diff options
Diffstat (limited to 'core')
-rw-r--r-- | core/net_crypto.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/core/net_crypto.c b/core/net_crypto.c index 561ba866..4ce173c5 100644 --- a/core/net_crypto.c +++ b/core/net_crypto.c | |||
@@ -126,7 +126,7 @@ int decrypt_data(uint8_t *public_key, uint8_t *secret_key, uint8_t *nonce, | |||
126 | } | 126 | } |
127 | 127 | ||
128 | /* increment the given nonce by 1 */ | 128 | /* increment the given nonce by 1 */ |
129 | void increment_nonce(uint8_t *nonce) | 129 | static void increment_nonce(uint8_t *nonce) |
130 | { | 130 | { |
131 | uint32_t i; | 131 | uint32_t i; |
132 | for (i = 0; i < crypto_box_NONCEBYTES; ++i) { | 132 | for (i = 0; i < crypto_box_NONCEBYTES; ++i) { |
@@ -243,7 +243,7 @@ int handle_request(uint8_t *public_key, uint8_t *data, uint8_t *packet, uint16_t | |||
243 | /* Send a crypto handshake packet containing an encrypted secret nonce and session public key | 243 | /* Send a crypto handshake packet containing an encrypted secret nonce and session public key |
244 | to peer with connection_id and public_key | 244 | to peer with connection_id and public_key |
245 | the packet is encrypted with a random nonce which is sent in plain text with the packet */ | 245 | the packet is encrypted with a random nonce which is sent in plain text with the packet */ |
246 | int send_cryptohandshake(int connection_id, uint8_t *public_key, uint8_t *secret_nonce, uint8_t *session_key) | 246 | static int send_cryptohandshake(int connection_id, uint8_t *public_key, uint8_t *secret_nonce, uint8_t *session_key) |
247 | { | 247 | { |
248 | uint8_t temp_data[MAX_DATA_SIZE]; | 248 | uint8_t temp_data[MAX_DATA_SIZE]; |
249 | uint8_t temp[crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES]; | 249 | uint8_t temp[crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES]; |
@@ -266,7 +266,7 @@ int send_cryptohandshake(int connection_id, uint8_t *public_key, uint8_t *secret | |||
266 | /* Extract secret nonce, session public key and public_key from a packet(data) with length length | 266 | /* Extract secret nonce, session public key and public_key from a packet(data) with length length |
267 | return 1 if successful | 267 | return 1 if successful |
268 | return 0 if failure */ | 268 | return 0 if failure */ |
269 | int handle_cryptohandshake(uint8_t *public_key, uint8_t *secret_nonce, | 269 | static int handle_cryptohandshake(uint8_t *public_key, uint8_t *secret_nonce, |
270 | uint8_t *session_key, uint8_t *data, uint16_t length) | 270 | uint8_t *session_key, uint8_t *data, uint16_t length) |
271 | { | 271 | { |
272 | int pad = (- crypto_box_BOXZEROBYTES + crypto_box_ZEROBYTES); | 272 | int pad = (- crypto_box_BOXZEROBYTES + crypto_box_ZEROBYTES); |
@@ -295,7 +295,7 @@ int handle_cryptohandshake(uint8_t *public_key, uint8_t *secret_nonce, | |||
295 | /* get crypto connection id from public key of peer | 295 | /* get crypto connection id from public key of peer |
296 | return -1 if there are no connections like we are looking for | 296 | return -1 if there are no connections like we are looking for |
297 | return id if it found it */ | 297 | return id if it found it */ |
298 | int getcryptconnection_id(uint8_t *public_key) | 298 | static int getcryptconnection_id(uint8_t *public_key) |
299 | { | 299 | { |
300 | uint32_t i; | 300 | uint32_t i; |
301 | for (i = 0; i < MAX_CRYPTO_CONNECTIONS; ++i) { | 301 | for (i = 0; i < MAX_CRYPTO_CONNECTIONS; ++i) { |
@@ -465,7 +465,7 @@ void load_keys(uint8_t *keys) | |||
465 | adds an incoming connection to the incoming_connection list. | 465 | adds an incoming connection to the incoming_connection list. |
466 | returns 0 if successful | 466 | returns 0 if successful |
467 | returns 1 if failure */ | 467 | returns 1 if failure */ |
468 | int new_incoming(int id) | 468 | static int new_incoming(int id) |
469 | { | 469 | { |
470 | uint32_t i; | 470 | uint32_t i; |
471 | for (i = 0; i < MAX_INCOMING; ++i) { | 471 | for (i = 0; i < MAX_INCOMING; ++i) { |