Displaying 4 results from an estimated 4 matches for "host_fil".
Did you mean:
host_file
2003 Mar 04
0
hashing known_hosts
...KNOWN_HOSTS
+#include <openssl/sha.h>
+#include "uuencode.h"
+#endif
+
#include "ssh.h"
#include "xmalloc.h"
#include "rsa.h"
@@ -505,6 +510,11 @@ check_host_key(char *host, struct sockad
char msg[1024];
int len, host_line, ip_line;
const char *host_file = NULL, *ip_file = NULL;
+#ifdef HASH_KNOWN_HOSTS
+ unsigned char md[SHA_DIGEST_LENGTH];
+ char uu[SHA_DIGEST_LENGTH*2];
+#endif
+
/*
* Force accepting of the host key for loopback/localhost. The
@@ -579,6 +589,26 @@ check_host_key(char *host, struct sockad
* hosts or in th...
2010 Dec 09
0
[PATCH] mention ssh-keyscan in remote host fingerprint warning
...move with: ssh-keygen -f \"%s\" -R %d", ip_file, ip_line);
+ }
}
/* The host key has changed. */
warn_changed_key(host_key);
error("Add correct host key in %.100s to get rid of this message.",
user_hostfile);
error("Offending key in %s:%d", host_file, host_line);
+ error(" remove with: ssh-keygen -f \"%s\" -R %d", host_file, host_line);
/*
* If strict host key checking is in use, the user will have
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...W)
error("Offending key for IP in %s:%d", ip_file, ip_line);
}
+
/* The host key has changed. */
warn_changed_key(host_key);
error("Add correct host key in %.100s to get rid of this message.",
user_hostfile);
error("Offending key in %s:%d", host_file, host_line);
-
- /*
- * If strict host key checking is in use, the user will have
- * to edit the key manually and we can only abort.
- */
- if (options.strict_host_key_checking) {
+
+ /* Ask the user whether to accept the new host key */
+ if (options.offending_key_override &&...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,