diff options
author | Daniel P. Berrangé <berrange@redhat.com> | 2021-09-13 17:59:00 +0100 |
---|---|---|
committer | Daniel P. Berrangé <berrange@redhat.com> | 2022-02-16 14:34:16 +0000 |
commit | e3296cc796aeaf319f3ed4e064ec309baf5e4da4 (patch) | |
tree | 01f83df17d420a0128a22b2157ee0ce7acad559f /softmmu | |
parent | ea0f60e6f274ca8ecb45296272b2561e088b6fc8 (diff) | |
download | qemu-e3296cc796aeaf319f3ed4e064ec309baf5e4da4.zip qemu-e3296cc796aeaf319f3ed4e064ec309baf5e4da4.tar.gz qemu-e3296cc796aeaf319f3ed4e064ec309baf5e4da4.tar.bz2 |
block: print the server key type and fingerprint on failure
When validating the server key fingerprint fails, it is difficult for
the user to know what they got wrong. The fingerprint accepted by QEMU
is received in a different format than OpenSSH displays. There can also
be keys for multiple different ciphers in known_hosts. It may not be
obvious which cipher QEMU will use and whether it will be the same
as OpenSSH. Address this by printing the server key type and its
corresponding fingerprint in the format QEMU accepts.
Reviewed-by: Hanna Reitz <hreitz@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Diffstat (limited to 'softmmu')
0 files changed, 0 insertions, 0 deletions