diff options
author | milo <milo@r0ot.me> | 2011-08-15 18:58:27 +0200 |
---|---|---|
committer | milo <milo@r0ot.me> | 2011-08-15 18:58:27 +0200 |
commit | 96e338ba566ac0f32c8e59442b7ff49759762a63 (patch) | |
tree | b963fb33c91f0cd970db0945873bdee3f4f07bc3 /src/pki_gcrypt.c | |
parent | 6ffee224486500ef3f01f7812d5b9c84f5b1aac4 (diff) | |
download | libssh-96e338ba566ac0f32c8e59442b7ff49759762a63.tar.gz libssh-96e338ba566ac0f32c8e59442b7ff49759762a63.tar.xz libssh-96e338ba566ac0f32c8e59442b7ff49759762a63.zip |
Fixed typos in ssh_pki_publickey_to_string
Diffstat (limited to 'src/pki_gcrypt.c')
-rw-r--r-- | src/pki_gcrypt.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/src/pki_gcrypt.c b/src/pki_gcrypt.c index 8fd96bc8..fccfc415 100644 --- a/src/pki_gcrypt.c +++ b/src/pki_gcrypt.c @@ -1026,7 +1026,7 @@ ssh_string pki_publickey_to_string(const ssh_key key) switch (key->type) { case SSH_KEYTYPE_DSS: - sexp = gcry_sexp_find_token(key, "p", 0); + sexp = gcry_sexp_find_token(key->dsa, "p", 0); if (sexp == NULL) { goto fail; } @@ -1038,7 +1038,7 @@ ssh_string pki_publickey_to_string(const ssh_key key) ssh_string_fill(p, (char *) tmp, size); gcry_sexp_release(sexp); - sexp = gcry_sexp_find_token(key, "q", 0); + sexp = gcry_sexp_find_token(key->dsa, "q", 0); if (sexp == NULL) { goto fail; } @@ -1050,7 +1050,7 @@ ssh_string pki_publickey_to_string(const ssh_key key) ssh_string_fill(q, (char *) tmp, size); gcry_sexp_release(sexp); - sexp = gcry_sexp_find_token(key, "g", 0); + sexp = gcry_sexp_find_token(key->dsa, "g", 0); if (sexp == NULL) { goto fail; } @@ -1062,7 +1062,7 @@ ssh_string pki_publickey_to_string(const ssh_key key) ssh_string_fill(g, (char *) tmp, size); gcry_sexp_release(sexp); - sexp = gcry_sexp_find_token(key, "y", 0); + sexp = gcry_sexp_find_token(key->dsa, "y", 0); if (sexp == NULL) { goto fail; } @@ -1098,25 +1098,25 @@ ssh_string pki_publickey_to_string(const ssh_key key) break; case SSH_KEYTYPE_RSA: case SSH_KEYTYPE_RSA1: - sexp = gcry_sexp_find_token(key, "e", 0); + sexp = gcry_sexp_find_token(key->rsa, "e", 0); if (sexp == NULL) { - goto error; + goto fail; } tmp = gcry_sexp_nth_data(sexp, 1, &size); e = ssh_string_new(size); if (e == NULL) { - goto error; + goto fail; } ssh_string_fill(e, (char *) tmp, size); - sexp = gcry_sexp_find_token(key, "n", 0); + sexp = gcry_sexp_find_token(key->rsa, "n", 0); if (sexp == NULL) { - goto error; + goto fail; } tmp = gcry_sexp_nth_data(sexp, 1, &size); n = ssh_string_new(size); if (n == NULL) { - goto error; + goto fail; } ssh_string_fill(n, (char *) tmp, size); gcry_sexp_release(sexp); |