diff options
author | Andreas Schneider <mail@cynapses.org> | 2009-04-20 07:26:50 +0000 |
---|---|---|
committer | Andreas Schneider <mail@cynapses.org> | 2009-04-20 07:26:50 +0000 |
commit | 9704df65e3adc6eea7c8b70e366d63ec0a3cd478 (patch) | |
tree | 3e0fb9f3adbc8fdea4190b96dee80799cf9107ae | |
parent | a3c820cf948c25afd36c85a2302ecfdeb82a0cf4 (diff) | |
download | libssh-9704df65e3adc6eea7c8b70e366d63ec0a3cd478.tar.gz libssh-9704df65e3adc6eea7c8b70e366d63ec0a3cd478.tar.xz libssh-9704df65e3adc6eea7c8b70e366d63ec0a3cd478.zip |
Rename privatekey_free() to be consistent with publickey_free().
git-svn-id: svn+ssh://svn.berlios.de/svnroot/repos/libssh/trunk@563 7dcaeef0-15fb-0310-b436-a5af3365683c
-rw-r--r-- | include/libssh/libssh.h | 2 | ||||
-rw-r--r-- | libssh/auth.c | 10 | ||||
-rw-r--r-- | libssh/keyfiles.c | 4 | ||||
-rw-r--r-- | libssh/server.c | 18 | ||||
-rw-r--r-- | libssh/session.c | 4 |
5 files changed, 19 insertions, 19 deletions
diff --git a/include/libssh/libssh.h b/include/libssh/libssh.h index f265fa0b..fc6a4230 100644 --- a/include/libssh/libssh.h +++ b/include/libssh/libssh.h @@ -252,7 +252,7 @@ PRIVATE_KEY *privatekey_from_file(SSH_SESSION *session, const char *filename, int type, const char *passphrase); STRING *publickey_to_string(PUBLIC_KEY *key); PUBLIC_KEY *publickey_from_privatekey(PRIVATE_KEY *prv); -void private_key_free(PRIVATE_KEY *prv); +void privatekey_free(PRIVATE_KEY *prv); STRING *publickey_from_file(SSH_SESSION *session, const char *filename,int *_type); STRING *publickey_from_next_file(SSH_SESSION *session, const char **pub_keys_path, const char **keys_path, char **privkeyfile, int *type, int *count); diff --git a/libssh/auth.c b/libssh/auth.c index 105272c2..99c2d05e 100644 --- a/libssh/auth.c +++ b/libssh/auth.c @@ -360,7 +360,7 @@ error: * SSH_AUTH_SUCCESS : Authentication success * \see publickey_from_file() * \see privatekey_from_file() - * \see private_key_free() + * \see privatekey_free() * \see ssh_userauth_offer_pubkey() */ @@ -471,7 +471,7 @@ error: * SSH_AUTH_SUCCESS : Authentication success * \see publickey_from_file() * \see privatekey_from_file() - * \see private_key_free() + * \see privatekey_free() * \see ssh_userauth_offer_pubkey() */ @@ -865,7 +865,7 @@ int ssh_userauth_autopubkey(SSH_SESSION *session, const char *passphrase) { } free(pubkey); free(privkeyfile); - private_key_free(privkey); + privatekey_free(privkey); leave_function(); return err; } else @@ -877,14 +877,14 @@ int ssh_userauth_autopubkey(SSH_SESSION *session, const char *passphrase) { pubkey=NULL; free(privkeyfile); privkeyfile=NULL; - private_key_free(privkey); + privatekey_free(privkey); continue; } /* auth success */ ssh_log(session, SSH_LOG_RARE, "Authentication using %s success\n", privkeyfile); free(pubkey); - private_key_free(privkey); + privatekey_free(privkey); free(privkeyfile); if(id){ pub_keys_path[0]=NULL; diff --git a/libssh/keyfiles.c b/libssh/keyfiles.c index 51b99e8e..bb0af82a 100644 --- a/libssh/keyfiles.c +++ b/libssh/keyfiles.c @@ -603,7 +603,7 @@ static int pem_get_password(char *buf, int size, int rwflag, void *userdata) { * \param type Type of the private key. One of TYPE_DSS or TYPE_RSA. * \param passphrase Passphrase to decrypt the private key. Set to null if none is needed or it is unknown. * \returns a PRIVATE_KEY object containing the private key, or NULL if it failed. - * \see private_key_free() + * \see privatekey_free() * \see publickey_from_privatekey() */ PRIVATE_KEY *privatekey_from_file(SSH_SESSION *session, const char *filename, @@ -779,7 +779,7 @@ PRIVATE_KEY *_privatekey_from_file(void *session, const char *filename, /** \brief deallocate a private key * \param prv a PRIVATE_KEY object */ -void private_key_free(PRIVATE_KEY *prv) { +void privatekey_free(PRIVATE_KEY *prv) { if (prv == NULL) { return; } diff --git a/libssh/server.c b/libssh/server.c index b1f5e3bf..fd13274f 100644 --- a/libssh/server.c +++ b/libssh/server.c @@ -159,7 +159,7 @@ SSH_SESSION *ssh_bind_accept(SSH_BIND *ssh_bind){ rsa=_privatekey_from_file(ssh_bind,ssh_bind->options->rsakey,TYPE_RSA); if(!rsa){ if(dsa) - private_key_free(dsa); + privatekey_free(dsa); return NULL; } } @@ -168,9 +168,9 @@ SSH_SESSION *ssh_bind_accept(SSH_BIND *ssh_bind){ ssh_set_error(ssh_bind,SSH_FATAL,"Accepting a new connection: %s", strerror(errno)); if(dsa) - private_key_free(dsa); + privatekey_free(dsa); if(rsa) - private_key_free(rsa); + privatekey_free(rsa); return NULL; } session=ssh_new(); @@ -180,9 +180,9 @@ SSH_SESSION *ssh_bind_accept(SSH_BIND *ssh_bind){ if (session->options == NULL) { ssh_set_error(ssh_bind, SSH_FATAL, "No space left"); if (dsa) - private_key_free(dsa); + privatekey_free(dsa); if (rsa) - private_key_free(rsa); + privatekey_free(rsa); ssh_cleanup(session); return NULL; } @@ -191,9 +191,9 @@ SSH_SESSION *ssh_bind_accept(SSH_BIND *ssh_bind){ session->socket=ssh_socket_new(session); if (session->socket == NULL) { if (dsa) - private_key_free(dsa); + privatekey_free(dsa); if (rsa) - private_key_free(rsa); + privatekey_free(rsa); ssh_cleanup(session); return NULL; } @@ -310,11 +310,11 @@ static int dh_handshake_server(SSH_SESSION *session){ buffer_free(buf); /* free private keys as they should not be readable past this point */ if(session->rsa_key){ - private_key_free(session->rsa_key); + privatekey_free(session->rsa_key); session->rsa_key=NULL; } if(session->dsa_key){ - private_key_free(session->dsa_key); + privatekey_free(session->dsa_key); session->dsa_key=NULL; } buffer_add_u8(session->out_buffer,SSH2_MSG_KEXDH_REPLY); diff --git a/libssh/session.c b/libssh/session.c index 894506f2..64c7fba6 100644 --- a/libssh/session.c +++ b/libssh/session.c @@ -125,8 +125,8 @@ void ssh_cleanup(SSH_SESSION *session) { SAFE_FREE(session->client_kex.methods); SAFE_FREE(session->server_kex.methods); - private_key_free(session->dsa_key); - private_key_free(session->rsa_key); + privatekey_free(session->dsa_key); + privatekey_free(session->rsa_key); ssh_message_free(session->ssh_message); ssh_options_free(session->options); |