• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/openssh/

Lines Matching refs:host

6  * Code to connect to a remote host, and to perform the client side of the
91 const char *host, int port)
97 ret = percent_expand(tmp, "h", host, "p", strport,
108 ssh_proxy_fdpass_connect(struct ssh *ssh, const char *host, u_short port,
124 host, port);
186 ssh_proxy_connect(struct ssh *ssh, const char *host, u_short port,
203 host, port);
491 * Opens a TCP/IP connection to the remote server on the given host.
492 * The address of the remote host will be returned in hostaddr.
496 * and %p substituted for host and port, respectively) to use to contact
500 ssh_connect_direct(struct ssh *ssh, const char *host, struct addrinfo *aitop,
520 * Loop through addresses for this host, and try each one in
538 host, ntop, strport);
568 error("ssh: connect to host %s port %s: %s",
569 host, strport, errno == 0 ? "failure" : strerror(errno));
589 ssh_connect(struct ssh *ssh, const char *host, struct addrinfo *addrs,
594 return ssh_connect_direct(ssh, host, addrs, hostaddr, port,
602 return ssh_proxy_fdpass_connect(ssh, host, port,
605 return ssh_proxy_connect(ssh, host, port, options.proxy_command);
657 "Connection closed by remote host");
740 check_host_cert(const char *host, const struct sshkey *key)
745 if (sshkey_cert_check_authority(key, 1, 0, host, &reason) != 0) {
751 "critical options(s)", host);
782 * host keys in known_hosts files. These may have a port number appended.
839 * check whether the supplied host key is valid, return -1 if the key
854 char *ip = NULL, *host = NULL;
867 * Force accepting of the host key for loopback/localhost. The
871 * essentially disables host authentication for localhost; however,
876 debug("Forcing accepting of host key for "
885 get_hostfile_hostname_ipaddr(hostname, hostaddr, port, &host, &ip);
897 load_hostkeys(host_hostkeys, host, user_hostfiles[i]);
899 load_hostkeys(host_hostkeys, host, system_hostfiles[i]);
916 * Check if the host key is present in the user's list of known
940 /* The host is known and the key matches. */
941 debug("Host '%.200s' is known and matches the %s host %s.",
942 host, type, want_cert ? "certificate" : "key");
951 logit("%s host key for IP address "
956 logit("Failed to add the %s host key for IP "
961 logit("Warning: Permanently added the %s host "
990 /* The host is new. */
994 * User has requested strict host key checking. We
995 * will not add the host key automatically. The only
998 error("No %s host key is known for %.200s and you "
999 "have requested strict checking.", type, host);
1008 " known for this host.");
1022 "Matching host key fingerprint"
1026 "No matching host key fingerprint"
1030 "The authenticity of host '%.200s (%s)' can't be "
1035 host, ip, msg1, type, fp,
1050 snprintf(hostline, sizeof(hostline), "%s,%s", host, ip);
1053 /* Add hash of host and IP separately */
1055 host, host_key, options.hash_known_hosts) &&
1059 /* Add unhashed "host,ip" */
1065 r = add_host_to_hostfile(user_hostfiles[0], host,
1067 hostp = host;
1071 logit("Failed to add the host to the list of known "
1081 error("The %s host key for %s is marked as revoked.", type, host);
1083 error("impersonate this host.");
1086 * If strict host key checking is in use, the user will have
1091 error("%s host key for %.200s was revoked and you have "
1092 "requested strict checking.", type, host);
1122 error("The %s host key for %s has changed,", type, host);
1125 error("DNS SPOOFING is happening or the IP address for the host");
1126 error("and its host key have changed at the same time.");
1131 /* The host key has changed. */
1133 error("Add correct host key in %.100s to get rid of this message.",
1140 * If strict host key checking is in use, the user will have
1145 error("%s host key for %.200s has changed and you have "
1146 "requested strict checking.", type, host);
1152 * If strict host key checking has not been requested, allow
1202 fatal("Error: forwarding disabled due to host key "
1207 * This could be done by converting the host key to an
1208 * identifying sentence, tell that the host identifies itself
1221 "Warning: the %s host key for '%.200s' "
1224 type, host, ip, ip_found->file, ip_found->line);
1228 "\nMatching host key in %s:%lu",
1254 free(host);
1278 free(host);
1288 verify_host_key(char *host, struct sockaddr *hostaddr, struct sshkey *host_key)
1297 error("%s: fingerprint host key: %s", __func__, ssh_err(r));
1312 debug("Server host certificate: %s %s, serial %llu "
1320 debug2("Server host certificate hostname: %s",
1324 debug("Server host key: %s %s", sshkey_ssh_name(host_key), fp);
1328 debug2("%s: server host key %s %s matches cached key",
1347 error("Error checking host key %s %s in "
1364 if (verify_host_key_dns(host, hostaddr, plain, &flags) == 0) {
1377 "with the new host key to get rid "
1383 r = check_host_key(host, hostaddr, options.port, host_key, RDRW,
1410 char *host;
1417 host = xstrdup(orighost);
1418 lowercase(host);
1428 debug("Authenticating to %s:%d as '%s'", host, port, server_user);
1429 ssh_kex2(host, hostaddr, port);
1430 ssh_userauth2(local_user, server_user, host, sensitive);
1452 /* print all known host keys for a given host, but skip keys of given type */
1479 logit("WARNING: %s key found for host %s\n"
1483 found->host, found->file, found->line,
1509 error("It is also possible that a host key has just been changed.");
1510 error("The fingerprint for the %s key sent by the remote host is\n%s.",