aboutsummaryrefslogtreecommitdiff
path: root/src/pki_gcrypt.c
diff options
context:
space:
mode:
authormilo <milo@r0ot.me>2011-08-15 18:58:27 +0200
committermilo <milo@r0ot.me>2011-08-15 18:58:27 +0200
commit96e338ba566ac0f32c8e59442b7ff49759762a63 (patch)
treeb963fb33c91f0cd970db0945873bdee3f4f07bc3 /src/pki_gcrypt.c
parent6ffee224486500ef3f01f7812d5b9c84f5b1aac4 (diff)
downloadlibssh-96e338ba566ac0f32c8e59442b7ff49759762a63.tar.gz
libssh-96e338ba566ac0f32c8e59442b7ff49759762a63.tar.xz
libssh-96e338ba566ac0f32c8e59442b7ff49759762a63.zip
Fixed typos in ssh_pki_publickey_to_string
Diffstat (limited to 'src/pki_gcrypt.c')
-rw-r--r--src/pki_gcrypt.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/src/pki_gcrypt.c b/src/pki_gcrypt.c
index 8fd96bc8..fccfc415 100644
--- a/src/pki_gcrypt.c
+++ b/src/pki_gcrypt.c
@@ -1026,7 +1026,7 @@ ssh_string pki_publickey_to_string(const ssh_key key)
switch (key->type) {
case SSH_KEYTYPE_DSS:
- sexp = gcry_sexp_find_token(key, "p", 0);
+ sexp = gcry_sexp_find_token(key->dsa, "p", 0);
if (sexp == NULL) {
goto fail;
}
@@ -1038,7 +1038,7 @@ ssh_string pki_publickey_to_string(const ssh_key key)
ssh_string_fill(p, (char *) tmp, size);
gcry_sexp_release(sexp);
- sexp = gcry_sexp_find_token(key, "q", 0);
+ sexp = gcry_sexp_find_token(key->dsa, "q", 0);
if (sexp == NULL) {
goto fail;
}
@@ -1050,7 +1050,7 @@ ssh_string pki_publickey_to_string(const ssh_key key)
ssh_string_fill(q, (char *) tmp, size);
gcry_sexp_release(sexp);
- sexp = gcry_sexp_find_token(key, "g", 0);
+ sexp = gcry_sexp_find_token(key->dsa, "g", 0);
if (sexp == NULL) {
goto fail;
}
@@ -1062,7 +1062,7 @@ ssh_string pki_publickey_to_string(const ssh_key key)
ssh_string_fill(g, (char *) tmp, size);
gcry_sexp_release(sexp);
- sexp = gcry_sexp_find_token(key, "y", 0);
+ sexp = gcry_sexp_find_token(key->dsa, "y", 0);
if (sexp == NULL) {
goto fail;
}
@@ -1098,25 +1098,25 @@ ssh_string pki_publickey_to_string(const ssh_key key)
break;
case SSH_KEYTYPE_RSA:
case SSH_KEYTYPE_RSA1:
- sexp = gcry_sexp_find_token(key, "e", 0);
+ sexp = gcry_sexp_find_token(key->rsa, "e", 0);
if (sexp == NULL) {
- goto error;
+ goto fail;
}
tmp = gcry_sexp_nth_data(sexp, 1, &size);
e = ssh_string_new(size);
if (e == NULL) {
- goto error;
+ goto fail;
}
ssh_string_fill(e, (char *) tmp, size);
- sexp = gcry_sexp_find_token(key, "n", 0);
+ sexp = gcry_sexp_find_token(key->rsa, "n", 0);
if (sexp == NULL) {
- goto error;
+ goto fail;
}
tmp = gcry_sexp_nth_data(sexp, 1, &size);
n = ssh_string_new(size);
if (n == NULL) {
- goto error;
+ goto fail;
}
ssh_string_fill(n, (char *) tmp, size);
gcry_sexp_release(sexp);