X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fprotocol.h;h=682f76a00560ff40f07a783eef49721e015a6a4f;hp=e4fd5f1cb64a1aeeb941c41f7d58cc64b62657d8;hb=f25868fd2b58bc0b350a5cfaf342480f28f804cf;hpb=950fb8e916b0e248dcaa72c96859acd6046683aa diff --git a/src/protocol.h b/src/protocol.h index e4fd5f1c..682f76a0 100644 --- a/src/protocol.h +++ b/src/protocol.h @@ -17,7 +17,7 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: protocol.h,v 1.5.4.9 2000/10/11 10:35:17 guus Exp $ + $Id: protocol.h,v 1.5.4.13 2000/10/28 21:05:20 guus Exp $ */ #ifndef __TINC_PROTOCOL_H__ @@ -32,13 +32,6 @@ #define PROT_CURRENT 8 -/* Length of the challenge. Since the challenge will also - contain the key for the symmetric cipher, it must be - quite large. - */ - -#define CHAL_LENGTH 2048 - /* Request numbers */ enum { @@ -56,7 +49,7 @@ extern int (*request_handlers[])(conn_list_t*); extern int send_id(conn_list_t*); extern int send_challenge(conn_list_t*); -extern int send_chal_reply(conn_list_t*, char*); +extern int send_chal_reply(conn_list_t*); extern int send_ack(conn_list_t*); extern int send_status(conn_list_t*, int, char*); extern int send_error(conn_list_t*, int, char*); @@ -65,8 +58,8 @@ extern int send_ping(conn_list_t*); extern int send_pong(conn_list_t*); extern int send_add_host(conn_list_t*, conn_list_t*); extern int send_del_host(conn_list_t*, conn_list_t*); -extern int send_add_subnet(conn_list_t*, conn_list_t*, subnet_t*); -extern int send_del_subnet(conn_list_t*, conn_list_t*, subnet_t*); +extern int send_add_subnet(conn_list_t*, subnet_t*); +extern int send_del_subnet(conn_list_t*, subnet_t*); extern int send_key_changed(conn_list_t*, conn_list_t*); extern int send_req_key(conn_list_t*, conn_list_t*); extern int send_ans_key(conn_list_t*, conn_list_t*, char*);