dd5f0f5
diff -rup a/crypto/cipher/aes.c b/crypto/cipher/aes.c
dd5f0f5
--- a/crypto/cipher/aes.c	2014-10-13 10:35:33.000000000 -0400
dd5f0f5
+++ b/crypto/cipher/aes.c	2014-10-31 09:25:20.603597823 -0400
dd5f0f5
@@ -2002,7 +2002,7 @@ aes_inv_final_round(v128_t *state, const
1d54552
 
1d54552
 
1d54552
 void
1d54552
-aes_encrypt(v128_t *plaintext, const aes_expanded_key_t *exp_key) {
1d54552
+srtp_aes_encrypt(v128_t *plaintext, const aes_expanded_key_t *exp_key) {
1d54552
 
1d54552
   /* add in the subkey */
1d54552
   v128_xor_eq(plaintext, &exp_key->round[0]);
dd5f0f5
diff -rup a/crypto/cipher/aes_cbc.c b/crypto/cipher/aes_cbc.c
dd5f0f5
--- a/crypto/cipher/aes_cbc.c	2014-10-13 10:35:33.000000000 -0400
dd5f0f5
+++ b/crypto/cipher/aes_cbc.c	2014-10-31 09:25:20.604597828 -0400
dd5f0f5
@@ -192,7 +192,7 @@ aes_cbc_encrypt(aes_cbc_ctx_t *c,
1d54552
     debug_print(mod_aes_cbc, "inblock:  %s", 
1d54552
 	      v128_hex_string(&c->state));
1d54552
 
1d54552
-    aes_encrypt(&c->state, &c->expanded_key);
1d54552
+    srtp_aes_encrypt(&c->state, &c->expanded_key);
1d54552
 
1d54552
     debug_print(mod_aes_cbc, "outblock: %s", 
1d54552
 	      v128_hex_string(&c->state));
dd5f0f5
diff -rup a/crypto/cipher/aes_icm.c b/crypto/cipher/aes_icm.c
dd5f0f5
--- a/crypto/cipher/aes_icm.c	2014-10-13 10:35:33.000000000 -0400
dd5f0f5
+++ b/crypto/cipher/aes_icm.c	2014-10-31 09:25:20.604597828 -0400
dd5f0f5
@@ -260,7 +260,7 @@ aes_icm_set_octet(aes_icm_ctx_t *c,
1d54552
   /* fill keystream buffer, if needed */
1d54552
   if (tail_num) {
1d54552
     v128_copy(&c->keystream_buffer, &c->counter);
1d54552
-    aes_encrypt(&c->keystream_buffer, &c->expanded_key);
1d54552
+    srtp_aes_encrypt(&c->keystream_buffer, &c->expanded_key);
1d54552
     c->bytes_in_buffer = sizeof(v128_t);
1d54552
 
1d54552
     debug_print(mod_aes_icm, "counter:    %s", 
dd5f0f5
@@ -316,7 +316,7 @@ static inline void
1d54552
 aes_icm_advance_ismacryp(aes_icm_ctx_t *c, uint8_t forIsmacryp) {
1d54552
   /* fill buffer with new keystream */
1d54552
   v128_copy(&c->keystream_buffer, &c->counter);
1d54552
-  aes_encrypt(&c->keystream_buffer, &c->expanded_key);
1d54552
+  srtp_aes_encrypt(&c->keystream_buffer, &c->expanded_key);
1d54552
   c->bytes_in_buffer = sizeof(v128_t);
1d54552
 
1d54552
   debug_print(mod_aes_icm, "counter:    %s", 
dd5f0f5
diff -rup a/crypto/include/aes.h b/crypto/include/aes.h
dd5f0f5
--- a/crypto/include/aes.h	2014-10-13 10:35:33.000000000 -0400
dd5f0f5
+++ b/crypto/include/aes.h	2014-10-31 09:25:20.604597828 -0400
dd5f0f5
@@ -68,7 +68,7 @@ aes_expand_decryption_key(const uint8_t
1d54552
 			  aes_expanded_key_t *expanded_key);
1d54552
 
1d54552
 void
1d54552
-aes_encrypt(v128_t *plaintext, const aes_expanded_key_t *exp_key);
1d54552
+srtp_aes_encrypt(v128_t *plaintext, const aes_expanded_key_t *exp_key);
1d54552
 
