search for: minor1

Displaying 6 results from an estimated 6 matches for "minor1".

Did you mean: minor
2015 May 23
5
Name based SSH proxy
...inal openssh-6.6p1/sshconnect.c --- openssh-6.6p1/sshconnect.c.original 2015-05-23 11:56:55.235217137 +0200 +++ openssh-6.6p1/sshconnect.c 2015-05-23 13:43:41.426983727 +0200 @@ -515,12 +515,13 @@ ssh_connect(const char *host, struct add } static void -send_client_banner(int connection_out, int minor1) +send_client_banner(int connection_out, int minor1, const char *host) { /* Send our own protocol version identification. */ if (compat20) { - xasprintf(&client_version_string, "SSH-%d.%d-%.100s\r\n", - PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION); + xasprintf(&cli...
2007 Jul 24
1
ssh client does not timeout if the network fails after ssh_connect but before ssh_exchange_identification, even with Alive options set
Hello, I am testing ssh with occasional network disconnection between server and client during these days. I found ssh sometimes hangs if the disconnection happens after the connection is established but before ssh_exchange_identification completes. The ssh configuration files show that both client and server alive options are set. In /etc/ssh/ssh_config: # Send keepalive messages to the server.
2004 Mar 26
2
Patch for login exchange timeout
.../* Log error and exit. */ + fatal("Timeout before authentication"); } + + /* * Waits for the server identification string, and sends our own * identification string. */ *************** *** 441,446 **** --- 451,462 ---- int connection_out = packet_get_connection_out(); int minor1 = PROTOCOL_MINOR_1; + /* Setup a handler for banner prompt */ + if (options.connection_timeout > 0) { + signal(SIGALRM, grace_alarm_handler); + alarm(options.connection_timeout); + } + /* Read other side\'s version identification. */ for (;;) { for (i = 0; i < sizeo...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
...ng = NULL; -struct sshkey *previous_host_key = NULL; +static struct sshkey *previous_host_key = NULL; static int matching_host_key_dns = 0; @@ -605,16 +603,16 @@ ssh_connect(struct ssh *ssh, const char *host, struct addrinfo *addrs, } static void -send_client_banner(int connection_out, int minor1) +send_client_banner(int connection_out, int minor1, char **client_version_stringp) { /* Send our own protocol version identification. */ - xasprintf(&client_version_string, "SSH-%d.%d-%.100s\r\n", + xasprintf(client_version_stringp, "SSH-%d.%d-%.100s\r\n", PROTOCOL...
2013 Oct 07
4
Feature request: FQDN Host match
Hello! I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :) Anyway, my question relates to ssh_config. The problem I find is that the Host pattern is only applied to the argument given on the command line, as outlined in the man page: "The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name
2003 Oct 08
4
OS/390 openssh
...+ __atoe_l (buf, sizeof(buf)); +#endif if (strncmp(buf, "SSH-", 4) == 0) break; debug("ssh_exchange_identification: %s", buf); @@ -524,8 +527,14 @@ compat20 ? PROTOCOL_MAJOR_2 : PROTOCOL_MAJOR_1, compat20 ? PROTOCOL_MINOR_2 : minor1, SSH_VERSION); +#ifdef CHARSET_EBCDIC + __etoa(buf); +#endif if (atomicio(vwrite, connection_out, buf, strlen(buf)) != strlen(buf)) fatal("write: %.100s", strerror(errno)); +#ifdef CHARSET_EBCDIC + __atoe(buf); +#endif client_version_string = xstrdup(buf); chop(client_versi...