diff --git a/doc/guided_tour.dox b/doc/guided_tour.dox index 1a41d6cb..e98b5e0d 100644 --- a/doc/guided_tour.dox +++ b/doc/guided_tour.dox @@ -190,7 +190,6 @@ int verify_knownhost(ssh_session session) ssh_key srv_pubkey = NULL; size_t hlen; char buf[10]; - char *hexa = NULL; char *p = NULL; int cmp; int rc; @@ -201,7 +200,7 @@ int verify_knownhost(ssh_session session) } rc = ssh_get_publickey_hash(srv_pubkey, - SSH_PUBLICKEY_HASH_SHA1, + SSH_PUBLICKEY_HASH_SHA256, &hash, &hlen); ssh_key_free(srv_pubkey); @@ -217,7 +216,7 @@ int verify_knownhost(ssh_session session) break; case SSH_KNOWN_HOSTS_CHANGED: fprintf(stderr, "Host key for server changed: it is now:\n"); - ssh_print_hexa("Public key hash", hash, hlen); + ssh_print_hash(SSH_PUBLICKEY_HASH_SHA256, hash, hlen); fprintf(stderr, "For security reasons, connection will be stopped\n"); ssh_clean_pubkey_hash(&hash); @@ -238,10 +237,9 @@ int verify_knownhost(ssh_session session) /* FALL THROUGH to SSH_SERVER_NOT_KNOWN behavior */ case SSH_KNOWN_HOSTS_UNKNOWN: - hexa = ssh_get_hexa(hash, hlen); fprintf(stderr,"The server is unknown. Do you trust the host key?\n"); - fprintf(stderr, "Public key hash: %s\n", hexa); - ssh_string_free_char(hexa); + fprintf(stderr, "Public key hash: "); + ssh_print_hash(SSH_PUBLICKEY_HASH_SHA256, hash, hlen); ssh_clean_pubkey_hash(&hash); p = fgets(buf, sizeof(buf), stdin); if (p == NULL) {