summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect.h
diff options
context:
space:
mode:
authordjm <djm@openbsd.org>2020-10-03 08:11:28 +0000
committerdjm <djm@openbsd.org>2020-10-03 08:11:28 +0000
commitb6892e612c29e12a2cb779cc39d66a7bff97ddb5 (patch)
treed4140fb364f6ee93aedb440508b7434da97c79d4 /usr.bin/ssh/sshconnect.h
parentadd kcov remote interrupt coverage test (diff)
downloadwireguard-openbsd-b6892e612c29e12a2cb779cc39d66a7bff97ddb5.tar.xz
wireguard-openbsd-b6892e612c29e12a2cb779cc39d66a7bff97ddb5.zip
record when the host key checking code downgrades a certificate host
key to a plain key. This occurs when the user connects to a host with a certificate host key but no corresponding CA key configured in known_hosts; feedback and ok markus@
Diffstat (limited to 'usr.bin/ssh/sshconnect.h')
-rw-r--r--usr.bin/ssh/sshconnect.h4
1 files changed, 2 insertions, 2 deletions
diff --git a/usr.bin/ssh/sshconnect.h b/usr.bin/ssh/sshconnect.h
index 7c091e2b1bf..6d63075e963 100644
--- a/usr.bin/ssh/sshconnect.h
+++ b/usr.bin/ssh/sshconnect.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: sshconnect.h,v 1.40 2020/01/25 07:17:18 djm Exp $ */
+/* $OpenBSD: sshconnect.h,v 1.41 2020/10/03 08:11:28 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -41,7 +41,7 @@ void ssh_kill_proxy_command(void);
void ssh_login(struct ssh *, Sensitive *, const char *,
struct sockaddr *, u_short, struct passwd *, int);
-int verify_host_key(char *, struct sockaddr *, struct sshkey *);
+int verify_host_key(char *, struct sockaddr *, struct sshkey *, int *);
void get_hostfile_hostname_ipaddr(char *, struct sockaddr *, u_short,
char **, char **);