=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/clientloop.c,v retrieving revision 1.336 retrieving revision 1.337 diff -u -r1.336 -r1.337 --- src/usr.bin/ssh/clientloop.c 2020/01/29 07:51:30 1.336 +++ src/usr.bin/ssh/clientloop.c 2020/01/29 08:17:49 1.337 @@ -1,4 +1,4 @@ -/* $OpenBSD: clientloop.c,v 1.336 2020/01/29 07:51:30 djm Exp $ */ +/* $OpenBSD: clientloop.c,v 1.337 2020/01/29 08:17:49 djm Exp $ */ /* * Author: Tatu Ylonen * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland @@ -1874,11 +1874,8 @@ } static void -hostkey_change_preamble(void) +hostkey_change_preamble(LogLevel loglevel) { - LogLevel loglevel = options.update_hostkeys == SSH_UPDATE_HOSTKEYS_ASK ? - SYSLOG_LEVEL_INFO : SYSLOG_LEVEL_VERBOSE; - do_log2(loglevel, "The server has updated its host keys."); do_log2(loglevel, "These changes were verified by the server's " "existing trusted key."); @@ -1901,7 +1898,7 @@ options.fingerprint_hash, SSH_FP_DEFAULT)) == NULL) fatal("%s: sshkey_fingerprint failed", __func__); if (first && asking) - hostkey_change_preamble(); + hostkey_change_preamble(loglevel); do_log2(loglevel, "Learned new hostkey: %s %s", sshkey_type(ctx->keys[i]), fp); first = 0; @@ -1912,7 +1909,7 @@ options.fingerprint_hash, SSH_FP_DEFAULT)) == NULL) fatal("%s: sshkey_fingerprint failed", __func__); if (first && asking) - hostkey_change_preamble(); + hostkey_change_preamble(loglevel); do_log2(loglevel, "Deprecating obsolete hostkey: %s %s", sshkey_type(ctx->old_keys[i]), fp); first = 0;