Lines Matching defs:host
6 * Code to connect to a remote host, and to perform the client side of the
89 const char *host, int port)
95 ret = percent_expand(tmp, "h", host, "p", strport,
106 ssh_proxy_fdpass_connect(const char *host, u_short port,
122 host, port);
185 ssh_proxy_connect(const char *host, u_short port, const char *proxy_command)
201 host, port);
415 * Opens a TCP/IP connection to the remote server on the given host.
416 * The address of the remote host will be returned in hostaddr.
422 * and %p substituted for host and port, respectively) to use to contact
426 ssh_connect_direct(const char *host, struct addrinfo *aitop,
444 * Loop through addresses for this host, and try each one in
458 host, ntop, strport);
484 error("ssh: connect to host %s port %s: %s",
485 host, strport, strerror(errno));
504 ssh_connect(const char *host, struct addrinfo *addrs,
509 return ssh_connect_direct(host, addrs, hostaddr, port, family,
515 return ssh_proxy_fdpass_connect(host, port,
518 return ssh_proxy_connect(host, port, options.proxy_command);
596 "Connection closed by remote host");
708 check_host_cert(const char *host, const Key *host_key)
712 if (key_cert_check_authority(host_key, 1, 0, host, &reason) != 0) {
718 "critical options(s)", host);
741 * host keys in known_hosts files. These may have a port number appended.
798 * check whether the supplied host key is valid, return -1 if the key
813 char *ip = NULL, *host = NULL;
826 * Force accepting of the host key for loopback/localhost. The
830 * essentially disables host authentication for localhost; however,
835 debug("Forcing accepting of host key for "
844 get_hostfile_hostname_ipaddr(hostname, hostaddr, port, &host, &ip);
856 load_hostkeys(host_hostkeys, host, user_hostfiles[i]);
858 load_hostkeys(host_hostkeys, host, system_hostfiles[i]);
875 * Check if the host key is present in the user's list of known
899 /* The host is known and the key matches. */
900 debug("Host '%.200s' is known and matches the %s host %s.",
901 host, type, want_cert ? "certificate" : "key");
908 logit("%s host key for IP address "
913 logit("Failed to add the %s host key for IP "
918 logit("Warning: Permanently added the %s host "
928 logit("Host key fingerprint is %s\n%s\n", fp, ra);
947 /* The host is new. */
950 * User has requested strict host key checking. We
951 * will not add the host key automatically. The only
954 error("No %s host key is known for %.200s and you "
955 "have requested strict checking.", type, host);
963 " known for this host.");
977 "Matching host key fingerprint"
981 "No matching host key fingerprint"
985 "The authenticity of host '%.200s (%s)' can't be "
990 host, ip, msg1, type, fp,
1005 snprintf(hostline, sizeof(hostline), "%s,%s", host, ip);
1008 /* Add hash of host and IP separately */
1010 host, host_key, options.hash_known_hosts) &&
1014 /* Add unhashed "host,ip" */
1020 r = add_host_to_hostfile(user_hostfiles[0], host,
1022 hostp = host;
1026 logit("Failed to add the host to the list of known "
1034 error("@ WARNING: REVOKED HOST KEY DETECTED! @");
1036 error("The %s host key for %s is marked as revoked.", type, host);
1038 error("impersonate this host.");
1041 * If strict host key checking is in use, the user will have
1045 error("%s host key for %.200s was revoked and you have "
1046 "requested strict checking.", type, host);
1058 debug("Host certificate authority does not "
1076 error("The %s host key for %s has changed,", type, host);
1079 error("DNS SPOOFING is happening or the IP address for the host");
1080 error("and its host key have changed at the same time.");
1085 /* The host key has changed. */
1087 error("Add correct host key in %.100s to get rid of this message.",
1093 * If strict host key checking is in use, the user will have
1097 error("%s host key for %.200s has changed and you have "
1098 "requested strict checking.", type, host);
1104 * If strict host key checking has not been requested, allow
1154 fatal("Error: forwarding disabled due to host
1159 * This could be done by converting the host key to an
1160 * identifying sentence, tell that the host identifies itself
1173 "Warning: the %s host key for '%.200s' "
1176 type, host, ip, ip_found->file, ip_found->line);
1180 "\nMatching host key in %s:%lu",
1204 free(host);
1227 free(host);
1237 verify_host_key(char *host, struct sockaddr *hostaddr, Key *host_key)
1245 error("%s: fingerprint host key: %s", __func__, ssh_err(r));
1250 debug("Server host key: %s %s",
1254 debug2("%s: server host key %s %s matches cached key",
1267 error("Host key %s %s revoked by file %s",
1273 error("Error checking host key %s %s in "
1290 if (verify_host_key_dns(host, hostaddr, plain, &flags) == 0) {
1303 "with the new host key to get rid "
1309 r = check_host_key(host, hostaddr, options.port, host_key, RDRW,
1335 char *host;
1342 host = xstrdup(orighost);
1343 lowercase(host);
1354 ssh_kex2(host, hostaddr, port);
1355 ssh_userauth2(local_user, server_user, host, sensitive);
1358 ssh_kex(host, hostaddr);
1359 ssh_userauth1(local_user, server_user, host, sensitive);
1385 /* print all known host keys for a given host, but skip keys of given type */
1412 logit("WARNING: %s key found for host %s\n"
1416 found->host, found->file, found->line,
1438 error("@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @");
1442 error("It is also possible that a host key has just been changed.");
1443 error("The fingerprint for the %s key sent by the remote host is\n%s.",