search for: kt_rsa1

Displaying 4 results from an estimated 4 matches for "kt_rsa1".

2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...parsed */ -int family = AF_UNSPEC; /* IPv4, IPv6 or both */ +/* Flag indicating whether IPv4 or IPv6. This can be set on the command line. + Default value is AF_UNSPEC means both IPv4 and IPv6. */ +#ifdef IPV4_DEFAULT +int IPv4or6 = AF_INET; +#else +int IPv4or6 = AF_UNSPEC; +#endif + +#define KT_RSA1 1 +#define KT_DSA 2 +#define KT_RSA 4 +int get_keytypes = KT_RSA1; /* Get only RSA1 keys by default */ + #define MAXMAXFD 256 /* The number of seconds after which to give up on a TCP connection */ @@ -39,6 +57,8 @@ fd_set *read_wait; size_t read_wait_size; int ncon; +int nonfatal_fatal = 0...
2002 Mar 21
2
bug in ssh-keyscan.c --
...y is currently being processed. PT =-=-=-=-=-= --- ssh-keyscan.c.orig Mon Mar 4 20:54:53 2002 +++ ssh-keyscan.c Wed Mar 20 21:35:08 2002 @@ -538,7 +538,11 @@ confree(s); return; } - fprintf(stderr, "# %s %s\n", c->c_name, chop(buf)); + n = c->c_keytype; + if (n < KT_RSA1 || n > KT_RSA || n == 3) + n = 6; /* paranoia ? */ + cp = "RSA1DSA RSA UNKN"; + fprintf(stderr, "# %4.4s %s %s\n", cp + (n / 2) * 4, c->c_name, chop(buf)); n = snprintf(buf, sizeof buf, "SSH-%d.%d-OpenSSH-keyscan\r\n", c->c_keytype == KT_RSA1? PROTOC...
2002 Jan 22
2
ssh-keyscan: xmalloc out of memory error
hi all, I got "xmalloc: out of memory" when i used ssh-keyscan to a remote host that is using SSH protocol 2 and only protocol 2 (no fallback to SSH protocol 1). Looks to me more like ssh-keyscan doesn't talk SSH protocol 2 to the server. Please help. Here is the exact error: # /usr/local/bin/ssh-keyscan -v miad_1 # miad_1 SSH-2.0-OpenSSH_3.0.2p1 xmalloc: out of memory
2012 Nov 24
0
ssh-keyscan continuity patch --
...osed by remote host", c->c_name); break; case ECONNREFUSED: - break; + if (! log_verbose) + break; + /* fall thru */ default: error("read (%s): %s", c->c_name, strerror(errno)); break; @@ -443,14 +482,20 @@ datafellows = 0; if (c->c_keytype != KT_RSA1) { if (!ssh2_capable(remote_major, remote_minor)) { + if (log_verbose) + logit("%s doesn't support ssh2", c->c_name); + else debug("%s doesn't support ssh2", c->c_name); - confree(s); - return; + confree(s); + return; } } else...