]> andersk Git - openssh.git/commitdiff
- markus@cvs.openbsd.org 2001/08/05 23:29:58
authormouring <mouring>
Mon, 6 Aug 2001 22:43:50 +0000 (22:43 +0000)
committermouring <mouring>
Mon, 6 Aug 2001 22:43:50 +0000 (22:43 +0000)
     [ssh-keyscan.c]
     make -t dsa work with commercial servers, too

ChangeLog
ssh-keyscan.c

index 2f8ea57c0c0ad34d62a2d344546384b20a06a8ff..153e3848e69b55f7029c0a13d620b25666394e9b 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
    - markus@cvs.openbsd.org 2001/08/05 23:18:20
      [ssh-keyscan.1 ssh-keyscan.c]
      ssh 2 support; from wayned@users.sourceforge.net
+   - markus@cvs.openbsd.org 2001/08/05 23:29:58
+     [ssh-keyscan.c]
+     make -t dsa work with commercial servers, too
 
 20010803
  - (djm) Fix interrupted read in entropy gatherer. Spotted by markus@ on
index 5a992515e471d0c1ec4d558ba8be8616074e0786..3f8c5b4032eb0496cb79d2c850478aba73aef1a2 100644 (file)
@@ -7,7 +7,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh-keyscan.c,v 1.26 2001/08/05 23:18:20 markus Exp $");
+RCSID("$OpenBSD: ssh-keyscan.c,v 1.27 2001/08/05 23:29:58 markus Exp $");
 
 #if defined(HAVE_SYS_QUEUE_H) && !defined(HAVE_BOGUS_SYS_QUEUE_H)
 #include <sys/queue.h>
@@ -499,8 +499,11 @@ congreet(int s)
 
        bufsiz = sizeof(buf);
        cp = buf;
-       while (bufsiz-- && (n = read(s, cp, 1)) == 1 && *cp != '\n' && *cp != '\r')
+       while (bufsiz-- && (n = read(s, cp, 1)) == 1 && *cp != '\n') {
+               if (*cp == '\r')
+                       *cp = '\n';
                cp++;
+       }
        if (n < 0) {
                if (errno != ECONNREFUSED)
                        error("read (%s): %s", c->c_name, strerror(errno));
@@ -513,7 +516,6 @@ congreet(int s)
                return;
        }
        *cp = '\0';
-       fprintf(stderr, "# %s %s\n", c->c_name, buf);
        if (c->c_keytype != KT_RSA1) {
                int remote_major, remote_minor;
                char remote_version[sizeof buf];
@@ -529,6 +531,7 @@ congreet(int s)
                        return;
                }
        }
+       fprintf(stderr, "# %s %s\n", c->c_name, chop(buf));
        n = snprintf(buf, sizeof buf, "SSH-%d.%d-OpenSSH-keyscan\r\n",
            c->c_keytype == KT_RSA1? PROTOCOL_MAJOR_1 : PROTOCOL_MAJOR_2,
            c->c_keytype == KT_RSA1? PROTOCOL_MINOR_1 : PROTOCOL_MINOR_2);
This page took 0.141229 seconds and 5 git commands to generate.