- (djm) OpenBSD CVS Sync

- deraadt@cvs.openbsd.org 2006/11/14 19:41:04
     [ssh-keygen.c]
     use argc and argv not some made up short form
This commit is contained in:
Damien Miller 2007-01-05 16:22:57 +11:00
parent be6db83462
commit df8b7db16e
2 changed files with 13 additions and 7 deletions

View File

@ -1,3 +1,9 @@
20070105
- (djm) OpenBSD CVS Sync
- deraadt@cvs.openbsd.org 2006/11/14 19:41:04
[ssh-keygen.c]
use argc and argv not some made up short form
20061205 20061205
- (djm) [auth.c] Fix NULL pointer dereference in fakepw(). Crash would - (djm) [auth.c] Fix NULL pointer dereference in fakepw(). Crash would
occur if the server did not have the privsep user and an invalid user occur if the server did not have the privsep user and an invalid user
@ -2617,4 +2623,4 @@
OpenServer 6 and add osr5bigcrypt support so when someone migrates OpenServer 6 and add osr5bigcrypt support so when someone migrates
passwords between UnixWare and OpenServer they will still work. OK dtucker@ passwords between UnixWare and OpenServer they will still work. OK dtucker@
$Id: ChangeLog,v 1.4591 2006/12/05 11:58:09 djm Exp $ $Id: ChangeLog,v 1.4592 2007/01/05 05:22:57 djm Exp $

View File

@ -1,4 +1,4 @@
/* $OpenBSD: ssh-keygen.c,v 1.155 2006/11/06 21:25:28 markus Exp $ */ /* $OpenBSD: ssh-keygen.c,v 1.156 2006/11/14 19:41:04 deraadt Exp $ */
/* /*
* Author: Tatu Ylonen <ylo@cs.hut.fi> * Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@ -1049,7 +1049,7 @@ usage(void)
* Main program for key management. * Main program for key management.
*/ */
int int
main(int ac, char **av) main(int argc, char **argv)
{ {
char dotsshdir[MAXPATHLEN], comment[1024], *passphrase1, *passphrase2; char dotsshdir[MAXPATHLEN], comment[1024], *passphrase1, *passphrase2;
char out_file[MAXPATHLEN], *reader_id = NULL; char out_file[MAXPATHLEN], *reader_id = NULL;
@ -1074,7 +1074,7 @@ main(int ac, char **av)
__progname = ssh_get_progname(av[0]); __progname = ssh_get_progname(av[0]);
SSLeay_add_all_algorithms(); SSLeay_add_all_algorithms();
log_init(av[0], SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_USER, 1); log_init(argv[0], SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_USER, 1);
init_rng(); init_rng();
seed_rng(); seed_rng();
@ -1090,7 +1090,7 @@ main(int ac, char **av)
exit(1); exit(1);
} }
while ((opt = getopt(ac, av, while ((opt = getopt(argc, argv,
"degiqpclBHvxXyF:b:f:t:U:D:P:N:C:r:g:R:T:G:M:S:a:W:")) != -1) { "degiqpclBHvxXyF:b:f:t:U:D:P:N:C:r:g:R:T:G:M:S:a:W:")) != -1) {
switch (opt) { switch (opt) {
case 'b': case 'b':
@ -1223,9 +1223,9 @@ main(int ac, char **av)
} }
/* reinit */ /* reinit */
log_init(av[0], log_level, SYSLOG_FACILITY_USER, 1); log_init(argv[0], log_level, SYSLOG_FACILITY_USER, 1);
if (optind < ac) { if (optind < argc) {
printf("Too many arguments.\n"); printf("Too many arguments.\n");
usage(); usage();
} }