mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-01-09 17:38:00 +00:00
cd7f6c4407
OpenSSH, when called on to give the fingerprint of a certified public key, will in many circumstances generate the hash of the public blob of the _underlying_ key, rather than the hash of the full certificate. I think the hash of the certificate is also potentially useful (if nothing else, it provides a way to tell apart multiple certificates on the same key). But I can also see that it's useful to be able to recognise a key as the same one 'really' (since all certificates on the same key share a private key, so they're unavoidably related). So I've dealt with this by introducing an extra pair of fingerprint types, giving the cross product of {MD5, SHA-256} x {base key only, full certificate}. You can manually select which one you want to see in some circumstances (notably PuTTYgen), and in others (such as diagnostics) both fingerprints will be emitted side by side via the new functions ssh2_double_fingerprint[_blob]. The default, following OpenSSH, is to just fingerprint the base key. |
||
---|---|---|
.. | ||
sclog | ||
agentmulti.py | ||
agenttest.py | ||
agenttestdata.py | ||
agenttestgen.py | ||
ca.py | ||
colours.txt | ||
cryptsuite.py | ||
desref.py | ||
display.txt | ||
eccref.py | ||
fuzzterm.c | ||
lattrs.txt | ||
list-accel.py | ||
mpu-check.pl | ||
numbertheory.py | ||
primegen.py | ||
scocols.txt | ||
ssh.py | ||
testcrypt-enum.h | ||
testcrypt-func.h | ||
testcrypt.c | ||
testcrypt.py | ||
testsc.c | ||
testzlib.c | ||
utf8.txt | ||
vt100.txt | ||
windowchange.py |