diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-03-11 20:08:29 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-03-11 20:08:29 +0000 |
commit | ca0bf57f2f336af8663a98bd9e55e0fa2f9e4b08 (patch) | |
tree | a5724f220d5deab402198542e6cf4f6d335c4f5c | |
parent | cbe3ad2f70e6682378cd06ce0c0236438e1ed581 (diff) |
- deraadt@cvs.openbsd.org 2001/03/11 16:39:03
[ssh-keygen.c]
KNF, and SHA1 binary output is just creeping featurism
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | ssh-keygen.c | 12 |
2 files changed, 9 insertions, 8 deletions
@@ -14,6 +14,9 @@ | |||
14 | - jakob@cvs.openbsd.org 2001/03/11 15:13:09 | 14 | - jakob@cvs.openbsd.org 2001/03/11 15:13:09 |
15 | [key.c] | 15 | [key.c] |
16 | cleanup & shorten some var names key_fingerprint_bubblebabble. | 16 | cleanup & shorten some var names key_fingerprint_bubblebabble. |
17 | - deraadt@cvs.openbsd.org 2001/03/11 16:39:03 | ||
18 | [ssh-keygen.c] | ||
19 | KNF, and SHA1 binary output is just creeping featurism | ||
17 | 20 | ||
18 | 20010311 | 21 | 20010311 |
19 | - OpenBSD CVS Sync | 22 | - OpenBSD CVS Sync |
@@ -4507,4 +4510,4 @@ | |||
4507 | - Wrote replacements for strlcpy and mkdtemp | 4510 | - Wrote replacements for strlcpy and mkdtemp |
4508 | - Released 1.0pre1 | 4511 | - Released 1.0pre1 |
4509 | 4512 | ||
4510 | $Id: ChangeLog,v 1.943 2001/03/11 20:06:59 mouring Exp $ | 4513 | $Id: ChangeLog,v 1.944 2001/03/11 20:08:29 mouring Exp $ |
diff --git a/ssh-keygen.c b/ssh-keygen.c index af59bcf6e..f4f700f79 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -12,7 +12,7 @@ | |||
12 | */ | 12 | */ |
13 | 13 | ||
14 | #include "includes.h" | 14 | #include "includes.h" |
15 | RCSID("$OpenBSD: ssh-keygen.c,v 1.47 2001/03/11 15:04:16 jakob Exp $"); | 15 | RCSID("$OpenBSD: ssh-keygen.c,v 1.48 2001/03/11 16:39:03 deraadt Exp $"); |
16 | 16 | ||
17 | #include <openssl/evp.h> | 17 | #include <openssl/evp.h> |
18 | #include <openssl/pem.h> | 18 | #include <openssl/pem.h> |
@@ -351,17 +351,16 @@ do_fingerprint(struct passwd *pw) | |||
351 | debug("try_load_public_key KEY_UNSPEC failed"); | 351 | debug("try_load_public_key KEY_UNSPEC failed"); |
352 | } | 352 | } |
353 | if (success) { | 353 | if (success) { |
354 | char *digest_md5, *digest_sha1, *digest_bubblebabble; | 354 | char *digest_md5, *digest_bubblebabble; |
355 | 355 | ||
356 | digest_md5 = key_fingerprint_ex(public, SSH_FP_MD5, SSH_FP_HEX); | 356 | digest_md5 = key_fingerprint_ex(public, SSH_FP_MD5, SSH_FP_HEX); |
357 | digest_sha1 = key_fingerprint_ex(public, SSH_FP_SHA1, SSH_FP_HEX); | 357 | digest_bubblebabble = key_fingerprint_ex(public, SSH_FP_SHA1, |
358 | digest_bubblebabble = key_fingerprint_ex(public, SSH_FP_SHA1, SSH_FP_BUBBLEBABBLE); | 358 | SSH_FP_BUBBLEBABBLE); |
359 | 359 | ||
360 | if(print_verbose) { | 360 | if (print_verbose) { |
361 | printf("comment: %s\n", comment); | 361 | printf("comment: %s\n", comment); |
362 | printf("size: %d\n", key_size(public)); | 362 | printf("size: %d\n", key_size(public)); |
363 | printf("md5: %s\n", digest_md5); | 363 | printf("md5: %s\n", digest_md5); |
364 | printf("sha1: %s\n", digest_sha1); | ||
365 | printf("bubblebabble: %s\n", digest_bubblebabble); | 364 | printf("bubblebabble: %s\n", digest_bubblebabble); |
366 | } else { | 365 | } else { |
367 | printf("%d %s %s\n", key_size(public), digest_md5, comment); | 366 | printf("%d %s %s\n", key_size(public), digest_md5, comment); |
@@ -370,7 +369,6 @@ do_fingerprint(struct passwd *pw) | |||
370 | key_free(public); | 369 | key_free(public); |
371 | xfree(comment); | 370 | xfree(comment); |
372 | xfree(digest_md5); | 371 | xfree(digest_md5); |
373 | xfree(digest_sha1); | ||
374 | xfree(digest_bubblebabble); | 372 | xfree(digest_bubblebabble); |
375 | 373 | ||
376 | exit(0); | 374 | exit(0); |