diff options
author | Damien Miller <djm@mindrot.org> | 2008-07-14 04:04:43 +0200 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2008-07-14 04:04:43 +0200 |
commit | 36d7056f4de36fa40cf9e16d7d21c64ae8763f80 (patch) | |
tree | d296fbb95b613517b14e1838f8a5538d939114cc /umac.c | |
parent | - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close() (diff) | |
download | openssh-36d7056f4de36fa40cf9e16d7d21c64ae8763f80.tar.xz openssh-36d7056f4de36fa40cf9e16d7d21c64ae8763f80.zip |
- (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
reported by cristian.ionescu-idbohrn AT axis.com
Diffstat (limited to 'umac.c')
-rw-r--r-- | umac.c | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -181,14 +181,14 @@ typedef AES_KEY aes_int_key[1]; /* The user-supplied UMAC key is stretched using AES in a counter * mode to supply all random bits needed by UMAC. The kdf function takes * an AES internal key representation 'key' and writes a stream of - * 'nbytes' bytes to the memory pointed at by 'buffer_ptr'. Each distinct + * 'nbytes' bytes to the memory pointed at by 'bufp'. Each distinct * 'ndx' causes a distinct byte stream. */ -static void kdf(void *buffer_ptr, aes_int_key key, UINT8 ndx, int nbytes) +static void kdf(void *bufp, aes_int_key key, UINT8 ndx, int nbytes) { UINT8 in_buf[AES_BLOCK_LEN] = {0}; UINT8 out_buf[AES_BLOCK_LEN]; - UINT8 *dst_buf = (UINT8 *)buffer_ptr; + UINT8 *dst_buf = (UINT8 *)bufp; int i; /* Setup the initial value */ |