Displaying 4 results from an estimated 4 matches for "fingerprint_private".
2020 Apr 15
2
[PATCH] regression of comment extraction in private key file without passphrase
...-l -f test_dsa
1024 SHA256:/E/JUVD3FO4vHYs+8RfXJW+ah4H4bHcBrCRKFcfZSJk no comment (DSA)
It is due to the fact that the 'sshkey_load_public' function is now
finishing by sshkey_load_public_from_private, which is not failing on a
(new format) private file. Previously, if did fail and so the
fingerprint_private function was calling sshkey_load_private without
passphrase as a fallback.
I suggest to move the fallback inside the sshkey_load_public, so to call
the sshkey_load_private without passphrase in the sshkey_load_public
before extracting the public key from the private file.
Here is the suggested p...
2020 Apr 17
2
[PATCH] regression of comment extraction in private key file without passphrase
...8RfXJW+ah4H4bHcBrCRKFcfZSJk no comment (DSA)
>>
>> It is due to the fact that the 'sshkey_load_public' function is now
>> finishing by sshkey_load_public_from_private, which is not failing on a
>> (new format) private file. Previously, if did fail and so the
>> fingerprint_private function was calling sshkey_load_private without
>> passphrase as a fallback.
>>
>>
>> I suggest to move the fallback inside the sshkey_load_public, so to call
>> the sshkey_load_private without passphrase in the sshkey_load_public
>> before extracting the public...
2019 Aug 06
2
[PATCH v2] Remove sshkey_load_private()
...lse
pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN);
- r = sshkey_load_private(filename, pass, &prv, NULL);
+ r = sshkey_load_private_type(KEY_UNSPEC, filename, pass, &prv, NULL);
explicit_bzero(pass, strlen(pass));
free(pass);
if (r != 0)
@@ -855,7 +856,7 @@ fingerprint_private(const char *path)
fatal("%s: %s", path, strerror(errno));
if ((r = sshkey_load_public(path, &public, &comment)) != 0) {
debug("load public \"%s\": %s", path, ssh_err(r));
- if ((r = sshkey_load_private(path, NULL,
+ if ((r = sshkey_load_private_type(K...
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...;cipher: %s\n", vault_info->ciphername);
+?? ??? ??? ?printf("kdf: %s\n", vault_info->kdfname);
+?? ??? ??? ?printf("rounds: %d\n", vault_info->rounds);
+?? ??? ?}
+?? ?}
??? ?free(comment);
+?? ?sshkey_vault_free(vault_info);
??? ?exit(0);
?}
?
@@ -920,7 +936,7 @@ fingerprint_private(const char *path)
??? ?if (pubkey == NULL || comment == NULL || *comment == '\0') {
??? ??? ?free(comment);
??? ??? ?if ((r = sshkey_load_private(path, NULL,
-?? ??? ???? &privkey, &comment)) != 0)
+?? ??? ???? &privkey, &comment, NULL)) != 0)
??? ??? ??? ?debug("load p...