#ifndef IDLIST_H
#define IDLIST_H
+typedef enum {
+ SILC_CLIENT_STATUS_NONE = 0x0000,
+ SILC_CLIENT_STATUS_RESOLVING = 0x0001,
+} SilcClientStatus;
+
/* Client entry context. When client receives information about new client
(it receives its ID, for example, by IDENTIFY request) we create new
client entry. This entry also includes the private message keys if
uint32 num;
uint32 mode; /* User mode in SILC */
SilcClientID *id; /* The Client ID */
+ bool valid; /* FALSE if this entry is not valid */
SilcCipher send_key; /* Private message key for sending */
SilcCipher receive_key; /* Private message key for receiving */
unsigned char *key; /* Set only if appliation provided the
key material. NULL if the library
generated the key. */
uint32 key_len;
- int generated; /* TRUE if library generated the key */
+ bool generated; /* TRUE if library generated the key */
SilcClientKeyAgreement ke; /* Current key agreement context or NULL */
+ SilcClientStatus status; /* Status mask */
} *SilcClientEntry;
/* Client and its mode on a channel */
char *channel_name;
SilcChannelID *id;
uint32 mode;
- int on_channel;
+ bool on_channel;
/* Joined clients */
SilcList clients;
SilcHmac hmac; /* Current HMAC */
SilcDList private_keys; /* List of private keys or NULL */
SilcChannelPrivateKey curr_key; /* Current private key */
+
+ /* Old channel key is saved for a short period of time when rekey occurs
+ in case if someone is sending messages after the rekey encrypted with
+ the old key, we can still decrypt them. */
+ SilcCipher old_channel_key;
+ SilcHmac old_hmac;
+ SilcTask rekey_task;
} *SilcChannelEntry;
/* Server entry context. This represents one server. When server information