autodoc.git / modref.xml

version» Context lines:

autodoc.git/modref.xml:1:   <?xml version='1.0' encoding='utf-8'?> - <manual time-stamp='2018-02-16' version='Pike v8.1.11'> + <manual time-stamp='2018-02-17' version='Pike v8.1.12'>    <dir name='./ignored'>    <file name='./ignored/ignored'>    <chapter number='1' title='ignored'>    <autodoc>   <namespace name=''>   <doc><text><p>Symbols implicitly inherited from the virtual base class.</p>   <p> These symbols exist mainly to simplify implementation of    the corresponding lfuns.</p>   </text><group><seealso/><text><p><ref resolved='lfun::'>lfun::</ref></p>   </text></group></doc>
autodoc.git/modref.xml:1107:   </docgroup>   </class>   <class name='DES3'>   <docgroup homogen-name='CBC' homogen-type='inherit'>   <inherit name='CBC'><classname resolved='8.0::Crypto.CBC'>Crypto.CBC</classname></inherit>   </docgroup>   </class>   <class name='DHKeyExchange'>   <doc><text><p>Implements Diffie-Hellman key-exchange.</p>   <p> The following key exchange methods are implemented here: -  <ref resolved='7.8::SSL.Constants.KeyExchangeType.KE_dhe_dss'>KE_dhe_dss</ref>, <ref resolved='7.8::SSL.Constants.KeyExchangeType.KE_dhe_rsa'>KE_dhe_rsa</ref> and <ref resolved='7.8::SSL.Constants.KeyExchangeType.KE_dh_anon'>KE_dh_anon</ref>.</p> +  <ref resolved='predef::SSL.Constants.KeyExchangeType.KE_dhe_dss'>KE_dhe_dss</ref>, <ref resolved='predef::SSL.Constants.KeyExchangeType.KE_dhe_rsa'>KE_dhe_rsa</ref> and <ref resolved='predef::SSL.Constants.KeyExchangeType.KE_dh_anon'>KE_dh_anon</ref>.</p>   </text></doc>   <docgroup homogen-name='create' homogen-type='method'>   <method name='create'><modifiers><protected/></modifiers>   <arguments><argument name='p'><type><object resolved='7.8::SSL.Cipher.DHParameters'>DHParameters</object></type></argument></arguments>   <returntype><void/></returntype>   </method>   </docgroup>   </class>   <class name='DHParameters'>   <doc><text><p>Diffie-Hellman parameters.</p>
autodoc.git/modref.xml:1891:   <variable name='rsa'><type><object resolved='7.8::Crypto.RSA'>Crypto.RSA</object></type></variable>   </docgroup>   <docgroup homogen-name='set_cipher_suite' homogen-type='method'><doc><text><p>Sets the proper authentication method and cipher specification    for the given cipher <ref resolved='7.8::SSL.session.set_cipher_suite.suite'>suite</ref> and <ref>verison</ref>.</p>   </text></doc>   <method name='set_cipher_suite'>   <arguments><argument name='suite'><type><int/></type></argument><argument name='version'><type><or><object resolved='7.8::SSL.Constants.ProtocolVersion'>ProtocolVersion</object><int/></or></type></argument></arguments>   <returntype><void/></returntype>   </method>   </docgroup> - <docgroup homogen-name='set_compression_method' homogen-type='method'><doc><text><p>Sets the compression method. Currently only <ref resolved='7.8::SSL.Constants.CompressionType.COMPRESSION_null'>COMPRESSION_null</ref> is + <docgroup homogen-name='set_compression_method' homogen-type='method'><doc><text><p>Sets the compression method. Currently only <ref resolved='predef::SSL.Constants.CompressionType.COMPRESSION_null'>COMPRESSION_null</ref> is    supported.</p>   </text></doc>   <method name='set_compression_method'>   <arguments><argument name='compr'><type><int/></type></argument></arguments>   <returntype><void/></returntype>   </method>   </docgroup>   </class>   <class name='sslfile'>   <doc><text><p>Interface similar to <ref resolved='7.8::Stdio.File'>Stdio.File</ref>.</p>
autodoc.git/modref.xml:23659:    the result of <ref resolved='predef::Nettle.Hash.crypt_hash'>SHA256.crypt_hash()</ref> with <expr>5000</expr>    rounds. Source: Unix crypt using SHA-256 and SHA-512    <url>http://www.akkadia.org/drepper/SHA-crypt.txt</url></p>   </text></group><group><value>"$5$rounds=RR$SSSSSSSSSSSSSSSS$XXXXXXXXXXXXXXXXXXXXXX"</value><text><p>This is the same algorithm as the one above, but with the    number of rounds specified by <expr>RR</expr> in decimal. Note    that the number of rounds is clamped to be within    <expr>1000</expr> and <expr>999999999</expr> (inclusive).    Source: Unix crypt using SHA-256 and SHA-512    <url>http://www.akkadia.org/drepper/SHA-crypt.txt</url></p>   </text></group><group><value>"$3$$XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"</value><text><p>This is interpreted as the NT LANMANAGER (NTLM) password -  hash. It is a hax representation of MD4 of the password.</p> +  hash. It is a hex representation of MD4 of the password.</p>   </text></group><group><value>"$1$SSSSSSSS$XXXXXXXXXXXXXXXXXXXXXX"</value><text><p>The string is interpreted according to the GNU libc2 extension    of <expr>crypt(3C)</expr> where <expr>SSSSSSSS</expr> is up to 8 chars of    salt and the <expr>XXX</expr> string is an <ref resolved='predef::Crypto.MD5'>MD5</ref>-based hash created    from the password and the salt. Source: GNU libc    <url>http://www.gnu.org/software/libtool/manual/libc/crypt.html</url>.</p>   </text></group><group><value>"XXXXXXXXXXXXX"</value><text><p>The <expr>XXX</expr> string (which doesn't begin with <expr>"{"</expr>) is    taken to be a password hashed using the classic unix    <expr>crypt(3C)</expr> function. If the string contains only chars    from the set <expr>[a-zA-Z0-9./]</expr> it uses DES and the first two    characters as salt, but other alternatives might be possible