Timeline for Extract ssh key algorithm
Current License: CC BY-SA 4.0
        6 events
    
    | when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Sep 26, 2021 at 22:23 | vote | accept | Kyu96 | ||
| Sep 26, 2021 at 17:45 | comment | added | Peregrino69 | Seconding @terdon - please clarify your question. It's difficult to help if we don't know what exactly you want to do. | |
| Sep 26, 2021 at 17:02 | comment | added | Romeo Ninov | @terdon, same for DSA, EC keys | |
| Sep 26, 2021 at 16:58 | answer | added | Romeo Ninov | timeline score: 9 | |
| Sep 26, 2021 at 16:45 | comment | added | terdon♦ | Can you add some more context please? I think that you want to have a command that takes a file containing a key (public? private? both? either?) as input and returns the encryption algorithm used. Is that right? If so, please edit your question and add some more details. I don't know much about this, but in my (limited) experience, which is exclusively with RSA keys, both public and private keys mention "RSA" in the file. | |
| Sep 26, 2021 at 16:37 | history | asked | Kyu96 | CC BY-SA 4.0 |