/* Put USER_INFO */
silc_client_attribute_del(silc_client, conn,
SILC_ATTRIBUTE_USER_INFO, NULL);
- tmp = silc_file_readfile(sv, &tmp_len);
+ tmp = silc_file_readfile(sv, &tmp_len, NULL);
if (tmp) {
tmp[tmp_len] = 0;
if (silc_vcard_decode(tmp, tmp_len, &vcard))
/* Put STATUS_MESSAGE */
silc_client_attribute_del(silc_client, conn,
SILC_ATTRIBUTE_STATUS_MESSAGE, NULL);
- tmp = silc_file_readfile(sv, &tmp_len);
+ tmp = silc_file_readfile(sv, &tmp_len, NULL);
if (tmp) {
mime = silc_mime_decode(NULL, tmp, tmp_len);
if (mime)
list = g_strsplit(sv, " ", -1);
for (entry = list; *entry != NULL; entry++) {
if (!strncasecmp(*entry, "silc-rsa:", 8)) {
- tmp = silc_file_readfile((*entry) + 8, &tmp_len);
+ tmp = silc_file_readfile((*entry) + 8, &tmp_len, NULL);
if (tmp) {
tmp[tmp_len] = 0;
pk.type = "silc-rsa";
unsigned char *verifyd;
SilcUInt32 verify_len;
- if (!strcmp(verify->userpk.type, "silc-rsa"))
+ if (!strcmp(serverpk.type, "silc-rsa"))
type = SILC_PKCS_SILC;
- else if (!strcmp(verify->userpk.type, "ssh-rsa"))
+ else if (!strcmp(serverpk.type, "ssh-rsa"))
type = SILC_PKCS_SSH2;
- else if (!strcmp(verify->userpk.type, "x509v3-sign-rsa"))
+ else if (!strcmp(serverpk.type, "x509v3-sign-rsa"))
type = SILC_PKCS_X509V3;
- else if (!strcmp(verify->userpk.type, "pgp-sign-rsa"))
+ else if (!strcmp(serverpk.type, "pgp-sign-rsa"))
type = SILC_PKCS_OPENPGP;
if (silc_pkcs_public_key_alloc(type, serverpk.data,