version 1.23, 2015/01/28 11:07:25 |
version 1.24, 2015/01/28 22:36:00 |
|
|
|
|
if (host_status == HOST_OK) { |
if (host_status == HOST_OK) { |
if (key_is_cert(key)) { |
if (key_is_cert(key)) { |
fp = key_fingerprint(key->cert->signature_key, |
if ((fp = sshkey_fingerprint(key->cert->signature_key, |
options.fingerprint_hash, SSH_FP_DEFAULT); |
options.fingerprint_hash, SSH_FP_DEFAULT)) == NULL) |
|
fatal("%s: sshkey_fingerprint fail", __func__); |
verbose("Accepted certificate ID \"%s\" signed by " |
verbose("Accepted certificate ID \"%s\" signed by " |
"%s CA %s from %s@%s", key->cert->key_id, |
"%s CA %s from %s@%s", key->cert->key_id, |
key_type(key->cert->signature_key), fp, |
key_type(key->cert->signature_key), fp, |
cuser, lookup); |
cuser, lookup); |
} else { |
} else { |
fp = key_fingerprint(key, options.fingerprint_hash, |
if ((fp = sshkey_fingerprint(key, |
SSH_FP_DEFAULT); |
options.fingerprint_hash, SSH_FP_DEFAULT)) == NULL) |
|
fatal("%s: sshkey_fingerprint fail", __func__); |
verbose("Accepted %s public key %s from %s@%s", |
verbose("Accepted %s public key %s from %s@%s", |
key_type(key), fp, cuser, lookup); |
key_type(key), fp, cuser, lookup); |
} |
} |