View | Details | Raw Unified | Return to bug 1516
Collapse All | Expand All

(-)ssh-keygen.c (+7 lines)
Lines 1555-1560 main(int argc, char **argv) Link Here
1555
	struct passwd *pw;
1555
	struct passwd *pw;
1556
	struct stat st;
1556
	struct stat st;
1557
	int opt, type, fd;
1557
	int opt, type, fd;
1558
	u_int maxbits;
1558
	u_int32_t memory = 0, generator_wanted = 0, trials = 100;
1559
	u_int32_t memory = 0, generator_wanted = 0, trials = 100;
1559
	int do_gen_candidates = 0, do_screen_candidates = 0;
1560
	int do_gen_candidates = 0, do_screen_candidates = 0;
1560
	BIGNUM *start = NULL;
1561
	BIGNUM *start = NULL;
Lines 1856-1861 main(int argc, char **argv) Link Here
1856
	}
1857
	}
1857
	if (bits == 0)
1858
	if (bits == 0)
1858
		bits = (type == KEY_DSA) ? DEFAULT_BITS_DSA : DEFAULT_BITS;
1859
		bits = (type == KEY_DSA) ? DEFAULT_BITS_DSA : DEFAULT_BITS;
1860
	maxbits = (type == KEY_DSA) ?
1861
	    OPENSSL_DSA_MAX_MODULUS_BITS : OPENSSL_RSA_MAX_MODULUS_BITS;
1862
	if (bits > maxbits) {
1863
		fprintf(stderr, "key bits exceeds maximum %d\n", maxbits);
1864
		exit(1);
1865
	}
1859
	if (type == KEY_DSA && bits != 1024)
1866
	if (type == KEY_DSA && bits != 1024)
1860
		fatal("DSA keys must be 1024 bits");
1867
		fatal("DSA keys must be 1024 bits");
1861
	if (!quiet)
1868
	if (!quiet)

Return to bug 1516