projects
/
silc.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Integer type name change.
[silc.git]
/
lib
/
silcclient
/
protocol.c
diff --git
a/lib/silcclient/protocol.c
b/lib/silcclient/protocol.c
index df614b95e35a554b404d62dc6db2a9159f87047e..4bf277c8a2e5759eb330a1b1e343fc487a097cf9 100644
(file)
--- a/
lib/silcclient/protocol.c
+++ b/
lib/silcclient/protocol.c
@@
-78,7
+78,7
@@
static void silc_client_verify_key_cb(bool success, void *context)
void silc_client_protocol_ke_verify_key(SilcSKE ske,
unsigned char *pk_data,
void silc_client_protocol_ke_verify_key(SilcSKE ske,
unsigned char *pk_data,
-
ui
nt32 pk_len,
+
SilcUI
nt32 pk_len,
SilcSKEPKType pk_type,
void *context,
SilcSKEVerifyCbCompletion completion,
SilcSKEPKType pk_type,
void *context,
SilcSKEVerifyCbCompletion completion,
@@
-167,7
+167,7
@@
void silc_client_protocol_ke_set_keys(SilcSKE ske,
/* Checks the version string of the server. */
SilcSKEStatus silc_ske_check_version(SilcSKE ske, unsigned char *version,
/* Checks the version string of the server. */
SilcSKEStatus silc_ske_check_version(SilcSKE ske, unsigned char *version,
-
ui
nt32 len, void *context)
+
SilcUI
nt32 len, void *context)
{
SilcClientConnection conn = (SilcClientConnection)ske->sock->user_data;
SilcClient client = (SilcClient)ske->user_data;
{
SilcClientConnection conn = (SilcClientConnection)ske->sock->user_data;
SilcClient client = (SilcClient)ske->user_data;
@@
-549,7
+549,7
@@
static int
silc_client_get_public_key_auth(SilcClient client,
SilcClientConnection conn,
unsigned char *auth_data,
silc_client_get_public_key_auth(SilcClient client,
SilcClientConnection conn,
unsigned char *auth_data,
-
ui
nt32 *auth_data_len,
+
SilcUI
nt32 *auth_data_len,
SilcSKE ske)
{
int len;
SilcSKE ske)
{
int len;
@@
-585,7
+585,7
@@
silc_client_get_public_key_auth(SilcClient client,
static void
silc_client_conn_auth_continue(unsigned char *auth_data,
static void
silc_client_conn_auth_continue(unsigned char *auth_data,
-
ui
nt32 auth_data_len, void *context)
+
SilcUI
nt32 auth_data_len, void *context)
{
SilcProtocol protocol = (SilcProtocol)context;
SilcClientConnAuthInternalContext *ctx =
{
SilcProtocol protocol = (SilcProtocol)context;
SilcClientConnAuthInternalContext *ctx =
@@
-637,7
+637,7
@@
SILC_TASK_CALLBACK(silc_client_protocol_connection_auth)
* to be authenticated.
*/
unsigned char *auth_data = NULL;
* to be authenticated.
*/
unsigned char *auth_data = NULL;
-
ui
nt32 auth_data_len = 0;
+
SilcUI
nt32 auth_data_len = 0;
unsigned char sign[1024];
switch(ctx->auth_meth) {
unsigned char sign[1024];
switch(ctx->auth_meth) {
@@
-799,8
+799,8
@@
silc_client_protocol_rekey_generate(SilcClient client,
{
SilcClientConnection conn = (SilcClientConnection)ctx->sock->user_data;
SilcSKEKeyMaterial *keymat;
{
SilcClientConnection conn = (SilcClientConnection)ctx->sock->user_data;
SilcSKEKeyMaterial *keymat;
-
ui
nt32 key_len = silc_cipher_get_key_len(conn->send_key);
-
ui
nt32 hash_len = conn->hash->hash->hash_len;
+
SilcUI
nt32 key_len = silc_cipher_get_key_len(conn->send_key);
+
SilcUI
nt32 hash_len = conn->hash->hash->hash_len;
SILC_LOG_DEBUG(("Generating new %s session keys (no PFS)",
send ? "sending" : "receiving"));
SILC_LOG_DEBUG(("Generating new %s session keys (no PFS)",
send ? "sending" : "receiving"));
@@
-828,10
+828,10
@@
silc_client_protocol_rekey_generate_pfs(SilcClient client,
{
SilcClientConnection conn = (SilcClientConnection)ctx->sock->user_data;
SilcSKEKeyMaterial *keymat;
{
SilcClientConnection conn = (SilcClientConnection)ctx->sock->user_data;
SilcSKEKeyMaterial *keymat;
-
ui
nt32 key_len = silc_cipher_get_key_len(conn->send_key);
-
ui
nt32 hash_len = conn->hash->hash->hash_len;
+
SilcUI
nt32 key_len = silc_cipher_get_key_len(conn->send_key);
+
SilcUI
nt32 hash_len = conn->hash->hash->hash_len;
unsigned char *tmpbuf;
unsigned char *tmpbuf;
-
ui
nt32 klen;
+
SilcUI
nt32 klen;
SILC_LOG_DEBUG(("Generating new %s session keys (with PFS)",
send ? "sending" : "receiving"));
SILC_LOG_DEBUG(("Generating new %s session keys (with PFS)",
send ? "sending" : "receiving"));