autodoc.git
/
traditional.xml
version
»
Context lines:
10
20
40
80
file
none
3
autodoc.git/traditional.xml:1:
<?xml version='1.0' encoding='utf-8'?>
-
<manual time-stamp='2019-06-
20
' version='Pike v8.1.13'>
+
<manual time-stamp='2019-06-
21
' version='Pike v8.1.13'>
<dir name='./traditional_manual'> <file name='./traditional_manual/index.html'> <chapter title='Table of Contents' unnumbered='1'> <dl><dt><url href='index.html'>Table of Contents</url></dt> <dt><url href='chapter_1.html'>1. Introduction</url></dt> <dd><url href='chapter_1.html#1'>1.1. Overview</url></dd> <dd><url href='chapter_1.html#2'>1.2. The history of Pike</url></dd> <dd><url href='chapter_1.html#3'>1.3. A comparison with other languages</url></dd> <dd><url href='chapter_1.html#4'>1.4. What is Pike</url></dd> <dd><url href='chapter_1.html#5'>1.5. Pike License</url></dd>
autodoc.git/traditional.xml:121292:
<doc><text><p>This is the <ref resolved='predef::Pike.Backend'>Backend</ref> object that files and call_outs are handled by by default.</p> <p> This is also the <ref resolved='predef::Pike.Backend'>Backend</ref> object that will be used if <ref>main()</ref> returns <expr>-1</expr>.</p> </text><group><seealso/><text><p><ref resolved='predef::Pike.Backend'>Backend</ref>, <ref resolved='predef::Stdio.File.set_nonblocking'>Stdio.File()->set_nonblocking()</ref>, <ref resolved='predef::call_out'>call_out()</ref></p> </text></group></doc> </module> <class name='DestructImmediate'> <doc><text><p>An empty class that can be inherited to get the <tt>PROGRAM_DESTRUCT_IMMEDIATE</tt> flag set.</p>
-
</text></doc>
+
</text><
group><seealso
/
><text><p><ref resolved='predef::Pike.InhibitDestruct'>InhibitDestruct</ref></p>
+
</text></group></
doc>
</class> <class name='FakeObject'> <doc><text><p>Used as a place holder in eg backtraces for objects that are unsuitable to have references to in backtraces.</p> <p> Examples of such objects are instances of <ref resolved='predef::Thread.MutexKey'>Thread.MutexKey</ref>, and <ref resolved='predef::Nettle.Cipher.State'>Nettle.Cipher.State</ref>.</p> </text><group><seealso/><text><p><ref resolved='predef::backtrace'>backtrace()</ref></p> </text></group></doc> </class> <class name='InhibitDestruct'> <doc><text><p>This is a class that implements a way to temporarily inhibit destruction by explicit calls of <ref resolved='predef::destruct'>destruct()</ref>.</p> <p> This is mostly useful as a mix-in for modules implemented in C or similar.</p> <p> All symbols in the class are either <expr>protected</expr> or <expr>private</expr> in order to affect users minimally.</p>
-
</text></doc>
+
</text><
group><seealso
/
><text><p><ref resolved='predef::Pike.DestructImmediate'>DestructImmediate</ref></p>
+
</text></group></
doc>
<docgroup homogen-name='_destruct' homogen-type='method'><doc><text><p>Returns <expr>1</expr> when <ref resolved='predef::Pike.InhibitDestruct.inhibit_destruct'>inhibit_destruct()</ref> has been called more times than <ref resolved='predef::Pike.InhibitDestruct.permit_destruct'>permit_destruct()</ref>.</p> </text><group><seealso/><text><p><ref resolved='predef::Pike.InhibitDestruct.inhibit_destruct'>inhibit_destruct()</ref>, <ref resolved='predef::Pike.InhibitDestruct.permit_destruct'>permit_destruct()</ref>, <ref resolved='predef::destruct'>destruct()</ref>, <ref resolved='lfun::_destruct'>lfun::_destruct()</ref></p> </text></group></doc> <method name='_destruct'> <arguments><argument name='reason'><type><or><int/><void/></or></type></argument></arguments> <returntype><int><min>0</min><max>1</max></int></returntype> </method> </docgroup>
autodoc.git/traditional.xml:129643:
public keys must be set.</p> </text></group><group><param name='name'/><text><p>The distinguished name for the certificate.</p> </text></group><group><param name='attributes'/><text><p>Attributes from PKCS #9 to add to the certificate.</p> </text></group><group><param name='hash'/><text><p>Hash algoritm to use for the CSR signature. Defaults to <ref resolved='predef::Crypto.SHA256'>Crypto.SHA256</ref>.</p> </text></group><group><note/><text><p>Prior to Pike 8.0 this function only supported signing with <ref resolved='predef::Crypto.RSA'>Crypto.RSA</ref> and the default (and only) hash was <ref resolved='predef::Crypto.MD5'>Crypto.MD5</ref>.</p> </text></group></doc> <method name='build_csr'>
-
<arguments><argument name='sign'><type><object resolved='predef::Crypto.Sign'>Crypto.Sign</object></type></argument><argument name='name'><type><object resolved='predef::Standards.ASN1.Types.Sequence'>Sequence</object></type></argument><argument name='attributes'><type><mapping><indextype><string/></indextype><valuetype><array><valuetype><object resolved='predef::
Standards.ASN1.Types.
