summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndreas Schneider <mail@cynapses.org>2009-04-20 07:26:50 +0000
committerAndreas Schneider <mail@cynapses.org>2009-04-20 07:26:50 +0000
commit9704df65e3adc6eea7c8b70e366d63ec0a3cd478 (patch)
tree3e0fb9f3adbc8fdea4190b96dee80799cf9107ae
parenta3c820cf948c25afd36c85a2302ecfdeb82a0cf4 (diff)
downloadlibssh-9704df65e3adc6eea7c8b70e366d63ec0a3cd478.tar.gz
libssh-9704df65e3adc6eea7c8b70e366d63ec0a3cd478.tar.xz
libssh-9704df65e3adc6eea7c8b70e366d63ec0a3cd478.zip
Rename privatekey_free() to be consistent with publickey_free().
git-svn-id: svn+ssh://svn.berlios.de/svnroot/repos/libssh/trunk@563 7dcaeef0-15fb-0310-b436-a5af3365683c
-rw-r--r--include/libssh/libssh.h2
-rw-r--r--libssh/auth.c10
-rw-r--r--libssh/keyfiles.c4
-rw-r--r--libssh/server.c18
-rw-r--r--libssh/session.c4
5 files changed, 19 insertions, 19 deletions
diff --git a/include/libssh/libssh.h b/include/libssh/libssh.h
index f265fa0b..fc6a4230 100644
--- a/include/libssh/libssh.h
+++ b/include/libssh/libssh.h
@@ -252,7 +252,7 @@ PRIVATE_KEY *privatekey_from_file(SSH_SESSION *session, const char *filename,
int type, const char *passphrase);
STRING *publickey_to_string(PUBLIC_KEY *key);
PUBLIC_KEY *publickey_from_privatekey(PRIVATE_KEY *prv);
-void private_key_free(PRIVATE_KEY *prv);
+void privatekey_free(PRIVATE_KEY *prv);
STRING *publickey_from_file(SSH_SESSION *session, const char *filename,int *_type);
STRING *publickey_from_next_file(SSH_SESSION *session, const char **pub_keys_path,
const char **keys_path, char **privkeyfile, int *type, int *count);
diff --git a/libssh/auth.c b/libssh/auth.c
index 105272c2..99c2d05e 100644
--- a/libssh/auth.c
+++ b/libssh/auth.c
@@ -360,7 +360,7 @@ error:
* SSH_AUTH_SUCCESS : Authentication success
* \see publickey_from_file()
* \see privatekey_from_file()
- * \see private_key_free()
+ * \see privatekey_free()
* \see ssh_userauth_offer_pubkey()
*/
@@ -471,7 +471,7 @@ error:
* SSH_AUTH_SUCCESS : Authentication success
* \see publickey_from_file()
* \see privatekey_from_file()
- * \see private_key_free()
+ * \see privatekey_free()
* \see ssh_userauth_offer_pubkey()
*/
@@ -865,7 +865,7 @@ int ssh_userauth_autopubkey(SSH_SESSION *session, const char *passphrase) {
}
free(pubkey);
free(privkeyfile);
- private_key_free(privkey);
+ privatekey_free(privkey);
leave_function();
return err;
} else
@@ -877,14 +877,14 @@ int ssh_userauth_autopubkey(SSH_SESSION *session, const char *passphrase) {
pubkey=NULL;
free(privkeyfile);
privkeyfile=NULL;
- private_key_free(privkey);
+ privatekey_free(privkey);
continue;
}
/* auth success */
ssh_log(session, SSH_LOG_RARE,
"Authentication using %s success\n", privkeyfile);
free(pubkey);
- private_key_free(privkey);
+ privatekey_free(privkey);
free(privkeyfile);
if(id){
pub_keys_path[0]=NULL;
diff --git a/libssh/keyfiles.c b/libssh/keyfiles.c
index 51b99e8e..bb0af82a 100644
--- a/libssh/keyfiles.c
+++ b/libssh/keyfiles.c
@@ -603,7 +603,7 @@ static int pem_get_password(char *buf, int size, int rwflag, void *userdata) {
* \param type Type of the private key. One of TYPE_DSS or TYPE_RSA.
