/*
* $Id$
* $Log$
+ * Revision 1.4 2000/07/06 07:16:13 priikone
+ * Added SilcPublicKey's
+ *
* Revision 1.3 2000/07/05 06:14:01 priikone
* Global costemic changes.
*
idlist->router = router;
idlist->send_key = send_key;
idlist->receive_key = receive_key;
- idlist->public_key = public_key;
+ idlist->pkcs = public_key;
idlist->hmac = hmac;
idlist->next = idlist;
idlist->prev = idlist;
idlist->router = router;
idlist->send_key = send_key;
idlist->receive_key = receive_key;
- idlist->public_key = public_key;
+ idlist->pkcs = public_key;
idlist->hmac = hmac;
idlist->next = idlist;
idlist->prev = idlist;
silc_cipher_free(entry->send_key);
if (entry->receive_key)
silc_cipher_free(entry->receive_key);
- if (entry->public_key)
- silc_pkcs_free(entry->public_key);
+ if (entry->pkcs)
+ silc_pkcs_free(entry->pkcs);
if (entry->hmac)
silc_hmac_free(entry->hmac);
if (entry->hmac_key) {
/* Keys */
SilcCipher send_key;
SilcCipher receive_key;
- SilcPKCS public_key;
+ SilcPKCS pkcs;
+ SilcPublicKey public_key;
SilcHmac hmac;
unsigned char *hmac_key;
unsigned int hmac_key_len;
The actual session key established by key exchange protcol between
connecting parties. This is used for both encryption and decryption.
- SilcPKCS public_key
+ SilcPKCS pkcs
- Public key of the client. This maybe NULL.
+ PKCS of the client. This maybe NULL.
SilcHmac hmac
unsigned char *hmac_key
/* Keys */
SilcCipher send_key;
SilcCipher receive_key;
- SilcPKCS public_key;
+ SilcPKCS pkcs;
SilcHmac hmac;
unsigned char *hmac_key;
unsigned int hmac_key_len;
SilcCipher send_key;
SilcCipher receive_key;
SilcPKCS pkcs;
+ SilcPublicKey public_key;
SilcHmac hmac;
unsigned char *hmac_key;