projects
/
silc.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Integer type name change.
[silc.git]
/
lib
/
silcclient
/
protocol.h
diff --git
a/lib/silcclient/protocol.h
b/lib/silcclient/protocol.h
index fc73f6de37e018723cad55286fa19065f1d034fb..9d93709210bd550ea29801218564d2c1b3ec225e 100644
(file)
--- a/
lib/silcclient/protocol.h
+++ b/
lib/silcclient/protocol.h
@@
-68,7
+68,7
@@
typedef struct {
starting the protocol if we know the authentication data. Otherwise
these are and remain NULL. */
unsigned char *auth_data;
starting the protocol if we know the authentication data. Otherwise
these are and remain NULL. */
unsigned char *auth_data;
-
ui
nt32 auth_data_len;
+
SilcUI
nt32 auth_data_len;
SilcTask timeout_task;
} SilcClientConnAuthInternalContext;
SilcTask timeout_task;
} SilcClientConnAuthInternalContext;
@@
-81,7
+81,6
@@
typedef struct {
bool responder; /* TRUE if we are receiving party */
bool pfs; /* TRUE if PFS is to be used */
SilcSKE ske; /* Defined if PFS is used */
bool responder; /* TRUE if we are receiving party */
bool pfs; /* TRUE if PFS is to be used */
SilcSKE ske; /* Defined if PFS is used */
- SilcSKEKeyMaterial *keymat; /* Defined if PFS is used */
SilcPacketContext *packet;
} SilcClientRekeyInternalContext;
SilcPacketContext *packet;
} SilcClientRekeyInternalContext;
@@
-92,11
+91,13
@@
void silc_client_protocol_ke_send_packet(SilcSKE ske,
SilcBuffer packet,
SilcPacketType type,
void *context);
SilcBuffer packet,
SilcPacketType type,
void *context);
-SilcSKEStatus silc_client_protocol_ke_verify_key(SilcSKE ske,
- unsigned char *pk_data,
- uint32 pk_len,
- SilcSKEPKType pk_type,
- void *context);
+void silc_client_protocol_ke_verify_key(SilcSKE ske,
+ unsigned char *pk_data,
+ SilcUInt32 pk_len,
+ SilcSKEPKType pk_type,
+ void *context,
+ SilcSKEVerifyCbCompletion completion,
+ void *completion_context);
void silc_client_protocol_ke_set_keys(SilcSKE ske,
SilcSocketConnection sock,
SilcSKEKeyMaterial *keymat,
void silc_client_protocol_ke_set_keys(SilcSKE ske,
SilcSocketConnection sock,
SilcSKEKeyMaterial *keymat,
@@
-104,11
+105,7
@@
void silc_client_protocol_ke_set_keys(SilcSKE ske,
SilcPKCS pkcs,
SilcHash hash,
SilcHmac hmac,
SilcPKCS pkcs,
SilcHash hash,
SilcHmac hmac,
- SilcSKEDiffieHellmanGroup group);
-void silc_client_protocol_rekey_generate(SilcClient client,
- SilcClientRekeyInternalContext *ctx);
-void
-silc_client_protocol_rekey_generate_pfs(SilcClient client,
- SilcClientRekeyInternalContext *ctx);
+ SilcSKEDiffieHellmanGroup group,
+ bool is_responder);
#endif
#endif