version 1.22, 2000/09/07 20:27:54 |
version 1.23, 2000/11/12 19:50:38 |
|
|
Key *public; |
Key *public; |
char *comment; |
char *comment; |
|
|
public = key_new(KEY_RSA); |
public = key_new(KEY_RSA1); |
if (!load_public_key(filename, public, &comment)) { |
if (!load_public_key(filename, public, &comment)) { |
key_free(public); |
key_free(public); |
public = key_new(KEY_DSA); |
public = key_new(KEY_UNSPEC); |
if (!try_load_public_key(filename, public, &comment)) { |
if (!try_load_public_key(filename, public, &comment)) { |
printf("Bad key file %s\n", filename); |
printf("Bad key file %s\n", filename); |
return; |
return; |
|
|
char buf[1024], msg[1024]; |
char buf[1024], msg[1024]; |
int success; |
int success; |
int interactive = isatty(STDIN_FILENO); |
int interactive = isatty(STDIN_FILENO); |
int type = KEY_RSA; |
int type = KEY_RSA1; |
|
|
if (stat(filename, &st) < 0) { |
if (stat(filename, &st) < 0) { |
perror(filename); |
perror(filename); |
|
|
* try to load the public key. right now this only works for RSA, |
* try to load the public key. right now this only works for RSA, |
* since DSA keys are fully encrypted |
* since DSA keys are fully encrypted |
*/ |
*/ |
public = key_new(KEY_RSA); |
public = key_new(KEY_RSA1); |
if (!load_public_key(filename, public, &saved_comment)) { |
if (!load_public_key(filename, public, &saved_comment)) { |
/* ok, so we will asume this is a DSA key */ |
/* ok, so we will assume this is 'some' key */ |
type = KEY_DSA; |
type = KEY_UNSPEC; |
saved_comment = xstrdup(filename); |
saved_comment = xstrdup(filename); |
} |
} |
key_free(public); |
key_free(public); |
|
|
key = ssh_get_next_identity(ac, &comment, version)) { |
key = ssh_get_next_identity(ac, &comment, version)) { |
had_identities = 1; |
had_identities = 1; |
if (fp) { |
if (fp) { |
printf("%d %s %s\n", |
printf("%d %s %s (%s)\n", |
key_size(key), key_fingerprint(key), comment); |
key_size(key), key_fingerprint(key), |
|
comment, key_type(key)); |
} else { |
} else { |
if (!key_write(key, stdout)) |
if (!key_write(key, stdout)) |
fprintf(stderr, "key_write failed"); |
fprintf(stderr, "key_write failed"); |
|
|
int i; |
int i; |
int deleting = 0; |
int deleting = 0; |
|
|
/* check if RSA support exists */ |
|
if (rsa_alive() == 0) { |
|
extern char *__progname; |
|
|
|
fprintf(stderr, |
|
"%s: no RSA support in libssl and libcrypto. See ssl(8).\n", |
|
__progname); |
|
exit(1); |
|
} |
|
SSLeay_add_all_algorithms(); |
SSLeay_add_all_algorithms(); |
|
|
/* At first, get a connection to the authentication agent. */ |
/* At first, get a connection to the authentication agent. */ |