version 1.256, 2015/01/20 23:14:00 |
version 1.257, 2015/01/26 03:04:46 |
|
|
int len, cancelled_forwarding = 0; |
int len, cancelled_forwarding = 0; |
int local = sockaddr_is_local(hostaddr); |
int local = sockaddr_is_local(hostaddr); |
int r, want_cert = key_is_cert(host_key), host_ip_differ = 0; |
int r, want_cert = key_is_cert(host_key), host_ip_differ = 0; |
|
int hostkey_trusted = 0; /* Known or explicitly accepted by user */ |
struct hostkeys *host_hostkeys, *ip_hostkeys; |
struct hostkeys *host_hostkeys, *ip_hostkeys; |
u_int i; |
u_int i; |
|
|
|
|
free(ra); |
free(ra); |
free(fp); |
free(fp); |
} |
} |
|
hostkey_trusted = 1; |
break; |
break; |
case HOST_NEW: |
case HOST_NEW: |
if (options.host_key_alias == NULL && port != 0 && |
if (options.host_key_alias == NULL && port != 0 && |
|
|
free(fp); |
free(fp); |
if (!confirm(msg)) |
if (!confirm(msg)) |
goto fail; |
goto fail; |
|
hostkey_trusted = 1; /* user explicitly confirmed */ |
} |
} |
/* |
/* |
* If not in strict mode, add the key automatically to the |
* If not in strict mode, add the key automatically to the |
|
|
} else { |
} else { |
logit("%s", msg); |
logit("%s", msg); |
} |
} |
|
} |
|
|
|
if (!hostkey_trusted && options.update_hostkeys) { |
|
debug("%s: hostkey not known or explicitly trusted: " |
|
"disabling UpdateHostkeys", __func__); |
|
options.update_hostkeys = 0; |
} |
} |
|
|
free(ip); |
free(ip); |