/*
* $Id$
* $Log$
+ * Revision 1.7 2000/07/19 07:07:47 priikone
+ * Added version detection support to SKE.
+ *
* Revision 1.6 2000/07/14 06:12:29 priikone
* Put the HMAC keys into the HMAC object instead on having them
* saved elsewhere; we can use now silc_hmac_make instead of
SILC_TASK_CALLBACK(silc_client_protocol_connection_auth);
SILC_TASK_CALLBACK(silc_client_protocol_key_exchange);
+extern char *silc_version_string;
+
/* SILC client protocol list */
const SilcProtocolObject silc_protocol_list[] =
{
SilcSKEStartPayload *start_payload;
/* Assemble security properties. */
- silc_ske_assemble_security_properties(ske, &start_payload);
+ silc_ske_assemble_security_properties(ske, silc_version_string,
+ &start_payload);
/* Start the key exchange by sending our security properties
to the remote end. */
Key Exhange 1 Payload to the responder. */
status =
silc_ske_initiator_phase_2(ctx->ske,
+ client->public_key,
silc_client_protocol_ke_send_packet,
context);
}
/*
* $Id$
* $Log$
+ * Revision 1.11 2000/07/19 07:08:09 priikone
+ * Added version detection support to SKE.
+ *
* Revision 1.10 2000/07/17 11:47:30 priikone
* Added command lagging support. Added idle counting support.
*
if (cmd == NULL) {
SILC_LOG_ERROR(("Unknown command, packet dropped"));
silc_free(ctx);
- return;
+ goto out;
}
out:
/*
* $Id$
* $Log$
+ * Revision 1.8 2000/07/19 07:08:09 priikone
+ * Added version detection support to SKE.
+ *
* Revision 1.7 2000/07/14 06:14:20 priikone
* Put the HMAC keys into the HMAC object instead of having them
* saved elsewhere; now we can use silc_hmac_make insteaad of
SILC_TASK_CALLBACK(silc_server_protocol_connection_auth);
SILC_TASK_CALLBACK(silc_server_protocol_key_exchange);
+extern char *silc_version_string;
+
/* SILC client protocol list */
const SilcProtocolObject silc_protocol_list[] =
{
/* Start the key exchange by processing the received security
properties packet from initiator. */
status = silc_ske_responder_start(ske, ctx->rng, ctx->sock,
+ silc_version_string,
ctx->packet, NULL, NULL);
} else {
SilcSKEStartPayload *start_payload;
/* Assemble security properties. */
- silc_ske_assemble_security_properties(ske, &start_payload);
+ silc_ske_assemble_security_properties(ske, silc_version_string,
+ &start_payload);
/* Start the key exchange by sending our security properties
to the remote end. */
Key Exhange 1 Payload to the responder. */
status =
silc_ske_initiator_phase_2(ctx->ske,
+ server->public_key,
silc_server_protocol_ke_send_packet,
context);
}