X-Git-Url: http://git.silcnet.org/gitweb/?a=blobdiff_plain;f=lib%2Fsilcclient%2Fprotocol.h;h=9d93709210bd550ea29801218564d2c1b3ec225e;hb=a818c5b5411bbc4436d1c5f011236985c96bb787;hp=71e25069b9d00e8791e4d83e47441c7b590d56f8;hpb=73583bd1ba302719fa687b8fa6b7619205ac4f33;p=silc.git diff --git a/lib/silcclient/protocol.h b/lib/silcclient/protocol.h index 71e25069..9d937092 100644 --- a/lib/silcclient/protocol.h +++ b/lib/silcclient/protocol.h @@ -68,7 +68,7 @@ typedef struct { starting the protocol if we know the authentication data. Otherwise these are and remain NULL. */ unsigned char *auth_data; - uint32 auth_data_len; + SilcUInt32 auth_data_len; SilcTask timeout_task; } SilcClientConnAuthInternalContext; @@ -91,11 +91,13 @@ void silc_client_protocol_ke_send_packet(SilcSKE ske, SilcBuffer packet, SilcPacketType type, void *context); -SilcSKEStatus silc_client_protocol_ke_verify_key(SilcSKE ske, - unsigned char *pk_data, - uint32 pk_len, - SilcSKEPKType pk_type, - void *context); +void silc_client_protocol_ke_verify_key(SilcSKE ske, + unsigned char *pk_data, + SilcUInt32 pk_len, + SilcSKEPKType pk_type, + void *context, + SilcSKEVerifyCbCompletion completion, + void *completion_context); void silc_client_protocol_ke_set_keys(SilcSKE ske, SilcSocketConnection sock, SilcSKEKeyMaterial *keymat, @@ -103,11 +105,7 @@ void silc_client_protocol_ke_set_keys(SilcSKE ske, SilcPKCS pkcs, SilcHash hash, SilcHmac hmac, - SilcSKEDiffieHellmanGroup group); -void silc_client_protocol_rekey_generate(SilcClient client, - SilcClientRekeyInternalContext *ctx); -void -silc_client_protocol_rekey_generate_pfs(SilcClient client, - SilcClientRekeyInternalContext *ctx); + SilcSKEDiffieHellmanGroup group, + bool is_responder); #endif