]> andersk Git - openssh.git/commitdiff
- markus@cvs.openbsd.org 2001/06/27 05:42:25
authormouring <mouring>
Wed, 4 Jul 2001 05:02:23 +0000 (05:02 +0000)
committermouring <mouring>
Wed, 4 Jul 2001 05:02:23 +0000 (05:02 +0000)
     [rsa.c rsa.h ssh-agent.c ssh-keygen.c]
     s/generate_additional_parameters/rsa_generate_additional_parameters/
     http://www.humppa.com/

ChangeLog
rsa.c
rsa.h
ssh-agent.c
ssh-keygen.c

index f48bdef587c8ab9588ba7637f388dc9e08c6d50c..c2fee2c3487e92be919a695c89543164ec5c63fb 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
    - markus@cvs.openbsd.org 2001/06/27 05:35:42
      [ssh-keygen.c]
      use cyberflex_inq_class to inquire class.
+   - markus@cvs.openbsd.org 2001/06/27 05:42:25
+     [rsa.c rsa.h ssh-agent.c ssh-keygen.c]
+     s/generate_additional_parameters/rsa_generate_additional_parameters/
+     http://www.humppa.com/
  
 20010629
  - (bal) Removed net_aton() since we don't use it any more
diff --git a/rsa.c b/rsa.c
index f69f99606bbf2161a054957f8e2ea9e3e4bd78cf..113ee7fc42347977adc011b5610c790d466c825c 100644 (file)
--- a/rsa.c
+++ b/rsa.c
@@ -60,7 +60,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: rsa.c,v 1.22 2001/03/26 23:23:23 markus Exp $");
+RCSID("$OpenBSD: rsa.c,v 1.23 2001/06/27 05:42:24 markus Exp $");
 
 #include "rsa.h"
 #include "log.h"
@@ -121,7 +121,7 @@ rsa_private_decrypt(BIGNUM *out, BIGNUM *in, RSA *key)
 }
 
 void
-generate_additional_parameters(RSA *rsa)
+rsa_generate_additional_parameters(RSA *rsa)
 {
        BIGNUM *aux;
        BN_CTX *ctx;
diff --git a/rsa.h b/rsa.h
index 70756f83c0d476dbf2d7207b7660b263513c14d7..2f596d4915154fa310ce8e29306628ad59059bd8 100644 (file)
--- a/rsa.h
+++ b/rsa.h
@@ -11,7 +11,7 @@
  * called by a name other than "ssh" or "Secure Shell".
  */
 
-/* RCSID("$OpenBSD: rsa.h,v 1.13 2001/06/26 17:27:24 markus Exp $"); */
+/* RCSID("$OpenBSD: rsa.h,v 1.14 2001/06/27 05:42:24 markus Exp $"); */
 
 #ifndef RSA_H
 #define RSA_H
@@ -21,6 +21,6 @@
 
 void    rsa_public_encrypt(BIGNUM *, BIGNUM *, RSA *);
 int     rsa_private_decrypt(BIGNUM *, BIGNUM *, RSA *);
-void    generate_additional_parameters(RSA *);
+void    rsa_generate_additional_parameters(RSA *);
 
 #endif                         /* RSA_H */
index 41dd777cb75473950dbe1ff8f51c5fe1d1572941..309b9d4148cca83e00471ee07a292c3d727e935c 100644 (file)
@@ -1,4 +1,4 @@
-/*     $OpenBSD: ssh-agent.c,v 1.59 2001/06/26 05:33:34 markus Exp $   */
+/*     $OpenBSD: ssh-agent.c,v 1.60 2001/06/27 05:42:25 markus Exp $   */
 
 /*
  * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -36,7 +36,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh-agent.c,v 1.59 2001/06/26 05:33:34 markus Exp $");
+RCSID("$OpenBSD: ssh-agent.c,v 1.60 2001/06/27 05:42:25 markus Exp $");
 
 #include <openssl/evp.h>
 #include <openssl/md5.h>
@@ -385,7 +385,7 @@ process_add_identity(SocketEntry *e, int version)
                buffer_get_bignum(&e->input, k->rsa->p);        /* q */
 
                /* Generate additional parameters */
-               generate_additional_parameters(k->rsa);
+               rsa_generate_additional_parameters(k->rsa);
                break;
        case 2:
                type_name = buffer_get_string(&e->input, NULL);
@@ -410,7 +410,7 @@ process_add_identity(SocketEntry *e, int version)
                        buffer_get_bignum2(&e->input, k->rsa->q);
 
                        /* Generate additional parameters */
-                       generate_additional_parameters(k->rsa);
+                       rsa_generate_additional_parameters(k->rsa);
                        break;
                default:
                        buffer_clear(&e->input);
index cd5d5e55951d1d71bc15387aeb56e09ad470625a..e085c12c81fddc6a8bcfb7416dbe2ffbcf43e45e 100644 (file)
@@ -12,7 +12,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh-keygen.c,v 1.67 2001/06/27 05:35:42 markus Exp $");
+RCSID("$OpenBSD: ssh-keygen.c,v 1.68 2001/06/27 05:42:25 markus Exp $");
 
 #include <openssl/evp.h>
 #include <openssl/pem.h>
@@ -264,7 +264,7 @@ do_convert_private_ssh2_from_blob(char *blob, int blen)
                buffer_get_bignum_bits(&b, key->rsa->iqmp);
                buffer_get_bignum_bits(&b, key->rsa->q);
                buffer_get_bignum_bits(&b, key->rsa->p);
-               generate_additional_parameters(key->rsa);
+               rsa_generate_additional_parameters(key->rsa);
                break;
        }
        rlen = buffer_len(&b);
This page took 1.526511 seconds and 5 git commands to generate.