X-Git-Url: http://git.silcnet.org/gitweb/?a=blobdiff_plain;f=apps%2Fsilcd%2Fprotocol.h;h=a6ce666a1d28c3a7e94c3a77da40c531c328e2dc;hb=a818c5b5411bbc4436d1c5f011236985c96bb787;hp=d0c2bba34398e33a9022cdeb4d519169103166bc;hpb=5159d7204e05ab1fbefdc5fd351ec4da021ce577;p=silc.git diff --git a/apps/silcd/protocol.h b/apps/silcd/protocol.h index d0c2bba3..a6ce666a 100644 --- a/apps/silcd/protocol.h +++ b/apps/silcd/protocol.h @@ -26,6 +26,7 @@ #define SILC_PROTOCOL_SERVER_CONNECTION_AUTH 1 #define SILC_PROTOCOL_SERVER_KEY_EXCHANGE 2 #define SILC_PROTOCOL_SERVER_REKEY 3 +#define SILC_PROTOCOL_SERVER_BACKUP 4 /* #define SILC_PROTOCOL_SERVER_MAX 255 */ /* Internal context for Key Exchange protocol. */ @@ -43,8 +44,14 @@ typedef struct { void *dest_id; SilcIdType dest_id_type; + /* Pointer to the configurations. */ + void *cconfig; + void *sconfig; + void *rconfig; + SilcTask timeout_task; SilcPacketContext *packet; + SilcSKESecurityPropertyFlag flags; SilcSKE ske; SilcSKEKeyMaterial *keymat; } SilcServerKEInternalContext; @@ -61,24 +68,25 @@ typedef struct { /* SKE object from Key Exchange protocol. */ SilcSKE ske; - /* Auth method that must be used. This is resolved before this - connection authentication protocol is started. Used when we are - initiating. */ - uint32 auth_meth; - - /* Authentication data if we alreay know it. This is filled before - starting the protocol if we know the authentication data. Otherwise - these are and remain NULL. Used when we are initiating. */ + /* Authentication method and data if we alreay know it. This is filled + before starting the protocol if we know the authentication data. + Otherwise these are and remain NULL. Used when we are initiating. */ + SilcUInt32 auth_meth; void *auth_data; - uint32 auth_data_len; + SilcUInt32 auth_data_len; /* Destinations ID from KE protocol context */ void *dest_id; SilcIdType dest_id_type; + /* Pointer to the configurations. */ + void *cconfig; + void *sconfig; + void *rconfig; + SilcTask timeout_task; SilcPacketContext *packet; - uint16 conn_type; + SilcUInt16 conn_type; } SilcServerConnAuthInternalContext; /* Internal context for the rekey protocol */ @@ -89,14 +97,14 @@ typedef struct { bool responder; /* TRUE if we are receiving party */ bool pfs; /* TRUE if PFS is to be used */ SilcSKE ske; /* Defined if PFS is used */ - SilcSKEKeyMaterial *keymat; /* Defined if PFS is used */ SilcPacketContext *packet; } SilcServerRekeyInternalContext; /* Prototypes */ void silc_server_protocols_register(void); void silc_server_protocols_unregister(void); -int silc_server_protocol_ke_set_keys(SilcSKE ske, +int silc_server_protocol_ke_set_keys(SilcServer server, + SilcSKE ske, SilcSocketConnection sock, SilcSKEKeyMaterial *keymat, SilcCipher cipher, @@ -105,10 +113,5 @@ int silc_server_protocol_ke_set_keys(SilcSKE ske, SilcHmac hmac, SilcSKEDiffieHellmanGroup group, bool is_responder); -void silc_server_protocol_rekey_generate(SilcServer server, - SilcServerRekeyInternalContext *ctx); -void -silc_server_protocol_rekey_generate_pfs(SilcServer server, - SilcServerRekeyInternalContext *ctx); #endif