* \param passphrase Passphrase to decrypt the private key. Set to null if none is needed or it is unknown.
* \returns a PRIVATE_KEY object containing the private key, or NULL if it failed.
- * \see private_key_free()
+ * \see privatekey_free()
* \see publickey_from_privatekey()
*/
PRIVATE_KEY *privatekey_from_file(SSH_SESSION *session, const char *filename,
@@ -779,7 +779,7 @@ PRIVATE_KEY *_privatekey_from_file(void *session, const char *filename,
/** \brief deallocate a private key
* \param prv a PRIVATE_KEY object
*/
-void private_key_free(PRIVATE_KEY *prv) {
+void privatekey_free(PRIVATE_KEY *prv) {
if (prv == NULL) {
return;
}
diff --git a/libssh/server.c b/libssh/server.c
index b1f5e3bf..fd13274f 100644
--- a/libssh/server.c
+++ b/libssh/server.c
@@ -159,7 +159,7 @@ SSH_SESSION *ssh_bind_accept(SSH_BIND *ssh_bind){
rsa=_privatekey_from_file(ssh_bind,ssh_bind->options->rsakey,TYPE_RSA);
if(!rsa){
if(dsa)
- private_key_free(dsa);
+ privatekey_free(dsa);
return NULL;
}
}
@@ -168,9 +168,9 @@ SSH_SESSION *ssh_bind_accept(SSH_BIND *ssh_bind){
ssh_set_error(ssh_bind,SSH_FATAL,"Accepting a new connection: %s",
strerror(errno));
if(dsa)
- private_key_free(dsa);
+ privatekey_free(dsa);
if(rsa)
- private_key_free(rsa);
+ privatekey_free(rsa);
return NULL;
}
session=ssh_new();
@@ -180,9 +180,9 @@ SSH_SESSION *ssh_bind_accept(SSH_BIND *ssh_bind){
if (session->options == NULL) {
ssh_set_error(ssh_bind, SSH_FATAL, "No space left");
if (dsa)
- private_key_free(dsa);
+ privatekey_free(dsa);
if (rsa)
- private_key_free(rsa);
+ privatekey_free(rsa);
ssh_cleanup(session);
return NULL;
}
@@ -191,9 +191,9 @@ SSH_SESSION *ssh_bind_accept(SSH_BIND *ssh_bind){
session->socket=ssh_socket_new(session);
if (session->socket == NULL) {
if (dsa)
- private_key_free(dsa);
+ privatekey_free(dsa);
if (rsa)
- private_key_free(rsa);
+ privatekey_free(rsa);
ssh_cleanup(session);
return NULL;
}
@@ -310,11 +310,11 @@ static int dh_handshake_server(SSH_SESSION *session){
buffer_free(buf);
/* free private keys as they should not be readable past this point */
if(session->rsa_key){
- private_key_free(session->rsa_key);
+ privatekey_free(session->rsa_key);
session->rsa_key=NULL;
}
if(session->dsa_key){
- private_key_free(session->dsa_key);
+ privatekey_free(session->dsa_key);
session->dsa_key=NULL;
}
buffer_add_u8(session->out_buffer,SSH2_MSG_KEXDH_REPLY);
diff --git a/libssh/session.c b/libssh/session.c
index 894506f2..64c7fba6 100644
--- a/libssh/session.c
+++ b/libssh/session.c
@@ -125,8 +125,8 @@ void ssh_cleanup(SSH_SESSION *session) {
SAFE_FREE(session->client_kex.methods);
SAFE_FREE(session->server_kex.methods);
- private_key_free(session->dsa_key);
- private_key_free(session->rsa_key);
+ privatekey_free(session->dsa_key);
+ privatekey_free(session->rsa_key);
ssh_message_free(session->ssh_message);
ssh_options_free(session->options);