Displaying 4 results from an estimated 4 matches for "kt_rsa1".
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...parsed */
-int family = AF_UNSPEC; /* IPv4, IPv6 or both */
+/* Flag indicating whether IPv4 or IPv6. This can be set on the command line.
+ Default value is AF_UNSPEC means both IPv4 and IPv6. */
+#ifdef IPV4_DEFAULT
+int IPv4or6 = AF_INET;
+#else
+int IPv4or6 = AF_UNSPEC;
+#endif
+
+#define KT_RSA1 1
+#define KT_DSA 2
+#define KT_RSA 4
+int get_keytypes = KT_RSA1; /* Get only RSA1 keys by default */
+
#define MAXMAXFD 256
/* The number of seconds after which to give up on a TCP connection */
@@ -39,6 +57,8 @@
fd_set *read_wait;
size_t read_wait_size;
int ncon;
+int nonfatal_fatal = 0...
2002 Mar 21
2
bug in ssh-keyscan.c --
...y
is currently being processed. PT
=-=-=-=-=-=
--- ssh-keyscan.c.orig Mon Mar 4 20:54:53 2002
+++ ssh-keyscan.c Wed Mar 20 21:35:08 2002
@@ -538,7 +538,11 @@
confree(s);
return;
}
- fprintf(stderr, "# %s %s\n", c->c_name, chop(buf));
+ n = c->c_keytype;
+ if (n < KT_RSA1 || n > KT_RSA || n == 3)
+ n = 6; /* paranoia ? */
+ cp = "RSA1DSA RSA UNKN";
+ fprintf(stderr, "# %4.4s %s %s\n", cp + (n / 2) * 4, c->c_name, chop(buf));
n = snprintf(buf, sizeof buf, "SSH-%d.%d-OpenSSH-keyscan\r\n",
c->c_keytype == KT_RSA1? PROTOC...
2002 Jan 22
2
ssh-keyscan: xmalloc out of memory error
hi all,
I got "xmalloc: out of memory" when i used
ssh-keyscan to a remote host that is using
SSH protocol 2 and only protocol 2 (no fallback
to SSH protocol 1).
Looks to me more like ssh-keyscan doesn't talk
SSH protocol 2 to the server.
Please help.
Here is the exact error:
# /usr/local/bin/ssh-keyscan -v miad_1
# miad_1 SSH-2.0-OpenSSH_3.0.2p1
xmalloc: out of memory
2012 Nov 24
0
ssh-keyscan continuity patch --
...osed by remote host", c->c_name);
break;
case ECONNREFUSED:
- break;
+ if (! log_verbose)
+ break;
+ /* fall thru */
default:
error("read (%s): %s", c->c_name, strerror(errno));
break;
@@ -443,14 +482,20 @@
datafellows = 0;
if (c->c_keytype != KT_RSA1) {
if (!ssh2_capable(remote_major, remote_minor)) {
+ if (log_verbose)
+ logit("%s doesn't support ssh2", c->c_name);
+ else
debug("%s doesn't support ssh2", c->c_name);
- confree(s);
- return;
+ confree(s);
+ return;
}
} else...