]> andersk Git - openssh.git/commitdiff
- grunk@cvs.openbsd.org 2008/06/12 21:14:46
authordtucker <dtucker>
Thu, 12 Jun 2008 22:57:27 +0000 (22:57 +0000)
committerdtucker <dtucker>
Thu, 12 Jun 2008 22:57:27 +0000 (22:57 +0000)
     [ssh-keygen.c]
     make ssh-keygen -lf show the key type just as ssh-add -l would do it
     ok djm@ markus@

ChangeLog
ssh-keygen.c

index 7b4c13d6c6470930b7dc530bb3084842bdab0e5a..d7966306c4fcec7122b71fd39dce78ff6b793c13 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
      [clientloop.c]
      I was coalescing expected global request confirmation replies at
      the wrong end of the queue - fix; prompted by markus@
+   - grunk@cvs.openbsd.org 2008/06/12 21:14:46
+     [ssh-keygen.c]
+     make ssh-keygen -lf show the key type just as ssh-add -l would do it
+     ok djm@ markus@
   - (dtucker) [clientloop.c serverloop.c]  channel_register_filter now
     takes 2 more args.  with djm@
 
index 02bd530a03c4fe2e116547d8b8dd7c2d73abd124..eca758c6e8c720b7cfdc61b92e780cbc1be372fa 100644 (file)
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-keygen.c,v 1.169 2008/06/11 22:20:46 grunk Exp $ */
+/* $OpenBSD: ssh-keygen.c,v 1.170 2008/06/12 21:14:46 grunk Exp $ */
 /*
  * Author: Tatu Ylonen <ylo@cs.hut.fi>
  * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -525,7 +525,8 @@ do_fingerprint(struct passwd *pw)
        if (public != NULL) {
                fp = key_fingerprint(public, fptype, rep);
                ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART);
-               printf("%u %s %s\n", key_size(public), fp, comment);
+               printf("%u %s %s (%s)\n", key_size(public), fp, comment,
+                   key_type(public));
                if (log_level >= SYSLOG_LEVEL_VERBOSE)
                        printf("%s\n", ra);
                key_free(public);
@@ -589,8 +590,8 @@ do_fingerprint(struct passwd *pw)
                        comment = *cp ? cp : comment;
                        fp = key_fingerprint(public, fptype, rep);
                        ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART);
-                       printf("%u %s %s\n", key_size(public), fp,
-                           comment ? comment : "no comment");
+                       printf("%u %s %s (%s)\n", key_size(public), fp,
+                           comment ? comment : "no comment", key_type(public));
                        if (log_level >= SYSLOG_LEVEL_VERBOSE)
                                printf("%s\n", ra);
                        xfree(ra);
@@ -619,7 +620,8 @@ print_host(FILE *f, const char *name, Key *public, int hash)
                rep =    print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_HEX;
                fp = key_fingerprint(public, fptype, rep);
                ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART);
-               printf("%u %s %s\n%s\n", key_size(public), fp, name, ra);
+               printf("%u %s %s (%s)\n%s\n", key_size(public), fp, name,
+                   key_type(public), ra);
                xfree(ra);
                xfree(fp);
        } else {
This page took 0.097439 seconds and 5 git commands to generate.