diff options
Diffstat (limited to 'libssh/kex.c')
-rw-r--r-- | libssh/kex.c | 68 |
1 files changed, 34 insertions, 34 deletions
diff --git a/libssh/kex.c b/libssh/kex.c index 9d3b170..a137a59 100644 --- a/libssh/kex.c +++ b/libssh/kex.c @@ -282,11 +282,11 @@ SSH_PACKET_CALLBACK(ssh_packet_kexinit){ goto error; } - strings[i] = string_to_char(str); + strings[i] = ssh_string_to_char(str); if (strings[i] == NULL) { goto error; } - string_free(str); + ssh_string_free(str); str = NULL; } @@ -318,7 +318,7 @@ SSH_PACKET_CALLBACK(ssh_packet_kexinit){ ssh_connection_callback(session); return SSH_PACKET_USED; error: - string_free(str); + ssh_string_free(str); for (i = 0; i < 10; i++) { SAFE_FREE(strings[i]); } @@ -407,7 +407,7 @@ int ssh_send_kex(ssh_session session, int server_kex) { ssh_list_kex(session, kex); for (i = 0; i < 10; i++) { - str = string_from_char(kex->methods[i]); + str = ssh_string_from_char(kex->methods[i]); if (str == NULL) { goto error; } @@ -418,7 +418,7 @@ int ssh_send_kex(ssh_session session, int server_kex) { if (buffer_add_ssh_string(session->out_buffer, str) < 0) { goto error; } - string_free(str); + ssh_string_free(str); } if (buffer_add_u8(session->out_buffer, 0) < 0) { @@ -438,7 +438,7 @@ int ssh_send_kex(ssh_session session, int server_kex) { error: buffer_reinit(session->out_buffer); buffer_reinit(session->out_hashbuf); - string_free(str); + ssh_string_free(str); leave_function(); return -1; @@ -466,8 +466,8 @@ static ssh_string make_rsa1_string(ssh_string e, ssh_string n){ ssh_string rsa = NULL; ssh_string ret = NULL; - buffer = buffer_new(); - rsa = string_from_char("ssh-rsa1"); + buffer = ssh_buffer_new(); + rsa = ssh_string_from_char("ssh-rsa1"); if (buffer_add_ssh_string(buffer, rsa) < 0) { goto error; @@ -479,15 +479,15 @@ static ssh_string make_rsa1_string(ssh_string e, ssh_string n){ goto error; } - ret = string_new(buffer_get_len(buffer)); + ret = ssh_string_new(ssh_buffer_get_len(buffer)); if (ret == NULL) { goto error; } - string_fill(ret, buffer_get(buffer), buffer_get_len(buffer)); + ssh_string_fill(ret, ssh_buffer_get_begin(buffer), ssh_buffer_get_len(buffer)); error: - buffer_free(buffer); - string_free(rsa); + ssh_buffer_free(buffer); + ssh_string_free(rsa); return ret; } @@ -502,11 +502,11 @@ static int build_session_id1(ssh_session session, ssh_string servern, } #ifdef DEBUG_CRYPTO - ssh_print_hexa("host modulus",string_data(hostn),string_len(hostn)); - ssh_print_hexa("server modulus",string_data(servern),string_len(servern)); + ssh_print_hexa("host modulus",ssh_string_data(hostn),ssh_string_len(hostn)); + ssh_print_hexa("server modulus",ssh_string_data(servern),ssh_string_len(servern)); #endif - md5_update(md5,string_data(hostn),string_len(hostn)); - md5_update(md5,string_data(servern),string_len(servern)); + md5_update(md5,ssh_string_data(hostn),ssh_string_len(hostn)); + md5_update(md5,ssh_string_data(servern),ssh_string_len(servern)); md5_update(md5,session->server_kex.cookie,8); md5_final(session->next_crypto->session_id,md5); #ifdef DEBUG_CRYPTO @@ -566,11 +566,11 @@ static ssh_string encrypt_session_key(ssh_session session, ssh_public_key srvkey for (i = 0; i < 16; i++) { buffer[i] ^= session->next_crypto->session_id[i]; } - data1 = string_new(32); + data1 = ssh_string_new(32); if (data1 == NULL) { return NULL; } - string_fill(data1, buffer, 32); + ssh_string_fill(data1, buffer, 32); if (ABS(hlen - slen) < 128){ ssh_log(session, SSH_LOG_FUNCTIONS, "Difference between server modulus and host modulus is only %d. " @@ -580,25 +580,25 @@ static ssh_string encrypt_session_key(ssh_session session, ssh_public_key srvkey if (modulus_smaller(srvkey, hostkey)) { data2 = ssh_encrypt_rsa1(session, data1, srvkey); - string_free(data1); + ssh_string_free(data1); data1 = NULL; if (data2 == NULL) { return NULL; } data1 = ssh_encrypt_rsa1(session, data2, hostkey); - string_free(data2); + ssh_string_free(data2); if (data1 == NULL) { return NULL; } } else { data2 = ssh_encrypt_rsa1(session, data1, hostkey); - string_free(data1); + ssh_string_free(data1); data1 = NULL; if (data2 == NULL) { return NULL; } data1 = ssh_encrypt_rsa1(session, data2, srvkey); - string_free(data2); + ssh_string_free(data2); if (data1 == NULL) { return NULL; } @@ -718,7 +718,7 @@ SSH_PACKET_CALLBACK(ssh_packet_publickey1){ goto error; } - session->next_crypto->server_pubkey = string_copy(hostkey); + session->next_crypto->server_pubkey = ssh_string_copy(hostkey); if (session->next_crypto->server_pubkey == NULL) { goto error; } @@ -747,16 +747,16 @@ SSH_PACKET_CALLBACK(ssh_packet_publickey1){ goto error; } - bits = string_len(enc_session) * 8 - 7; + bits = ssh_string_len(enc_session) * 8 - 7; ssh_log(session, SSH_LOG_PROTOCOL, "%d bits, %zu bytes encrypted session", - bits, string_len(enc_session)); + bits, ssh_string_len(enc_session)); bits = htons(bits); /* the encrypted mpint */ if (buffer_add_data(session->out_buffer, &bits, sizeof(uint16_t)) < 0) { goto error; } - if (buffer_add_data(session->out_buffer, string_data(enc_session), - string_len(enc_session)) < 0) { + if (buffer_add_data(session->out_buffer, ssh_string_data(enc_session), + ssh_string_len(enc_session)) < 0) { goto error; } /* the protocol flags */ @@ -780,13 +780,13 @@ error: session->session_state=SSH_SESSION_STATE_ERROR; end: - string_free(host_mod); - string_free(host_exp); - string_free(server_mod); - string_free(server_exp); - string_free(serverkey); - string_free(hostkey); - string_free(enc_session); + ssh_string_free(host_mod); + ssh_string_free(host_exp); + ssh_string_free(server_mod); + ssh_string_free(server_exp); + ssh_string_free(serverkey); + ssh_string_free(hostkey); + ssh_string_free(enc_session); publickey_free(srv); publickey_free(host); |