=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/ssh-keygen.c,v retrieving revision 1.136.2.1 retrieving revision 1.139 diff -u -r1.136.2.1 -r1.139 --- src/usr.bin/ssh/ssh-keygen.c 2006/09/30 04:06:51 1.136.2.1 +++ src/usr.bin/ssh/ssh-keygen.c 2006/03/19 18:51:18 1.139 @@ -1,4 +1,3 @@ -/* $OpenBSD: ssh-keygen.c,v 1.136.2.1 2006/09/30 04:06:51 brad Exp $ */ /* * Author: Tatu Ylonen * Copyright (c) 1994 Tatu Ylonen , Espoo, Finland @@ -12,38 +11,31 @@ * called by a name other than "ssh" or "Secure Shell". */ +#include "includes.h" + #include #include -#include -#include #include #include -#include -#include -#include -#include -#include -#include -#include - #include "xmalloc.h" #include "key.h" #include "rsa.h" #include "authfile.h" #include "uuencode.h" #include "buffer.h" +#include "bufaux.h" #include "pathnames.h" #include "log.h" #include "misc.h" #include "match.h" #include "hostfile.h" -#include "dns.h" #ifdef SMARTCARD #include "scard.h" #endif +#include "dns.h" /* Number of bits in the RSA/DSA key. This value can be set on the command line. */ #define DEFAULT_BITS 2048 @@ -113,7 +105,7 @@ if (key_type_name == NULL) name = _PATH_SSH_CLIENT_ID_RSA; - else { + else switch (key_type_from_name(key_type_name)) { case KEY_RSA1: name = _PATH_SSH_CLIENT_IDENTITY; @@ -129,7 +121,7 @@ exit(1); break; } - } + snprintf(identity_file, sizeof(identity_file), "%s/%s", pw->pw_dir, name); fprintf(stderr, "%s (%s): ", prompt, identity_file); if (fgets(buf, sizeof(buf), stdin) == NULL) @@ -324,7 +316,7 @@ fprintf(stderr, "input line too long.\n"); exit(1); } - switch (c) { + switch(c) { case '\r': c = fgetc(fp); if (c != EOF && c != '\n' && ungetc(c, fp) == EOF) { @@ -338,8 +330,6 @@ line[pos++] = c; line[pos] = '\0'; } - if (c == EOF) - return -1; return pos; } @@ -521,10 +511,8 @@ xfree(fp); exit(0); } - if (comment) { + if (comment) xfree(comment); - comment = NULL; - } f = fopen(identity_file, "r"); if (f != NULL) { @@ -1081,7 +1069,7 @@ "degiqpclBHvxXyF:b:f:t:U:D:P:N:C:r:g:R:T:G:M:S:a:W:")) != -1) { switch (opt) { case 'b': - bits = (u_int32_t)strtonum(optarg, 768, 32768, &errstr); + bits = strtonum(optarg, 768, 32768, &errstr); if (errstr) fatal("Bits has bad value %s (%s)", optarg, errstr); @@ -1151,7 +1139,6 @@ break; case 'D': download = 1; - /*FALLTHROUGH*/ case 'U': reader_id = optarg; break; @@ -1168,20 +1155,19 @@ rr_hostname = optarg; break; case 'W': - generator_wanted = (u_int32_t)strtonum(optarg, 1, - UINT_MAX, &errstr); + generator_wanted = strtonum(optarg, 1, UINT_MAX, &errstr); if (errstr) fatal("Desired generator has bad value: %s (%s)", optarg, errstr); break; case 'a': - trials = (u_int32_t)strtonum(optarg, 1, UINT_MAX, &errstr); + trials = strtonum(optarg, 1, UINT_MAX, &errstr); if (errstr) fatal("Invalid number of trials: %s (%s)", optarg, errstr); break; case 'M': - memory = (u_int32_t)strtonum(optarg, 1, UINT_MAX, &errstr); + memory = strtonum(optarg, 1, UINT_MAX, &errstr); if (errstr) { fatal("Memory limit is %s: %s", errstr, optarg); }