summaryrefslogtreecommitdiff
path: root/core
diff options
context:
space:
mode:
authorFlorian Hahn <flo@fhahn.com>2013-08-04 23:01:11 +0200
committerFlorian Hahn <flo@fhahn.com>2013-08-04 23:05:20 +0200
commit8680cf76bfee0fe21529d6f4747801d246be177f (patch)
tree876db7448befa3719e394f602c0355248239ecc1 /core
parentb9f387b3b7c5f8eff64b6ad8213f24f04ce58967 (diff)
Make private functions in core/net_crypto.c static
Diffstat (limited to 'core')
-rw-r--r--core/net_crypto.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/core/net_crypto.c b/core/net_crypto.c
index 561ba866..4ce173c5 100644
--- a/core/net_crypto.c
+++ b/core/net_crypto.c
@@ -126,7 +126,7 @@ int decrypt_data(uint8_t *public_key, uint8_t *secret_key, uint8_t *nonce,
126} 126}
127 127
128/* increment the given nonce by 1 */ 128/* increment the given nonce by 1 */
129void increment_nonce(uint8_t *nonce) 129static void increment_nonce(uint8_t *nonce)
130{ 130{
131 uint32_t i; 131 uint32_t i;
132 for (i = 0; i < crypto_box_NONCEBYTES; ++i) { 132 for (i = 0; i < crypto_box_NONCEBYTES; ++i) {
@@ -243,7 +243,7 @@ int handle_request(uint8_t *public_key, uint8_t *data, uint8_t *packet, uint16_t
243/* Send a crypto handshake packet containing an encrypted secret nonce and session public key 243/* Send a crypto handshake packet containing an encrypted secret nonce and session public key
244 to peer with connection_id and public_key 244 to peer with connection_id and public_key
245 the packet is encrypted with a random nonce which is sent in plain text with the packet */ 245 the packet is encrypted with a random nonce which is sent in plain text with the packet */
246int send_cryptohandshake(int connection_id, uint8_t *public_key, uint8_t *secret_nonce, uint8_t *session_key) 246static int send_cryptohandshake(int connection_id, uint8_t *public_key, uint8_t *secret_nonce, uint8_t *session_key)
247{ 247{
248 uint8_t temp_data[MAX_DATA_SIZE]; 248 uint8_t temp_data[MAX_DATA_SIZE];
249 uint8_t temp[crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES]; 249 uint8_t temp[crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES];
@@ -266,7 +266,7 @@ int send_cryptohandshake(int connection_id, uint8_t *public_key, uint8_t *secret
266/* Extract secret nonce, session public key and public_key from a packet(data) with length length 266/* Extract secret nonce, session public key and public_key from a packet(data) with length length
267 return 1 if successful 267 return 1 if successful
268 return 0 if failure */ 268 return 0 if failure */
269int handle_cryptohandshake(uint8_t *public_key, uint8_t *secret_nonce, 269static int handle_cryptohandshake(uint8_t *public_key, uint8_t *secret_nonce,
270 uint8_t *session_key, uint8_t *data, uint16_t length) 270 uint8_t *session_key, uint8_t *data, uint16_t length)
271{ 271{
272 int pad = (- crypto_box_BOXZEROBYTES + crypto_box_ZEROBYTES); 272 int pad = (- crypto_box_BOXZEROBYTES + crypto_box_ZEROBYTES);
@@ -295,7 +295,7 @@ int handle_cryptohandshake(uint8_t *public_key, uint8_t *secret_nonce,
295/* get crypto connection id from public key of peer 295/* get crypto connection id from public key of peer
296 return -1 if there are no connections like we are looking for 296 return -1 if there are no connections like we are looking for
297 return id if it found it */ 297 return id if it found it */
298int getcryptconnection_id(uint8_t *public_key) 298static int getcryptconnection_id(uint8_t *public_key)
299{ 299{
300 uint32_t i; 300 uint32_t i;
301 for (i = 0; i < MAX_CRYPTO_CONNECTIONS; ++i) { 301 for (i = 0; i < MAX_CRYPTO_CONNECTIONS; ++i) {
@@ -465,7 +465,7 @@ void load_keys(uint8_t *keys)
465 adds an incoming connection to the incoming_connection list. 465 adds an incoming connection to the incoming_connection list.
466 returns 0 if successful 466 returns 0 if successful
467 returns 1 if failure */ 467 returns 1 if failure */
468int new_incoming(int id) 468static int new_incoming(int id)
469{ 469{
470 uint32_t i; 470 uint32_t i;
471 for (i = 0; i < MAX_INCOMING; ++i) { 471 for (i = 0; i < MAX_INCOMING; ++i) {