@@ -203,17 +203,17 @@ impl<G: Group, D: Digest> Client<G, D> {
203203 /// Process server reply to the handshake according to RFC 5054.
204204 ///
205205 /// # Params
206- /// `a` is a random value,
207- /// `username`, `password` is supplied by the user
208- /// `salt` and `b_pub` come from the server
209- pub fn process_reply_rfc5054 (
206+ /// - `a` is a random value,
207+ /// - `username`, `password` is supplied by the user
208+ /// - `salt` and `b_pub` come from the server
209+ pub fn process_reply (
210210 & self ,
211211 a : & [ u8 ] ,
212212 username : & [ u8 ] ,
213213 password : & [ u8 ] ,
214214 salt : & [ u8 ] ,
215215 b_pub : & [ u8 ] ,
216- ) -> Result < ClientVerifierRfc5054 < D > , AuthError > {
216+ ) -> Result < ClientVerifier < D > , AuthError > {
217217 let a = BoxedUint :: from_be_slice_vartime ( a) ;
218218 let a_pub = self . compute_g_x ( & a) ;
219219 let b_pub = BoxedUint :: from_be_slice_vartime ( b_pub) ;
@@ -250,7 +250,7 @@ impl<G: Group, D: Digest> Client<G, D> {
250250 session_key. as_slice ( ) ,
251251 ) ;
252252
253- Ok ( ClientVerifierRfc5054 {
253+ Ok ( ClientVerifier {
254254 m1,
255255 m2,
256256 key : premaster_secret. to_vec ( ) ,
@@ -351,14 +351,14 @@ impl<G: Group, D: Digest> Default for Client<G, D> {
351351}
352352
353353/// RFC 5054 SRP client state after handshake with the server.
354- pub struct ClientVerifierRfc5054 < D : Digest > {
354+ pub struct ClientVerifier < D : Digest > {
355355 m1 : Output < D > ,
356356 m2 : Output < D > ,
357357 key : Vec < u8 > ,
358358 session_key : Vec < u8 > ,
359359}
360360
361- impl < D : Digest > ClientVerifierRfc5054 < D > {
361+ impl < D : Digest > ClientVerifier < D > {
362362 /// Get shared secret key without authenticating server, e.g. for using with
363363 /// authenticated encryption modes. DO NOT USE this method without
364364 /// some kind of secure authentication
0 commit comments