Displaying 2 results from an estimated 2 matches for "read_wait_nfdset".
2012 Nov 24
0
ssh-keyscan continuity patch --
...r of seconds after which to give up on a TCP connection */
+/* and the maximum time to wait for kex data from the remote server.*/
int timeout = 5;
int maxfd;
#define MAXCON (maxfd - 10)
extern char *__progname;
+extern int connclosed;
+extern int conntimedout;
fd_set *read_wait;
size_t read_wait_nfdset;
int ncon;
@@ -243,7 +249,23 @@
{
int j;
+/*
+ * New fd and socket. Clear the possibly cached IP-address of the
+ * remote host (kex.c:canonical_host_ip) of the previous socket. Also
+ * clear the packet_read_seqnr() "Connection closed ..." and "Connection
+ * to ... timed ou...
2010 Mar 06
1
ssh-keyscan bug (not really exploitable)
...rgc, char **argv)
{
int debug_flag = 0, log_level = SYSLOG_LEVEL_INFO;
- int opt, fopt_count = 0;
- char *tname;
+ int opt, fopt_count = 0, j;
+ char *tname, *line;
+ size_t i, line_len;
+ FILE *fp;
extern int optind;
extern char *optarg;
@@ -808,20 +694,52 @@ main(int argc, char **argv)
read_wait_nfdset = howmany(maxfd, NFDBITS);
read_wait = xcalloc(read_wait_nfdset, sizeof(fd_mask));
- if (fopt_count) {
- Linebuf *lb;
- char *line;
- int j;
-
- for (j = 0; j < fopt_count; j++) {
- lb = Linebuf_alloc(argv[j], error);
- if (!lb)
+ line = NULL;
+
+ for (j = 0; j < fopt_count; j++)...