config.0 Wed Oct 16 14:59:12 200...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
...t the connection into non-blocking mode. */ packet_set_nonblocking(); @@ -1423,9 +1423,12 @@ ssh_login(Sensitive *sensitive, const char *orighost, /* key exchange */ /* authenticate user */ debug("Authenticating to %s:%d as '%s'", host, port, server_user); - ssh_kex2(host, hostaddr, port); + ssh_kex2(host, hostaddr, port, client_version_string, server_version_string); ssh_userauth2(local_user, server_user, host, sensitive); + free(client_version_string); + free(server_version_string); free(local_user); + free(host); } void diff --git a/sshconnect.h b/sshconnect.h inde...
2000 Jun 06
0
connection timeout
...Specifies whether to try DSA authentication. The argument to this keyword must be diff -Naur openssh-2.1.0p3/ssh.c openssh-2.1.0p3-new/ssh.c --- openssh-2.1.0p3/ssh.c Mon May 29 20:44:54 2000 +++ openssh-2.1.0p3-new/ssh.c Mon Jun 5 19:12:59 2000 @@ -578,6 +578,7 @@ ok = ssh_connect(host, &hostaddr, options.port, options.connection_attempts, + options.connection_timeout, !options.rhosts_authentication && !options.rhosts_rsa_authentication, original_real_uid, diff -Naur openssh-2.1.0p3/ssh.h openssh-2.1.0p3-new/ssh.h --- openssh-2.1.0p3/ssh.h Wed May 17 05:34:24...
2020 Feb 06
3
Call for testing: OpenSSH 8.2
On 2020-02-05 at 20:39 -0500, Phil Pennock wrote: > On 2020-02-06 at 10:29 +1100, Damien Miller wrote: > > OpenSSH 8.2p1 is almost ready for release, so we would appreciate testing > > on as many platforms and systems as possible. This is a feature release. > > > * The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These > This actually affects me:
2018 Nov 05
2
usb post passthough stopped workng after kernel upgrade
...n due to usb issues I've upgraded to 4.18.6-1~bpo9+1. after the upgrade, my vm doesn't starts anymore, I see this msg: error: Failed to start domain router error: internal error: qemu unexpectedly closed the monitor: 2018-11-02T13:43:32.174730Z qemu-system-x86_64: -device usb-host,hostbus=1,hostaddr=4,id=hostdev4,bus=usb.0,port=1: failed to find host usb device 1:4 how can a kernel upgrade cause this? is there a fix for this issue? Thanks, Dagg.
2013 Oct 07
4
Feature request: FQDN Host match
Hello! I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :) Anyway, my question relates to ssh_config. The problem I find is that the Host pattern is only applied to the argument given on the command line, as outlined in the man page: "The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name