bool_t (*packy_par_gen)(struct site *st);
void hacky_par_end(int *ok,
- int32_t retries, uint32_t timeout,
+ int32_t retries, int32_t timeout,
bool_t (*send_msg)(struct site *st), struct site *st) {
int i;
int hacky_par_start_failnow(void) { return 0; }
int hacky_par_mid_failnow(void) { return 0; }
void hacky_par_end(int *ok,
- int32_t retries, uint32_t timeout,
+ int32_t retries, int32_t timeout,
bool_t (*send_msg)(struct site *st), struct site *st) { }
#endif /*HACKY_PARALLEL...else*/
int hacky_par_start_failnow(void);
int hacky_par_mid_failnow(void);
void hacky_par_end(int *ok,
- int32_t retries, uint32_t timeout,
+ int32_t retries, int32_t timeout,
bool_t (*send_msg)(struct site *st), struct site *st);
#endif /* hackympzpar_h */
struct hash_if *hash;
int32_t setup_retries; /* How many times to send setup packets */
- uint32_t setup_timeout; /* Initial timeout for setup packets */
- uint32_t wait_timeout; /* How long to wait if setup unsuccessful */
- uint32_t key_lifetime; /* How long a key lasts once set up */
- uint32_t key_renegotiate_time; /* If we see traffic (or a keepalive)
+ int32_t setup_timeout; /* Initial timeout for setup packets */
+ int32_t wait_timeout; /* How long to wait if setup unsuccessful */
+ int32_t key_lifetime; /* How long a key lasts once set up */
+ int32_t key_renegotiate_time; /* If we see traffic (or a keepalive)
after this time, initiate a new
key exchange */
bool_t keepalive; /* Send keepalives to detect peer failure (not yet
uint8_t localN[NONCELEN]; /* Nonces for key exchange */
uint8_t remoteN[NONCELEN];
struct buffer_if buffer; /* Current outgoing key exchange packet */
- uint32_t retries; /* Number of retries remaining */
+ int32_t retries; /* Number of retries remaining */
uint64_t timeout; /* Timeout for current state */
uint8_t *dhsecret;
uint8_t *sharedsecret;