Displaying 7 results from an estimated 7 matches for "hash_known_hosts".
2003 Mar 04
0
hashing known_hosts
...b
diff -u -p openssh-3.4p1/hostfile.c openssh-3.4p1-hash/hostfile.c
--- openssh-3.4p1/hostfile.c Thu Dec 20 20:47:09 2001
+++ openssh-3.4p1-hash/hostfile.c Mon Mar 3 17:28:25 2003
@@ -135,8 +135,13 @@ check_host_in_hostfile(const char *filen
;
/* Check if the host name matches. */
+#ifdef HASH_KNOWN_HOSTS
+ if (match_hashed_hostname(host, cp, (u_int) (cp2 - cp)) != 1)
+ continue;
+#else
if (match_hostname(host, cp, (u_int) (cp2 - cp)) != 1)
continue;
+#endif
/* Got a match. Skip host name. */
cp = cp2;
diff -u -p openssh-3.4p1/match.c openssh-3.4...
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...o fail;
- }
- /*
- * If not in strict mode, add the key automatically to the
- * local known_hosts file.
- */
- if (options.check_host_ip && ip_status == HOST_NEW) {
- snprintf(hostline, sizeof(hostline), "%s,%s",
- host, ip);
- hostp = hostline;
- if (options.hash_known_hosts) {
- /* Add hash of host and IP separately */
- r = add_host_to_hostfile(user_hostfile, host,
- host_key, options.hash_known_hosts) &&
- add_host_to_hostfile(user_hostfile, ip,
- host_key, options.hash_known_hosts);
- } else {
- /* Add unhashed "host,ip&...
2013 Mar 22
1
[PATCH] Allow matching HostName against Host entries
...t_name == 1 && &options->hostname != NULL &&
+ match_pattern(options->hostname, arg))) {
if (negated) {
debug("%.200s line %d: Skipping Host "
"block because of negated match "
@@ -970,6 +973,10 @@
intptr = &options->hash_known_hosts;
goto parse_flag;
+ case oMatchHostName:
+ intptr = &options->match_host_name;
+ goto parse_flag;
+
case oTunnel:
intptr = &options->tun_open;
arg = strdelim(&s);
@@ -1207,6 +1214,7 @@
options->control_persist = -1;
options->control_persist_timeout = 0;...
2005 Jun 23
0
ControlPersist.
...lPersist },
{ "hashknownhosts", oHashKnownHosts },
{ NULL, oBadOption }
};
@@ -818,6 +819,10 @@ parse_int:
*intptr = value;
break;
+ case oControlPersist:
+ intptr = &options->control_persist;
+ goto parse_flag;
+
case oHashKnownHosts:
intptr = &options->hash_known_hosts;
goto parse_flag;
--- openssh/readconf.h~ 2005-06-16 04:19:42.000000000 +0100
+++ openssh/readconf.h 2005-06-23 11:02:01.000000000 +0100
@@ -112,6 +112,7 @@ typedef struct {
char *control_path;
int control_master;
+ int control_persist;
int hash_known_hosts;
} Options;
--
dwm...
2006 Feb 10
0
OpenSSH ControlAllowUsers, et al Patch
...oups >= MAX_CONTROL_DENY_GROUPS)
+ fatal("%s line %d: too many control deny groups.",
+ filename, linenum);
+ options->control_deny_groups[options->num_control_deny_groups++] =
+ xstrdup(arg);
+ }
+ break;
+
case oHashKnownHosts:
intptr = &options->hash_known_hosts;
goto parse_flag;
@@ -963,8 +1020,13 @@
options->server_alive_interval = -1;
options->server_alive_count_max = -1;
options->num_send_env = 0;
+ options->control_bind_mask = 0177;
options->control_path = NULL;
options->control_master = -1;
+ options->num_control_all...
2009 Jul 08
4
Feature request: "SetupCommand" invoked before connecting
Hi,
(I'm not subscribed to the list, so please CC me on reply.)
I'd like to request adding a feature to OpenSSH:
Task:
~~~~~
It is quite sometime useful to invoke a program prior to connecting to
an ssh server. The most common use case will probably be port knocking.
That is a small program sends certain packets to a server and the server
reacts to this by unlocking the ssh port, which
2005 Jun 12
2
%h,%p,%u expansion for ControlPath
This allows me to set 'ControlPath ~/.ssh/sockets/%h.%p.%u' for example.
Have I missed a good reason why ssh_connect finds the default port
number for itself instead of just having it in options.port (like we do
for the the default in options.user)?
--- openssh-4.1p1/ssh.c~ 2005-06-12 09:47:18.000000000 +0100
+++ openssh-4.1p1/ssh.c 2005-06-12 09:40:53.000000000 +0100
@@ -604,6 +604,17