]> git.ipfire.org Git - thirdparty/openssh-portable.git/commitdiff
upstream: log some details on hostkeys that ssh loads for
authordjm@openbsd.org <djm@openbsd.org>
Thu, 6 Jan 2022 22:04:20 +0000 (22:04 +0000)
committerDamien Miller <djm@mindrot.org>
Thu, 6 Jan 2022 22:21:38 +0000 (09:21 +1100)
hostbased authn ok markus@

OpenBSD-Commit-ID: da17061fa1f0e58cb31b88478a40643e18233e38

ssh.c

diff --git a/ssh.c b/ssh.c
index 99e427102d1b5e2433b1e2d67fb9d454e87db180..372f928fc370e7fbcb6429793507ad06cbc5e486 100644 (file)
--- a/ssh.c
+++ b/ssh.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh.c,v 1.571 2022/01/01 05:55:06 jsg Exp $ */
+/* $OpenBSD: ssh.c,v 1.572 2022/01/06 22:04:20 djm Exp $ */
 /*
  * Author: Tatu Ylonen <ylo@cs.hut.fi>
  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -1577,11 +1577,17 @@ main(int ac, char **av)
                fatal_f("pubkey out of array bounds"); \
        check_load(sshkey_load_public(p, &(sensitive_data.keys[o]), NULL), \
            p, "pubkey"); \
+       if (sensitive_data.keys[o] != NULL) \
+               debug2("hostbased key %d: %s key from \"%s\"", o, \
+                   sshkey_ssh_name(sensitive_data.keys[o]), p); \
 } while (0)
 #define L_CERT(p,o) do { \
        if ((o) >= sensitive_data.nkeys) \
                fatal_f("cert out of array bounds"); \
        check_load(sshkey_load_cert(p, &(sensitive_data.keys[o])), p, "cert"); \
+       if (sensitive_data.keys[o] != NULL) \
+               debug2("hostbased key %d: %s cert from \"%s\"", o, \
+                   sshkey_ssh_name(sensitive_data.keys[o]), p); \
 } while (0)
 
                if (options.hostbased_authentication == 1) {