aboutsummaryrefslogtreecommitdiff
path: root/src/server.c
diff options
context:
space:
mode:
authorFabiano FidĂȘncio <fidencio@redhat.com>2015-09-17 14:11:08 +0200
committerFabiano FidĂȘncio <fidencio@redhat.com>2016-01-19 11:31:07 +0100
commite368d01385c2d1a6c729964befc11e80010693ba (patch)
treefb7a43cba42ab7c412d0279667200d272329cf41 /src/server.c
parent310c41a89a91a44b4e63c19bc2f35e8b2d28827d (diff)
downloadlibssh-e368d01385c2d1a6c729964befc11e80010693ba.tar.gz
libssh-e368d01385c2d1a6c729964befc11e80010693ba.tar.xz
libssh-e368d01385c2d1a6c729964befc11e80010693ba.zip
cleanup: use ssh_ prefix in the packet (non-static) functions
Having "ssh_" prefix in the functions' name will avoid possible clashes when compiling libssh statically. Signed-off-by: Fabiano FidĂȘncio <fidencio@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'src/server.c')
-rw-r--r--src/server.c24
1 files changed, 12 insertions, 12 deletions
diff --git a/src/server.c b/src/server.c
index 15ffd738..017a4cc5 100644
--- a/src/server.c
+++ b/src/server.c
@@ -321,7 +321,7 @@ static int dh_handshake_server(ssh_session session) {
return -1;
}
- if (packet_send(session) == SSH_ERROR) {
+ if (ssh_packet_send(session) == SSH_ERROR) {
return -1;
}
@@ -330,7 +330,7 @@ static int dh_handshake_server(ssh_session session) {
return -1;
}
- if (packet_send(session) == SSH_ERROR) {
+ if (ssh_packet_send(session) == SSH_ERROR) {
return -1;
}
SSH_LOG(SSH_LOG_PACKET, "SSH_MSG_NEWKEYS sent");
@@ -659,7 +659,7 @@ int ssh_auth_reply_default(ssh_session session,int partial) {
ssh_set_error_oom(session);
return SSH_ERROR;
}
- rc = packet_send(session);
+ rc = ssh_packet_send(session);
return rc;
}
@@ -680,7 +680,7 @@ static int ssh_message_channel_request_open_reply_default(ssh_message msg) {
return SSH_ERROR;
}
- rc = packet_send(msg->session);
+ rc = ssh_packet_send(msg->session);
return rc;
}
@@ -702,7 +702,7 @@ static int ssh_message_channel_request_reply_default(ssh_message msg) {
ssh_set_error_oom(msg->session);
return SSH_ERROR;
}
- return packet_send(msg->session);
+ return ssh_packet_send(msg->session);
}
SSH_LOG(SSH_LOG_PACKET,
@@ -736,7 +736,7 @@ int ssh_message_service_reply_success(ssh_message msg) {
ssh_set_error_oom(session);
return SSH_ERROR;
}
- rc = packet_send(msg->session);
+ rc = ssh_packet_send(msg->session);
return rc;
}
@@ -760,7 +760,7 @@ int ssh_message_global_request_reply_success(ssh_message msg, uint16_t bound_por
}
}
- return packet_send(msg->session);
+ return ssh_packet_send(msg->session);
}
if(msg->global_request.type == SSH_GLOBAL_REQUEST_TCPIP_FORWARD
@@ -782,7 +782,7 @@ static int ssh_message_global_request_reply_default(ssh_message msg) {
, SSH2_MSG_REQUEST_FAILURE) < 0) {
goto error;
}
- return packet_send(msg->session);
+ return ssh_packet_send(msg->session);
}
SSH_LOG(SSH_LOG_PACKET,
"The client doesn't want to know the request failed!");
@@ -919,7 +919,7 @@ int ssh_message_auth_interactive_request(ssh_message msg, const char *name,
}
}
- rc = packet_send(msg->session);
+ rc = ssh_packet_send(msg->session);
/* fill in the kbdint structure */
if (msg->session->kbdint == NULL) {
@@ -1006,7 +1006,7 @@ int ssh_auth_reply_success(ssh_session session, int partial) {
return SSH_ERROR;
}
- r = packet_send(session);
+ r = ssh_packet_send(session);
if(session->current_crypto && session->current_crypto->delayed_compress_out){
SSH_LOG(SSH_LOG_PROTOCOL,"Enabling delayed compression OUT");
session->current_crypto->do_compress_out=1;
@@ -1041,7 +1041,7 @@ int ssh_message_auth_reply_pk_ok(ssh_message msg, ssh_string algo, ssh_string pu
return SSH_ERROR;
}
- rc = packet_send(msg->session);
+ rc = ssh_packet_send(msg->session);
return rc;
}
@@ -1208,7 +1208,7 @@ int ssh_send_keepalive(ssh_session session)
goto err;
}
- if (packet_send(session) == SSH_ERROR) {
+ if (ssh_packet_send(session) == SSH_ERROR) {
goto err;
}