Index: kpw.d/kpw.c ================================================================== --- kpw.d/kpw.c +++ kpw.d/kpw.c @@ -325,11 +325,11 @@ } } void term_bell(int tty) { write(tty,"\a",1); } -#include + typedef char password[kpw_db_pw_max + 1]; bad pwread(bool obscure, char* dest, size_t* out_len, const char* prompt, const size_t plen) { if (isatty(0)) { int tty = 1; if (!isatty(tty)) tty = open("/dev/tty", O_WRONLY); @@ -486,11 +486,11 @@ priv[i] = priv_enc[i] ^ key[i]; } hexdump(priv, sz(key)); } else { /* found a key in memory; loading it into *priv */ - alert(a_notice, "using saved key"); + alert(a_debug, "using saved key"); key_priv* saved = shmat(shm, 0, 0); if (saved == (void*)-1) return bad_shm; hexdump((byte*)saved, sizeof(key_priv)); memcpy(priv, saved, sizeof(key_priv)); @@ -743,12 +743,12 @@ case chpw: case regen: case delpw:{ /* kpw -d */ if (param == 0) return emit_usage (op==delpw ? " -d \n" : - op==regen ? " -r[lmusp] []" : - /* op==chpw */ " -c []"); + op==regen ? " -r[lmusp] []\n" : + /* op==chpw */ " -c []\n"); if (param < 1 || param > (op == delpw ? 1 : 2)) return bad_syntax; const char* target = params[0]; const char* delta;