diff options
author | 2001-03-11 16:39:03 +0000 | |
---|---|---|
committer | 2001-03-11 16:39:03 +0000 | |
commit | 592eb3ca05d71ff5c944c18a422489c5a137e8cc (patch) | |
tree | 0eaea5c876d464e92c6f8f583ea3e83c9eebae8e | |
parent | cleanup & shorten some var names key_fingerprint_bubblebabble. (diff) | |
download | wireguard-openbsd-592eb3ca05d71ff5c944c18a422489c5a137e8cc.tar.xz wireguard-openbsd-592eb3ca05d71ff5c944c18a422489c5a137e8cc.zip |
KNF, and SHA1 binary output is just creeping featurism
-rw-r--r-- | usr.bin/ssh/ssh-keygen.c | 12 |
1 files changed, 5 insertions, 7 deletions
diff --git a/usr.bin/ssh/ssh-keygen.c b/usr.bin/ssh/ssh-keygen.c index 4196b938d76..2a9f15521fd 100644 --- a/usr.bin/ssh/ssh-keygen.c +++ b/usr.bin/ssh/ssh-keygen.c @@ -12,7 +12,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: ssh-keygen.c,v 1.47 2001/03/11 15:04:16 jakob Exp $"); +RCSID("$OpenBSD: ssh-keygen.c,v 1.48 2001/03/11 16:39:03 deraadt Exp $"); #include <openssl/evp.h> #include <openssl/pem.h> @@ -347,17 +347,16 @@ do_fingerprint(struct passwd *pw) debug("try_load_public_key KEY_UNSPEC failed"); } if (success) { - char *digest_md5, *digest_sha1, *digest_bubblebabble; + char *digest_md5, *digest_bubblebabble; digest_md5 = key_fingerprint_ex(public, SSH_FP_MD5, SSH_FP_HEX); - digest_sha1 = key_fingerprint_ex(public, SSH_FP_SHA1, SSH_FP_HEX); - digest_bubblebabble = key_fingerprint_ex(public, SSH_FP_SHA1, SSH_FP_BUBBLEBABBLE); + digest_bubblebabble = key_fingerprint_ex(public, SSH_FP_SHA1, + SSH_FP_BUBBLEBABBLE); - if(print_verbose) { + if (print_verbose) { printf("comment: %s\n", comment); printf("size: %d\n", key_size(public)); printf("md5: %s\n", digest_md5); - printf("sha1: %s\n", digest_sha1); printf("bubblebabble: %s\n", digest_bubblebabble); } else { printf("%d %s %s\n", key_size(public), digest_md5, comment); @@ -366,7 +365,6 @@ do_fingerprint(struct passwd *pw) key_free(public); xfree(comment); xfree(digest_md5); - xfree(digest_sha1); xfree(digest_bubblebabble); exit(0); |