with the next receiver's key. The `data' is the channel message. If
the `force_send' is TRUE then the packet is sent immediately. */
-bool silc_client_send_channel_message(SilcClient client,
+SilcBool silc_client_send_channel_message(SilcClient client,
SilcClientConnection conn,
SilcChannelEntry channel,
SilcChannelPrivateKey key,
SilcMessageFlags flags,
unsigned char *data,
SilcUInt32 data_len,
- bool force_send)
+ SilcBool force_send)
{
SilcSocketConnection sock;
SilcBuffer payload;
unsigned char *id_string;
int block_len;
SilcChannelUser chu;
- bool ret = FALSE;
+ SilcBool ret = FALSE;
assert(client && conn && channel);
sock = conn->sock;
SilcBuffer key_payload,
SilcChannelEntry channel)
{
- unsigned char *id_string, *key, *cipher, *hmac, hash[32];
+ unsigned char *id_string, *key, *cipher, *hmac, hash[SILC_HASH_MAXLEN];
SilcUInt32 tmp_len;
SilcChannelID *id;
SilcChannelKeyPayload payload;
currently it is not expected that the SKE key material would be used
as channel private key. However, this API allows it. */
-bool silc_client_add_channel_private_key(SilcClient client,
+SilcBool silc_client_add_channel_private_key(SilcClient client,
SilcClientConnection conn,
SilcChannelEntry channel,
const char *name,
SilcChannelPrivateKey *ret_key)
{
SilcChannelPrivateKey entry;
- unsigned char hash[32];
+ unsigned char hash[SILC_HASH_MAXLEN];
SilcSKEKeyMaterial *keymat;
assert(client && channel);
after calling this to protect the channel messages. Returns FALSE on
on error, TRUE otherwise. */
-bool silc_client_del_channel_private_keys(SilcClient client,
+SilcBool silc_client_del_channel_private_keys(SilcClient client,
SilcClientConnection conn,
SilcChannelEntry channel)
{
old channel key is used hereafter to protect the channel messages. This
returns FALSE on error, TRUE otherwise. */
-bool silc_client_del_channel_private_key(SilcClient client,
+SilcBool silc_client_del_channel_private_key(SilcClient client,
SilcClientConnection conn,
SilcChannelEntry channel,
SilcChannelPrivateKey key)