search for: host_lin

Displaying 5 results from an estimated 5 matches for "host_lin".

Did you mean: host_len
2003 Mar 04
0
hashing known_hosts
...t;openssl/bn.h> +#ifdef HASH_KNOWN_HOSTS +#include <openssl/sha.h> +#include "uuencode.h" +#endif + #include "ssh.h" #include "xmalloc.h" #include "rsa.h" @@ -505,6 +510,11 @@ check_host_key(char *host, struct sockad char msg[1024]; int len, host_line, ip_line; const char *host_file = NULL, *ip_file = NULL; +#ifdef HASH_KNOWN_HOSTS + unsigned char md[SHA_DIGEST_LENGTH]; + char uu[SHA_DIGEST_LENGTH*2]; +#endif + /* * Force accepting of the host key for loopback/localhost. The @@ -579,6 +589,26 @@ check_host_key(char *host,...
2010 Dec 09
0
[PATCH] mention ssh-keyscan in remote host fingerprint warning
...ssh-keygen -f \"%s\" -R %d", ip_file, ip_line); + } } /* The host key has changed. */ warn_changed_key(host_key); error("Add correct host key in %.100s to get rid of this message.", user_hostfile); error("Offending key in %s:%d", host_file, host_line); + error(" remove with: ssh-keygen -f \"%s\" -R %d", host_file, host_line); /* * If strict host key checking is in use, the user will have
2010 Dec 09
7
[Bug 1843] New: ssh should mention ssh-keyscan in remote host fingerprint warning
https://bugzilla.mindrot.org/show_bug.cgi?id=1843 Summary: ssh should mention ssh-keyscan in remote host fingerprint warning Product: Portable OpenSSH Version: 5.6p1 Platform: All OS/Version: All Status: NEW Severity: minor Priority: P2 Component: ssh AssignedTo: unassigned-bugs
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...or("Offending key for IP in %s:%d", ip_file, ip_line); } + /* The host key has changed. */ warn_changed_key(host_key); error("Add correct host key in %.100s to get rid of this message.", user_hostfile); error("Offending key in %s:%d", host_file, host_line); - - /* - * If strict host key checking is in use, the user will have - * to edit the key manually and we can only abort. - */ - if (options.strict_host_key_checking) { + + /* Ask the user whether to accept the new host key */ + if (options.offending_key_override && options.st...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi, I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with FIPS 140-2 OpenSSL. These are based on previously reported patches by Steve Marquess <marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>, for ver. OpenSSH 3.8. Note that these patches are NOT OFFICIAL, and MAY be used freely by anyone. Issues [partially] handled: SSL FIPS Self test. RC4,