starting the protocol if we know the authentication data. Otherwise
these are and remain NULL. */
unsigned char *auth_data;
- uint32 auth_data_len;
+ SilcUInt32 auth_data_len;
SilcTask timeout_task;
} SilcClientConnAuthInternalContext;
SilcBuffer packet,
SilcPacketType type,
void *context);
-SilcSKEStatus silc_client_protocol_ke_verify_key(SilcSKE ske,
- unsigned char *pk_data,
- uint32 pk_len,
- SilcSKEPKType pk_type,
- void *context);
+void silc_client_protocol_ke_verify_key(SilcSKE ske,
+ unsigned char *pk_data,
+ SilcUInt32 pk_len,
+ SilcSKEPKType pk_type,
+ void *context,
+ SilcSKEVerifyCbCompletion completion,
+ void *completion_context);
void silc_client_protocol_ke_set_keys(SilcSKE ske,
SilcSocketConnection sock,
SilcSKEKeyMaterial *keymat,
SilcPKCS pkcs,
SilcHash hash,
SilcHmac hmac,
- SilcSKEDiffieHellmanGroup group);
-void silc_client_protocol_rekey_generate(SilcClient client,
- SilcClientRekeyInternalContext *ctx);
-void
-silc_client_protocol_rekey_generate_pfs(SilcClient client,
- SilcClientRekeyInternalContext *ctx);
+ SilcSKEDiffieHellmanGroup group,
+ bool is_responder);
#endif