X-Git-Url: http://git.silcnet.org/gitweb/?p=silc.git;a=blobdiff_plain;f=apps%2Fsilcd%2Fprotocol.h;h=21c3d193bd987bf00aa024713eae8b88e2a6e439;hp=d6f54663d5928a409c713eddf73d3c4e0ad50f28;hb=e5d8d3db6caa344b3d419b884556c21b15e7d123;hpb=48d89bc2868ec49c2ab9aa74efe9ac703eee8f29 diff --git a/apps/silcd/protocol.h b/apps/silcd/protocol.h index d6f54663..21c3d193 100644 --- a/apps/silcd/protocol.h +++ b/apps/silcd/protocol.h @@ -22,10 +22,12 @@ #define PROTOCOL_H /* SILC client protocol types */ -#define SILC_PROTOCOL_SERVER_NONE 0 -#define SILC_PROTOCOL_SERVER_CONNECTION_AUTH 1 -#define SILC_PROTOCOL_SERVER_KEY_EXCHANGE 2 -/* #define SILC_PROTOCOL_SERVER_MAX 255 */ +#define SILC_PROTOCOL_SERVER_NONE 0 +#define SILC_PROTOCOL_SERVER_CONNECTION_AUTH 1 +#define SILC_PROTOCOL_SERVER_KEY_EXCHANGE 2 +#define SILC_PROTOCOL_SERVER_REKEY 3 +#define SILC_PROTOCOL_SERVER_BACKUP 4 +/* #define SILC_PROTOCOL_SERVER_MAX 255 */ /* Internal context for Key Exchange protocol. */ typedef struct { @@ -35,16 +37,22 @@ typedef struct { SilcRng rng; /* TRUE if we are receiveing part of the protocol */ - int responder; + bool responder; /* Destinations ID taken from authenticataed packet so that we can get the destinations ID. */ void *dest_id; SilcIdType dest_id_type; + /* Pointer to the configurations. */ + void *cconfig; + void *sconfig; + void *rconfig; + SilcTask timeout_task; SilcPacketContext *packet; SilcSKE ske; + SilcSKEKeyMaterial *keymat; } SilcServerKEInternalContext; /* Internal context for connection authentication protocol */ @@ -54,7 +62,7 @@ typedef struct { SilcSocketConnection sock; /* TRUE if we are receiving part of the protocol */ - int responder; + bool responder; /* SKE object from Key Exchange protocol. */ SilcSKE ske; @@ -62,25 +70,50 @@ typedef struct { /* Auth method that must be used. This is resolved before this connection authentication protocol is started. Used when we are initiating. */ - unsigned int auth_meth; + uint32 auth_meth; /* Authentication data if we alreay know it. This is filled before starting the protocol if we know the authentication data. Otherwise these are and remain NULL. Used when we are initiating. */ - unsigned char *auth_data; - unsigned int auth_data_len; + void *auth_data; + uint32 auth_data_len; /* Destinations ID from KE protocol context */ void *dest_id; SilcIdType dest_id_type; + /* Pointer to the configurations. */ + void *cconfig; + void *sconfig; + void *rconfig; + SilcTask timeout_task; SilcPacketContext *packet; - unsigned short conn_type; + uint16 conn_type; } SilcServerConnAuthInternalContext; +/* Internal context for the rekey protocol */ +typedef struct { + void *server; + void *context; + SilcSocketConnection sock; + bool responder; /* TRUE if we are receiving party */ + bool pfs; /* TRUE if PFS is to be used */ + SilcSKE ske; /* Defined if PFS is used */ + SilcPacketContext *packet; +} SilcServerRekeyInternalContext; + /* Prototypes */ void silc_server_protocols_register(void); void silc_server_protocols_unregister(void); +int silc_server_protocol_ke_set_keys(SilcSKE ske, + SilcSocketConnection sock, + SilcSKEKeyMaterial *keymat, + SilcCipher cipher, + SilcPKCS pkcs, + SilcHash hash, + SilcHmac hmac, + SilcSKEDiffieHellmanGroup group, + bool is_responder); #endif