1d54552
 void
1d54552
 aes_decrypt(v128_t *plaintext, const aes_expanded_key_t *exp_key);
dd5f0f5
diff -rup a/crypto/rng/prng.c b/crypto/rng/prng.c
dd5f0f5
--- a/crypto/rng/prng.c	2014-10-13 10:35:33.000000000 -0400
dd5f0f5
+++ b/crypto/rng/prng.c	2014-10-31 09:25:20.605597833 -0400
dd5f0f5
@@ -112,7 +112,7 @@ x917_prng_get_octet_string(uint8_t *dest
1d54552
     v128_copy(&buffer, &x917_prng.state);
1d54552
 
1d54552
     /* apply aes to buffer */
1d54552
-    aes_encrypt(&buffer, &x917_prng.key);
1d54552
+    srtp_aes_encrypt(&buffer, &x917_prng.key);
1d54552
     
1d54552
     /* write data to output */
1d54552
     *dest++ = buffer.v8[0];
dd5f0f5
@@ -136,7 +136,7 @@ x917_prng_get_octet_string(uint8_t *dest
1d54552
     buffer.v32[0] ^= t;
1d54552
 
1d54552
     /* encrypt buffer */
1d54552
-    aes_encrypt(&buffer, &x917_prng.key);
1d54552
+    srtp_aes_encrypt(&buffer, &x917_prng.key);
1d54552
 
1d54552
     /* copy buffer into state */
1d54552
     v128_copy(&x917_prng.state, &buffer);
dd5f0f5
@@ -154,7 +154,7 @@ x917_prng_get_octet_string(uint8_t *dest
1d54552
     v128_copy(&buffer, &x917_prng.state);
1d54552
 
1d54552
     /* apply aes to buffer */
1d54552
-    aes_encrypt(&buffer, &x917_prng.key);
1d54552
+    srtp_aes_encrypt(&buffer, &x917_prng.key);
1d54552
 
1d54552
     /* write data to output */
1d54552
     for (i=0; i < tail_len; i++) {
dd5f0f5
@@ -167,7 +167,7 @@ x917_prng_get_octet_string(uint8_t *dest
1d54552
     buffer.v32[0] ^= t;
1d54552
 
1d54552
     /* encrypt buffer */
1d54552
-    aes_encrypt(&buffer, &x917_prng.key);
1d54552
+    srtp_aes_encrypt(&buffer, &x917_prng.key);
1d54552
 
1d54552
     /* copy buffer into state */
1d54552
     v128_copy(&x917_prng.state, &buffer);
dd5f0f5
diff -rup a/crypto/test/aes_calc.c b/crypto/test/aes_calc.c
dd5f0f5
--- a/crypto/test/aes_calc.c	2014-10-13 10:35:33.000000000 -0400
dd5f0f5
+++ b/crypto/test/aes_calc.c	2014-10-31 09:25:20.605597833 -0400
dd5f0f5
@@ -109,7 +109,7 @@ main (int argc, char *argv[]) {
1d54552
     exit(1);
1d54552
   }
1d54552
 
1d54552
-  aes_encrypt(&data, &exp_key);
1d54552
+  srtp_aes_encrypt(&data, &exp_key);
1d54552
 
1d54552
   /* write ciphertext to output */
1d54552
   if (verbose) {
dd5f0f5
diff -rup a/tables/aes_tables.c b/tables/aes_tables.c
dd5f0f5
--- a/tables/aes_tables.c	2014-10-13 10:35:33.000000000 -0400
dd5f0f5
+++ b/tables/aes_tables.c	2014-10-31 09:25:20.605597833 -0400
dd5f0f5
@@ -298,7 +298,7 @@ main(void) {
1d54552
 
1d54552
 #if AES_INVERSE_TEST
1d54552
   /* 
1d54552
-   * test that aes_encrypt and aes_decrypt are actually
1d54552
+   * test that srtp_aes_encrypt and aes_decrypt are actually
1d54552
    * inverses of each other 
1d54552
    */
1d54552
     
dd5f0f5
@@ -335,7 +335,7 @@ aes_test_inverse(void) {
1d54552
   v128_copy_octet_string(&x, plaintext);
1d54552
   aes_expand_encryption_key(k, expanded_key);
1d54552
   aes_expand_decryption_key(k, decrypt_key);
1d54552
-  aes_encrypt(&x, expanded_key);
1d54552
+  srtp_aes_encrypt(&x, expanded_key);
1d54552
   aes_decrypt(&x, decrypt_key);
1d54552
   
1d54552
   /* compare to expected value then report */