starting the protocol if we know the authentication data. Otherwise
these are and remain NULL. */
unsigned char *auth_data;
- uint32 auth_data_len;
+ SilcUInt32 auth_data_len;
SilcTask timeout_task;
} SilcClientConnAuthInternalContext;
bool responder; /* TRUE if we are receiving party */
bool pfs; /* TRUE if PFS is to be used */
SilcSKE ske; /* Defined if PFS is used */
- SilcSKEKeyMaterial *keymat; /* Defined if PFS is used */
SilcPacketContext *packet;
} SilcClientRekeyInternalContext;
SilcBuffer packet,
SilcPacketType type,
void *context);
-SilcSKEStatus silc_client_protocol_ke_verify_key(SilcSKE ske,
- unsigned char *pk_data,
- uint32 pk_len,
- SilcSKEPKType pk_type,
- void *context);
+void silc_client_protocol_ke_verify_key(SilcSKE ske,
+ unsigned char *pk_data,
+ SilcUInt32 pk_len,
+ SilcSKEPKType pk_type,
+ void *context,
+ SilcSKEVerifyCbCompletion completion,
+ void *completion_context);
void silc_client_protocol_ke_set_keys(SilcSKE ske,
SilcSocketConnection sock,
SilcSKEKeyMaterial *keymat,
SilcPKCS pkcs,
SilcHash hash,
SilcHmac hmac,
- SilcSKEDiffieHellmanGroup group);
-void silc_client_protocol_rekey_generate(SilcClient client,
- SilcClientRekeyInternalContext *ctx);
-void
-silc_client_protocol_rekey_generate_pfs(SilcClient client,
- SilcClientRekeyInternalContext *ctx);
+ SilcSKEDiffieHellmanGroup group,
+ bool is_responder);
#endif