summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/key.h
diff options
context:
space:
mode:
authorAlexander von Gernler <grunk@cvs.openbsd.org>2008-06-11 21:01:36 +0000
committerAlexander von Gernler <grunk@cvs.openbsd.org>2008-06-11 21:01:36 +0000
commitdae70ef557d1246e8797e3f085d66bc6e926e8c0 (patch)
treecb38f2237740f03c14a1c4da5c38de76ad7b6653 /usr.bin/ssh/key.h
parent4412735dd5af87fbb626ceae083f350d006eb7ff (diff)
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by Dan Kaminsky's musings on the subject during a BlackOp talk at the 23C3 in Berlin. Scientific publication (original paper): "Hash Visualization: a New Technique to improve Real-World Security", Perrig A. and Song D., 1999, International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99) http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf The algorithm used here is a worm crawling over a discrete plane, leaving a trace (augmenting the field) everywhere it goes. Movement is taken from dgst_raw 2bit-wise. Bumping into walls makes the respective movement vector be ignored for this turn, thus switching to the other color of the chessboard. Graphs are not unambiguous for now, because circles in graphs can be walked in either direction. discussions with several people, help, corrections and ok markus@ djm@
Diffstat (limited to 'usr.bin/ssh/key.h')
-rw-r--r--usr.bin/ssh/key.h5
1 files changed, 3 insertions, 2 deletions
diff --git a/usr.bin/ssh/key.h b/usr.bin/ssh/key.h
index 6873dd7933e..14aac79c2de 100644
--- a/usr.bin/ssh/key.h
+++ b/usr.bin/ssh/key.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: key.h,v 1.26 2006/08/03 03:34:42 deraadt Exp $ */
+/* $OpenBSD: key.h,v 1.27 2008/06/11 21:01:35 grunk Exp $ */
/*
* Copyright (c) 2000, 2001 Markus Friedl. All rights reserved.
@@ -42,7 +42,8 @@ enum fp_type {
};
enum fp_rep {
SSH_FP_HEX,
- SSH_FP_BUBBLEBABBLE
+ SSH_FP_BUBBLEBABBLE,
+ SSH_FP_RANDOMART
};
/* key is stored in external hardware */