summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog6
-rw-r--r--ssh-keygen.c12
2 files changed, 12 insertions, 6 deletions
diff --git a/ChangeLog b/ChangeLog
index 652266e3f..c1f93fe73 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -129,6 +129,10 @@
129 [clientloop.c] 129 [clientloop.c]
130 I was coalescing expected global request confirmation replies at 130 I was coalescing expected global request confirmation replies at
131 the wrong end of the queue - fix; prompted by markus@ 131 the wrong end of the queue - fix; prompted by markus@
132 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
133 [ssh-keygen.c]
134 make ssh-keygen -lf show the key type just as ssh-add -l would do it
135 ok djm@ markus@
132 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now 136 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
133 takes 2 more args. with djm@ 137 takes 2 more args. with djm@
134 138
@@ -4293,4 +4297,4 @@
4293 OpenServer 6 and add osr5bigcrypt support so when someone migrates 4297 OpenServer 6 and add osr5bigcrypt support so when someone migrates
4294 passwords between UnixWare and OpenServer they will still work. OK dtucker@ 4298 passwords between UnixWare and OpenServer they will still work. OK dtucker@
4295 4299
4296$Id: ChangeLog,v 1.4990 2008/06/12 22:56:01 dtucker Exp $ 4300$Id: ChangeLog,v 1.4991 2008/06/12 22:57:27 dtucker Exp $
diff --git a/ssh-keygen.c b/ssh-keygen.c
index 02bd530a0..eca758c6e 100644
--- a/ssh-keygen.c
+++ b/ssh-keygen.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh-keygen.c,v 1.169 2008/06/11 22:20:46 grunk Exp $ */ 1/* $OpenBSD: ssh-keygen.c,v 1.170 2008/06/12 21:14:46 grunk Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -525,7 +525,8 @@ do_fingerprint(struct passwd *pw)
525 if (public != NULL) { 525 if (public != NULL) {
526 fp = key_fingerprint(public, fptype, rep); 526 fp = key_fingerprint(public, fptype, rep);
527 ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART); 527 ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART);
528 printf("%u %s %s\n", key_size(public), fp, comment); 528 printf("%u %s %s (%s)\n", key_size(public), fp, comment,
529 key_type(public));
529 if (log_level >= SYSLOG_LEVEL_VERBOSE) 530 if (log_level >= SYSLOG_LEVEL_VERBOSE)
530 printf("%s\n", ra); 531 printf("%s\n", ra);
531 key_free(public); 532 key_free(public);
@@ -589,8 +590,8 @@ do_fingerprint(struct passwd *pw)
589 comment = *cp ? cp : comment; 590 comment = *cp ? cp : comment;
590 fp = key_fingerprint(public, fptype, rep); 591 fp = key_fingerprint(public, fptype, rep);
591 ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART); 592 ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART);
592 printf("%u %s %s\n", key_size(public), fp, 593 printf("%u %s %s (%s)\n", key_size(public), fp,
593 comment ? comment : "no comment"); 594 comment ? comment : "no comment", key_type(public));
594 if (log_level >= SYSLOG_LEVEL_VERBOSE) 595 if (log_level >= SYSLOG_LEVEL_VERBOSE)
595 printf("%s\n", ra); 596 printf("%s\n", ra);
596 xfree(ra); 597 xfree(ra);
@@ -619,7 +620,8 @@ print_host(FILE *f, const char *name, Key *public, int hash)
619 rep = print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_HEX; 620 rep = print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_HEX;
620 fp = key_fingerprint(public, fptype, rep); 621 fp = key_fingerprint(public, fptype, rep);
621 ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART); 622 ra = key_fingerprint(public, fptype, SSH_FP_RANDOMART);
622 printf("%u %s %s\n%s\n", key_size(public), fp, name, ra); 623 printf("%u %s %s (%s)\n%s\n", key_size(public), fp, name,
624 key_type(public), ra);
623 xfree(ra); 625 xfree(ra);
624 xfree(fp); 626 xfree(fp);
625 } else { 627 } else {