aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorAndreas Schneider <asn@cryptomilk.org>2011-08-07 12:54:25 +0200
committerAndreas Schneider <asn@cryptomilk.org>2011-08-08 15:28:31 +0200
commit37b80e92613de0e56b1558d09298899276b56217 (patch)
tree256d59ee344290d825e5b0216cd638418c8a89e3 /src
parent01c4b713dc57d16612c3b61e1857fb982623dd12 (diff)
downloadlibssh-37b80e92613de0e56b1558d09298899276b56217.tar.gz
libssh-37b80e92613de0e56b1558d09298899276b56217.tar.xz
libssh-37b80e92613de0e56b1558d09298899276b56217.zip
pki: Move keyfiles to pki_gcrypt.c.
Diffstat (limited to 'src')
-rw-r--r--src/CMakeLists.txt2
-rw-r--r--src/pki_gcrypt.c (renamed from src/keyfiles.c)10
2 files changed, 6 insertions, 6 deletions
diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt
index 103b007a..ef745620 100644
--- a/src/CMakeLists.txt
+++ b/src/CMakeLists.txt
@@ -91,7 +91,6 @@ set(libssh_SRCS
gzip.c
init.c
kex.c
- keyfiles.c
keys.c
known_hosts.c
legacy.c
@@ -104,6 +103,7 @@ set(libssh_SRCS
packet.c
pcap.c
pki.c
+ pki_gcrypt.c
poll.c
session.c
scp.c
diff --git a/src/keyfiles.c b/src/pki_gcrypt.c
index dba80130..480478a7 100644
--- a/src/keyfiles.c
+++ b/src/pki_gcrypt.c
@@ -361,7 +361,7 @@ static int privatekey_dek_header(const char *header, unsigned int header_len,
else /* calculate length */ \
for(p += len, len = 0; p[len] && p[len] != '\n' \
&& p[len] != '\r'; len++); \
- }
+ }
static ssh_buffer privatekey_string_to_buffer(const char *pkey, int type,
ssh_auth_callback cb, void *userdata, const char *desc) {
@@ -942,7 +942,7 @@ ssh_private_key privatekey_from_file(ssh_session session, const char *filename,
return NULL;
}
file = fopen(filename,"r");
-
+
if (file == NULL) {
ssh_set_error(session, SSH_REQUEST_DENIED,
"Error opening %s: %s", filename, strerror(errno));
@@ -1280,10 +1280,10 @@ int ssh_publickey_to_file(ssh_session session, const char *file,
size_t len;
int rc;
if(session==NULL)
- return SSH_ERROR;
+ return SSH_ERROR;
if(file==NULL || pubkey==NULL){
- ssh_set_error(session, SSH_FATAL, "Invalid parameters");
- return SSH_ERROR;
+ ssh_set_error(session, SSH_FATAL, "Invalid parameters");
+ return SSH_ERROR;
}
pubkey_64 = bin_to_base64(pubkey->string, ssh_string_len(pubkey));
if (pubkey_64 == NULL) {