summaryrefslogtreecommitdiff
path: root/ssh-keygen.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2011-05-05 14:14:52 +1000
committerDamien Miller <djm@mindrot.org>2011-05-05 14:14:52 +1000
commit884b63a061dbaf750b6c95043358d6a6b87fdf7a (patch)
treeffd739fc881794e7c00bd0eeb6c43f0d7cabbb39 /ssh-keygen.c
parent91475865997f16a728ae1dc3a98dda957c997a5d (diff)
- djm@cvs.openbsd.org 2011/04/12 04:23:50
[ssh-keygen.c] fix -Wshadow
Diffstat (limited to 'ssh-keygen.c')
-rw-r--r--ssh-keygen.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/ssh-keygen.c b/ssh-keygen.c
index 90cffa055..b52fc39cf 100644
--- a/ssh-keygen.c
+++ b/ssh-keygen.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh-keygen.c,v 1.208 2011/03/24 22:14:54 stevesk Exp $ */ 1/* $OpenBSD: ssh-keygen.c,v 1.209 2011/04/12 04:23:50 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -160,7 +160,7 @@ int gen_candidates(FILE *, u_int32_t, u_int32_t, BIGNUM *);
160int prime_test(FILE *, FILE *, u_int32_t, u_int32_t); 160int prime_test(FILE *, FILE *, u_int32_t, u_int32_t);
161 161
162static void 162static void
163type_bits_valid(int type, u_int32_t *bits) 163type_bits_valid(int type, u_int32_t *bitsp)
164{ 164{
165 u_int maxbits; 165 u_int maxbits;
166 166
@@ -168,25 +168,25 @@ type_bits_valid(int type, u_int32_t *bits)
168 fprintf(stderr, "unknown key type %s\n", key_type_name); 168 fprintf(stderr, "unknown key type %s\n", key_type_name);
169 exit(1); 169 exit(1);
170 } 170 }
171 if (*bits == 0) { 171 if (*bitsp == 0) {
172 if (type == KEY_DSA) 172 if (type == KEY_DSA)
173 *bits = DEFAULT_BITS_DSA; 173 *bitsp = DEFAULT_BITS_DSA;
174 else if (type == KEY_ECDSA) 174 else if (type == KEY_ECDSA)
175 *bits = DEFAULT_BITS_ECDSA; 175 *bitsp = DEFAULT_BITS_ECDSA;
176 else 176 else
177 *bits = DEFAULT_BITS; 177 *bitsp = DEFAULT_BITS;
178 } 178 }
179 maxbits = (type == KEY_DSA) ? 179 maxbits = (type == KEY_DSA) ?
180 OPENSSL_DSA_MAX_MODULUS_BITS : OPENSSL_RSA_MAX_MODULUS_BITS; 180 OPENSSL_DSA_MAX_MODULUS_BITS : OPENSSL_RSA_MAX_MODULUS_BITS;
181 if (*bits > maxbits) { 181 if (*bitsp > maxbits) {
182 fprintf(stderr, "key bits exceeds maximum %d\n", maxbits); 182 fprintf(stderr, "key bits exceeds maximum %d\n", maxbits);
183 exit(1); 183 exit(1);
184 } 184 }
185 if (type == KEY_DSA && *bits != 1024) 185 if (type == KEY_DSA && *bitsp != 1024)
186 fatal("DSA keys must be 1024 bits"); 186 fatal("DSA keys must be 1024 bits");
187 else if (type != KEY_ECDSA && *bits < 768) 187 else if (type != KEY_ECDSA && *bitsp < 768)
188 fatal("Key must at least be 768 bits"); 188 fatal("Key must at least be 768 bits");
189 else if (type == KEY_ECDSA && key_ecdsa_bits_to_nid(*bits) == -1) 189 else if (type == KEY_ECDSA && key_ecdsa_bits_to_nid(*bitsp) == -1)
190 fatal("Invalid ECDSA key length - valid lengths are " 190 fatal("Invalid ECDSA key length - valid lengths are "
191 "256, 384 or 521 bits"); 191 "256, 384 or 521 bits");
192} 192}