summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-03-11 20:08:29 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-03-11 20:08:29 +0000
commitca0bf57f2f336af8663a98bd9e55e0fa2f9e4b08 (patch)
treea5724f220d5deab402198542e6cf4f6d335c4f5c
parentcbe3ad2f70e6682378cd06ce0c0236438e1ed581 (diff)
- deraadt@cvs.openbsd.org 2001/03/11 16:39:03
[ssh-keygen.c] KNF, and SHA1 binary output is just creeping featurism
-rw-r--r--ChangeLog5
-rw-r--r--ssh-keygen.c12
2 files changed, 9 insertions, 8 deletions
diff --git a/ChangeLog b/ChangeLog
index 6033a374f..13ce9c9e5 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -14,6 +14,9 @@
14 - jakob@cvs.openbsd.org 2001/03/11 15:13:09 14 - jakob@cvs.openbsd.org 2001/03/11 15:13:09
15 [key.c] 15 [key.c]
16 cleanup & shorten some var names key_fingerprint_bubblebabble. 16 cleanup & shorten some var names key_fingerprint_bubblebabble.
17 - deraadt@cvs.openbsd.org 2001/03/11 16:39:03
18 [ssh-keygen.c]
19 KNF, and SHA1 binary output is just creeping featurism
17 20
1820010311 2120010311
19 - OpenBSD CVS Sync 22 - OpenBSD CVS Sync
@@ -4507,4 +4510,4 @@
4507 - Wrote replacements for strlcpy and mkdtemp 4510 - Wrote replacements for strlcpy and mkdtemp
4508 - Released 1.0pre1 4511 - Released 1.0pre1
4509 4512
4510$Id: ChangeLog,v 1.943 2001/03/11 20:06:59 mouring Exp $ 4513$Id: ChangeLog,v 1.944 2001/03/11 20:08:29 mouring Exp $
diff --git a/ssh-keygen.c b/ssh-keygen.c
index af59bcf6e..f4f700f79 100644
--- a/ssh-keygen.c
+++ b/ssh-keygen.c
@@ -12,7 +12,7 @@
12 */ 12 */
13 13
14#include "includes.h" 14#include "includes.h"
15RCSID("$OpenBSD: ssh-keygen.c,v 1.47 2001/03/11 15:04:16 jakob Exp $"); 15RCSID("$OpenBSD: ssh-keygen.c,v 1.48 2001/03/11 16:39:03 deraadt Exp $");
16 16
17#include <openssl/evp.h> 17#include <openssl/evp.h>
18#include <openssl/pem.h> 18#include <openssl/pem.h>
@@ -351,17 +351,16 @@ do_fingerprint(struct passwd *pw)
351 debug("try_load_public_key KEY_UNSPEC failed"); 351 debug("try_load_public_key KEY_UNSPEC failed");
352 } 352 }
353 if (success) { 353 if (success) {
354 char *digest_md5, *digest_sha1, *digest_bubblebabble; 354 char *digest_md5, *digest_bubblebabble;
355 355
356 digest_md5 = key_fingerprint_ex(public, SSH_FP_MD5, SSH_FP_HEX); 356 digest_md5 = key_fingerprint_ex(public, SSH_FP_MD5, SSH_FP_HEX);
357 digest_sha1 = key_fingerprint_ex(public, SSH_FP_SHA1, SSH_FP_HEX); 357 digest_bubblebabble = key_fingerprint_ex(public, SSH_FP_SHA1,
358 digest_bubblebabble = key_fingerprint_ex(public, SSH_FP_SHA1, SSH_FP_BUBBLEBABBLE); 358 SSH_FP_BUBBLEBABBLE);
359 359
360 if(print_verbose) { 360 if (print_verbose) {
361 printf("comment: %s\n", comment); 361 printf("comment: %s\n", comment);
362 printf("size: %d\n", key_size(public)); 362 printf("size: %d\n", key_size(public));
363 printf("md5: %s\n", digest_md5); 363 printf("md5: %s\n", digest_md5);
364 printf("sha1: %s\n", digest_sha1);
365 printf("bubblebabble: %s\n", digest_bubblebabble); 364 printf("bubblebabble: %s\n", digest_bubblebabble);
366 } else { 365 } else {
367 printf("%d %s %s\n", key_size(public), digest_md5, comment); 366 printf("%d %s %s\n", key_size(public), digest_md5, comment);
@@ -370,7 +369,6 @@ do_fingerprint(struct passwd *pw)
370 key_free(public); 369 key_free(public);
371 xfree(comment); 370 xfree(comment);
372 xfree(digest_md5); 371 xfree(digest_md5);
373 xfree(digest_sha1);
374 xfree(digest_bubblebabble); 372 xfree(digest_bubblebabble);
375 373
376 exit(0); 374 exit(0);