]> andersk Git - openssh.git/blobdiff - ssh-keygen.c
- djm@cvs.openbsd.org 2001/03/13 22:42:54
[openssh.git] / ssh-keygen.c
index dbb46ac90453f5dace6bec65348d85e839e947d6..b9ea0178173268192d54a0e1bb8c92b34167c755 100644 (file)
@@ -12,7 +12,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh-keygen.c,v 1.46 2001/03/09 03:14:39 deraadt Exp $");
+RCSID("$OpenBSD: ssh-keygen.c,v 1.50 2001/03/12 22:02:02 markus Exp $");
 
 #include <openssl/evp.h>
 #include <openssl/pem.h>
@@ -46,6 +46,7 @@ int quiet = 0;
 
 /* Flag indicating that we just want to see the key fingerprint */
 int print_fingerprint = 0;
+int print_bubblebabble = 0;
 
 /* The identity file name, given on the command line or entered by the user. */
 char identity_file[1024];
@@ -325,13 +326,15 @@ do_print_public(struct passwd *pw)
 void
 do_fingerprint(struct passwd *pw)
 {
-
        FILE *f;
        Key *public;
-       char *comment = NULL, *cp, *ep, line[16*1024];
-       int i, skip = 0, num = 1, invalid = 1, success = 0;
+       char *comment = NULL, *cp, *ep, line[16*1024], *fp;
+       int i, skip = 0, num = 1, invalid = 1, success = 0, rep, type;
        struct stat st;
 
+       type = print_bubblebabble ? SSH_FP_SHA1 : SSH_FP_MD5;
+       rep =  print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_HEX;
+
        if (!have_identity)
                ask_filename(pw, "Enter file in which the key is");
        if (stat(identity_file, &st) < 0) {
@@ -350,9 +353,12 @@ do_fingerprint(struct passwd *pw)
                        debug("try_load_public_key KEY_UNSPEC failed");
        }
        if (success) {
-               printf("%d %s %s\n", key_size(public), key_fingerprint(public), comment);
+               fp = key_fingerprint(public, type, rep);
+               printf("%d %s %s\n", key_size(public),
+                   fp, comment);
                key_free(public);
                xfree(comment);
+               xfree(fp);
                exit(0);
        }
 
@@ -403,9 +409,10 @@ do_fingerprint(struct passwd *pw)
                                }
                        }
                        comment = *cp ? cp : comment;
-                       printf("%d %s %s\n", key_size(public),
-                           key_fingerprint(public),
+                       fp = key_fingerprint(public, type, rep);
+                       printf("%d %s %s\n", key_size(public), fp,
                            comment ? comment : "no comment");
+                       xfree(fp);
                        invalid = 0;
                }
                fclose(f);
@@ -646,7 +653,7 @@ main(int ac, char **av)
                exit(1);
        }
 
-       while ((opt = getopt(ac, av, "dqpclRxXyb:f:t:P:N:C:")) != -1) {
+       while ((opt = getopt(ac, av, "dqpclBRxXyb:f:t:P:N:C:")) != -1) {
                switch (opt) {
                case 'b':
                        bits = atoi(optarg);
@@ -660,6 +667,10 @@ main(int ac, char **av)
                        print_fingerprint = 1;
                        break;
 
+               case 'B':
+                       print_bubblebabble = 1;
+                       break;
+
                case 'p':
                        change_passphrase = 1;
                        break;
@@ -727,7 +738,7 @@ main(int ac, char **av)
                printf("Can only have one of -p and -c.\n");
                usage();
        }
-       if (print_fingerprint)
+       if (print_fingerprint || print_bubblebabble)
                do_fingerprint(pw);
        if (change_passphrase)
                do_change_passphrase(pw);
@@ -846,10 +857,12 @@ passphrase_again:
        fclose(f);
 
        if (!quiet) {
+               char *fp = key_fingerprint(public, SSH_FP_MD5, SSH_FP_HEX);
                printf("Your public key has been saved in %s.\n",
                    identity_file);
                printf("The key fingerprint is:\n");
-               printf("%s %s\n", key_fingerprint(public), comment);
+               printf("%s %s\n", fp, comment);
+               xfree(fp);
        }
 
        key_free(public);
This page took 0.040104 seconds and 4 git commands to generate.