diff options
author | Darren Tucker <dtucker@zip.com.au> | 2009-10-07 08:45:48 +1100 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2009-10-07 08:45:48 +1100 |
commit | 9bcd25b78b8764ab27cd807f267ff5d82720a0cf (patch) | |
tree | 80791047321de13c5b111da6c23fd0260ed8c7df | |
parent | 7dc4850ce85a676ede0c070db6e46e022bd852fe (diff) |
- djm@cvs.openbsd.org 2009/08/27 17:33:49
[ssh-keygen.c]
force use of correct hash function for random-art signature display
as it was inheriting the wrong one when bubblebabble signatures were
activated; bz#1611 report and patch from fwojcik+openssh AT besh.com;
ok markus@
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | ssh-keygen.c | 8 |
2 files changed, 10 insertions, 4 deletions
@@ -50,6 +50,12 @@ | |||
50 | [sftp-server.c] | 50 | [sftp-server.c] |
51 | allow setting an explicit umask on the commandline to override whatever | 51 | allow setting an explicit umask on the commandline to override whatever |
52 | default the user has. bz#1229; ok dtucker@ deraadt@ markus@ | 52 | default the user has. bz#1229; ok dtucker@ deraadt@ markus@ |
53 | - djm@cvs.openbsd.org 2009/08/27 17:33:49 | ||
54 | [ssh-keygen.c] | ||
55 | force use of correct hash function for random-art signature display | ||
56 | as it was inheriting the wrong one when bubblebabble signatures were | ||
57 | activated; bz#1611 report and patch from fwojcik+openssh AT besh.com; | ||
58 | ok markus@ | ||
53 | 59 | ||
54 | 20091002 | 60 | 20091002 |
55 | - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps. | 61 | - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps. |
diff --git a/ssh-keygen.c b/ssh-keygen.c index da5db9845..4f90ac5c1 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-keygen.c,v 1.174 2009/06/22 05:39:28 dtucker Exp $ */ | 1 | /* $OpenBSD: ssh-keygen.c,v 1.175 2009/08/27 17:33:49 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -524,7 +524,7 @@ do_fingerprint(struct passwd *pw) | |||
524 | public = key_load_public(identity_file, &comment); | 524 | public = key_load_public(identity_file, &comment); |
525 | if (public != NULL) { | 525 | if (public != NULL) { |
526 | fp = key_fingerprint(public, fptype, rep); | 526 | fp = key_fingerprint(public, fptype, rep); |
527 | ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART); | 527 | ra = key_fingerprint(public, SSH_FP_MD5, SSH_FP_RANDOMART); |
528 | printf("%u %s %s (%s)\n", key_size(public), fp, comment, | 528 | printf("%u %s %s (%s)\n", key_size(public), fp, comment, |
529 | key_type(public)); | 529 | key_type(public)); |
530 | if (log_level >= SYSLOG_LEVEL_VERBOSE) | 530 | if (log_level >= SYSLOG_LEVEL_VERBOSE) |
@@ -589,7 +589,7 @@ do_fingerprint(struct passwd *pw) | |||
589 | } | 589 | } |
590 | comment = *cp ? cp : comment; | 590 | comment = *cp ? cp : comment; |
591 | fp = key_fingerprint(public, fptype, rep); | 591 | fp = key_fingerprint(public, fptype, rep); |
592 | ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART); | 592 | ra = key_fingerprint(public, SSH_FP_MD5, SSH_FP_RANDOMART); |
593 | printf("%u %s %s (%s)\n", key_size(public), fp, | 593 | printf("%u %s %s (%s)\n", key_size(public), fp, |
594 | comment ? comment : "no comment", key_type(public)); | 594 | comment ? comment : "no comment", key_type(public)); |
595 | if (log_level >= SYSLOG_LEVEL_VERBOSE) | 595 | if (log_level >= SYSLOG_LEVEL_VERBOSE) |
@@ -619,7 +619,7 @@ print_host(FILE *f, const char *name, Key *public, int hash) | |||
619 | fptype = print_bubblebabble ? SSH_FP_SHA1 : SSH_FP_MD5; | 619 | fptype = print_bubblebabble ? SSH_FP_SHA1 : SSH_FP_MD5; |
620 | rep = print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_HEX; | 620 | rep = print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_HEX; |
621 | fp = key_fingerprint(public, fptype, rep); | 621 | fp = key_fingerprint(public, fptype, rep); |
622 | ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART); | 622 | ra = key_fingerprint(public, SSH_FP_MD5, SSH_FP_RANDOMART); |
623 | printf("%u %s %s (%s)\n", key_size(public), fp, name, | 623 | printf("%u %s %s (%s)\n", key_size(public), fp, name, |
624 | key_type(public)); | 624 | key_type(public)); |
625 | if (log_level >= SYSLOG_LEVEL_VERBOSE) | 625 | if (log_level >= SYSLOG_LEVEL_VERBOSE) |