aboutsummaryrefslogtreecommitdiff
path: root/src/dh.c
diff options
context:
space:
mode:
authorFabiano FidĂȘncio <fidencio@redhat.com>2015-09-16 22:20:30 +0200
committerFabiano FidĂȘncio <fidencio@redhat.com>2016-01-19 11:31:07 +0100
commit6f60449e184ef8066c2c5bd5ad165cbde507aa92 (patch)
tree85d1f3a683c60b3fbf675b507db53aeb1052e86a /src/dh.c
parent77052d3a1e1c22e1882e7a12f63b4d705d81e2be (diff)
downloadlibssh-6f60449e184ef8066c2c5bd5ad165cbde507aa92.tar.gz
libssh-6f60449e184ef8066c2c5bd5ad165cbde507aa92.tar.xz
libssh-6f60449e184ef8066c2c5bd5ad165cbde507aa92.zip
cleanup: use ssh_ prefix in the bignum (non-static) functions
Having "ssh_" prefix in the functions' name will avoid possible clashes when compiling libssh statically. Signed-off-by: Fabiano FidĂȘncio <fidencio@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'src/dh.c')
-rw-r--r--src/dh.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/dh.c b/src/dh.c
index e489a1d5..b372b2cd 100644
--- a/src/dh.c
+++ b/src/dh.c
@@ -339,12 +339,12 @@ int dh_generate_f(ssh_session session) {
}
ssh_string dh_get_e(ssh_session session) {
- return make_bignum_string(session->next_crypto->e);
+ return ssh_make_bignum_string(session->next_crypto->e);
}
/* used by server */
ssh_string dh_get_f(ssh_session session) {
- return make_bignum_string(session->next_crypto->f);
+ return ssh_make_bignum_string(session->next_crypto->f);
}
void dh_import_pubkey(ssh_session session, ssh_string pubkey_string) {
@@ -352,7 +352,7 @@ void dh_import_pubkey(ssh_session session, ssh_string pubkey_string) {
}
int dh_import_f(ssh_session session, ssh_string f_string) {
- session->next_crypto->f = make_string_bn(f_string);
+ session->next_crypto->f = ssh_make_string_bn(f_string);
if (session->next_crypto->f == NULL) {
return -1;
}
@@ -366,7 +366,7 @@ int dh_import_f(ssh_session session, ssh_string f_string) {
/* used by the server implementation */
int dh_import_e(ssh_session session, ssh_string e_string) {
- session->next_crypto->e = make_string_bn(e_string);
+ session->next_crypto->e = ssh_make_string_bn(e_string);
if (session->next_crypto->e == NULL) {
return -1;
}
@@ -782,7 +782,7 @@ int generate_session_keys(ssh_session session) {
struct ssh_crypto_struct *crypto = session->next_crypto;
int rc = -1;
- k_string = make_bignum_string(crypto->k);
+ k_string = ssh_make_bignum_string(crypto->k);
if (k_string == NULL) {
ssh_set_error_oom(session);
goto error;