version 1.391, 2020/01/24 05:33:01 |
version 1.392, 2020/01/25 00:03:36 |
|
|
int i, nkeys; |
int i, nkeys; |
enum sshkey_fp_rep rep; |
enum sshkey_fp_rep rep; |
int fptype; |
int fptype; |
char *fp, *ra; |
char *fp, *ra, **comments = NULL; |
|
|
fptype = print_bubblebabble ? SSH_DIGEST_SHA1 : fingerprint_hash; |
fptype = print_bubblebabble ? SSH_DIGEST_SHA1 : fingerprint_hash; |
rep = print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_DEFAULT; |
rep = print_bubblebabble ? SSH_FP_BUBBLEBABBLE : SSH_FP_DEFAULT; |
|
|
pkcs11_init(1); |
pkcs11_init(1); |
nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys); |
nkeys = pkcs11_add_provider(pkcs11provider, NULL, &keys, &comments); |
if (nkeys <= 0) |
if (nkeys <= 0) |
fatal("cannot read public key from pkcs11"); |
fatal("cannot read public key from pkcs11"); |
for (i = 0; i < nkeys; i++) { |
for (i = 0; i < nkeys; i++) { |
|
|
free(fp); |
free(fp); |
} else { |
} else { |
(void) sshkey_write(keys[i], stdout); /* XXX check */ |
(void) sshkey_write(keys[i], stdout); /* XXX check */ |
fprintf(stdout, "\n"); |
fprintf(stdout, "%s%s\n", |
|
*(comments[i]) == '\0' ? "" : " ", comments[i]); |
} |
} |
|
free(comments[i]); |
sshkey_free(keys[i]); |
sshkey_free(keys[i]); |
} |
} |
|
free(comments); |
free(keys); |
free(keys); |
pkcs11_terminate(); |
pkcs11_terminate(); |
exit(0); |
exit(0); |
|
|
fatal("Couldn't load CA public key \"%s\": %s", |
fatal("Couldn't load CA public key \"%s\": %s", |
path, ssh_err(r)); |
path, ssh_err(r)); |
|
|
nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, &keys); |
nkeys = pkcs11_add_provider(pkcs11provider, identity_passphrase, |
|
&keys, NULL); |
debug3("%s: %d keys", __func__, nkeys); |
debug3("%s: %d keys", __func__, nkeys); |
if (nkeys <= 0) |
if (nkeys <= 0) |
fatal("cannot read public key from pkcs11"); |
fatal("cannot read public key from pkcs11"); |