Displaying 6 results from an estimated 6 matches for "host_found".
Did you mean:
home_found
2015 Feb 19
2
Proposal: Allow HostKeyAlias to be used in hostname check against certificate principal.
Howdy --
I have a number of servers with host keys validated by certificates.
These systems are behind a load-balanced frontend, and the
certificates are signed as valid for the DNS name used by that common
frontend address.
This works well for the primary use case of the systems; however, when
wishing to address only a single unit within the pool, the certificate
cannot be used to validate that
2006 May 15
0
[PATCH 3/12] bug fix: openssh-4.3p2 resource leak
...openssh-4.3p2-kylie/hostfile.c 2006-05-04 13:51:10.000000000 -0500
@@ -254,8 +254,10 @@ check_host_in_hostfile_by_key_or_type(co
if (key == NULL) {
/* we found a key of the requested type */
- if (found->type == keytype)
+ if (found->type == keytype) {
+ fclose(f);
return HOST_FOUND;
+ }
continue;
}
2004 Oct 03
0
[patch] tell user about hosts with same key
...NULL)
+ free(thishost);
+
+ return hostlist;
+}
+
int
lookup_key_in_hostfile_by_type(const char *filename, const char *host,
int keytype, Key *found, int *numret)
--- hostfile.h 2004/10/02 21:45:51 1.1
+++ hostfile.h 2004/10/02 21:56:52
@@ -18,11 +18,18 @@
HOST_OK, HOST_NEW, HOST_CHANGED, HOST_FOUND
} HostStatus;
+typedef struct HostList {
+ char *host;
+ struct HostList *next;
+} HostList;
+
int hostfile_read_key(char **, u_int *, Key *);
HostStatus check_host_in_hostfile(const char *, const char *,
const Key *, Key *, int *);
int add_host_to_hostfile(const char *, const ch...
2024 Oct 14
2
[RFC] Preferentially TOFU certificate authorities rather than host keys
...*cinfo,
HostStatus host_status = -1, ip_status = -1;
struct sshkey *raw_key = NULL;
char *ip = NULL, *host = NULL;
- char hostline[1000], *hostp, *fp, *ra;
+ char hostline[1000], *hostp, *fp, *cafp, *ra;
char msg[1024];
const char *type, *fail_reason = NULL;
const struct hostkey_entry *host_found = NULL, *ip_found = NULL;
@@ -973,6 +973,7 @@ check_host_key(char *hostname, const struct ssh_conn_info *cinfo,
int r, want_cert = sshkey_is_cert(host_key), host_ip_differ = 0;
int hostkey_trusted = 0; /* Known or explicitly accepted by user */
struct hostkeys *host_hostkeys, *ip_hostkeys;
+...
2012 Dec 27
3
[PATCH] hostfile: list known names (if any) for new hostkeys
...t.c
+++ b/sshconnect.c
@@ -718,13 +718,13 @@ check_host_key(char *hostname, struct sockaddr *hostaddr, u_short port,
Key *raw_key = NULL;
char *ip = NULL, *host = NULL;
char hostline[1000], *hostp, *fp, *ra;
- char msg[1024];
+ char msg[2048];
const char *type;
const struct hostkey_entry *host_found, *ip_found;
int len, cancelled_forwarding = 0;
int local = sockaddr_is_local(hostaddr);
int r, want_cert = key_is_cert(host_key), host_ip_differ = 0;
- struct hostkeys *host_hostkeys, *ip_hostkeys;
+ struct hostkeys *host_hostkeys, *ip_hostkeys, *key_hostkeys = NULL;
u_int i;
/*
@@ -758...
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...* XXX Should permit the user to change to use the new id.
- * This could be done by converting the host key to an
- * identifying sentence, tell that the host identifies itself
- * by that sentence, and ask the user if he/she whishes to
- * accept the authentication.
- */
break;
case HOST_FOUND:
fatal("internal error");
@@ -1014,6 +957,83 @@
return (found);
}
+static int
+ask_connect_with_new_key(const char *host, Key *host_key, const char* ip,
+ const char* type, HostStatus ip_status, const char *user_hostfile)
+{
+ char *fp;
+ const char *hostp;
+ int r;
+ char hostli...