Object'>Object</object></valuetype></array></valuetype></mapping></type></argument><argument name='hash'><type><or><object resolved='predef::Crypto.Hash'>Crypto.Hash</object><void/></or></type></argument></arguments>
+
<arguments><argument name='sign'><type><object resolved='predef::Crypto.Sign'>Crypto.Sign</object></type></argument><argument name='name'><type><object resolved='predef::Standards.ASN1.Types.Sequence'>Sequence</object></type></argument><argument name='attributes'><type><mapping><indextype><string/></indextype><valuetype><array><valuetype><object resolved='predef::Object'>Object</object></valuetype></array></valuetype></mapping></type></argument><argument name='hash'><type><or><object resolved='predef::Crypto.Hash'>Crypto.Hash</object><void/></or></type></argument></arguments>
<returntype><object resolved='predef::Standards.ASN1.Types.Sequence'>Sequence</object></returntype> </method> </docgroup> <docgroup homogen-name='' homogen-type='import'> <import name=''><classname resolved='predef::'>predef::</classname></import> </docgroup> <docgroup homogen-name='Types' homogen-type='import'> <import name='Types'><classname resolved='predef::Standards.ASN1.Types'>Standards.ASN1.Types</classname></import> </docgroup> <docgroup homogen-name='sign_cri' homogen-type='method'><doc><text><p>Sign a <ref resolved='predef::Standards.PKCS.CSR.CRI'>CRI</ref> to generate a Certificate Signing Request.</p>
autodoc.git/traditional.xml:130093:
<p>Setting</p> <p> The signature.</p> </text></doc> <variable name='signature'><type><object resolved='predef::Standards.ASN1.Types.BitString'>BitString</object></type></variable> </docgroup> <docgroup homogen-name='tbs' homogen-type='variable'><doc><text><p>Getting</p> <p> ASN.1 structure that has been signed.</p> <p>Setting</p> <p> ASN.1 structure that has been signed.</p> </text></doc>
-
<variable name='tbs'><type><object resolved='predef::
Standards.ASN1.Types.
Object'>Object</object></type></variable>
+
<variable name='tbs'><type><object resolved='predef::Object'>Object</object></type></variable>
</docgroup> </class> </module> </module> <module name='TLD'> <docgroup homogen-name='cc' homogen-type='constant'><doc><text><p>A mapping between country TLDs and the name of the country.</p> </text></doc> <constant name='cc'/> </docgroup> <docgroup homogen-name='generic' homogen-type='variable'><doc><text><p>A multiset containing the generic TLDs, such as "com" and "info".</p>
autodoc.git/traditional.xml:130605:
<method name='load_authorities'> <arguments><argument name='root_cert_dirs'><type><or><string/><array><valuetype><string/></valuetype></array><void/></or></type></argument><argument name='cache'><type><or><int><min>0</min><max>1</max></int><void/></or></type></argument></arguments> <returntype><mapping><indextype><string/></indextype><valuetype><array><valuetype><object resolved='predef::Standards.X509.Verifier'>Verifier</object></valuetype></array></valuetype></mapping></returntype> </method> </docgroup> <docgroup homogen-name='make_extension' homogen-type='method'><doc><text><p>Creates a certificate extension with the <ref resolved='predef::Standards.X509.make_extension.id'>id</ref> as identifier and <ref resolved='predef::Standards.X509.make_extension.ext'>ext</ref> as the extension payload. If the <ref resolved='predef::Standards.X509.make_extension.critical'>critical</ref> flag is set the extension will be marked as critical.</p> </text></doc> <method name='make_extension'>
-
<arguments><argument name='id'><type><object resolved='predef::Standards.ASN1.Types.Identifier'>Identifier</object></type></argument><argument name='ext'><type><object resolved='predef::
Standards.ASN1.Types.
Object'>Object</object></type></argument><argument name='critical'><type><or><void/><int/></or></type></argument></arguments>
+
<arguments><argument name='id'><type><object resolved='predef::Standards.ASN1.Types.Identifier'>Identifier</object></type></argument><argument name='ext'><type><object resolved='predef::Object'>Object</object></type></argument><argument name='critical'><type><or><void/><int/></or></type></argument></arguments>
<returntype><object resolved='predef::Standards.ASN1.Types.Sequence'>Sequence</object></returntype> </method> </docgroup> <docgroup homogen-name='make_selfsigned_certificate' homogen-type='method'><doc><text><p>Creates a selfsigned certificate, i.e. where issuer and subject are the same entity. This entity is derived from the list of pairs in <ref resolved='predef::Standards.X509.make_selfsigned_certificate.name'>name</ref>, which is encoded into an distinguished_name by <ref resolved='predef::Standards.PKCS.Certificate.build_distinguished_name'>Standards.PKCS.Certificate.build_distinguished_name</ref>.</p> </text><group><param name='c'/><text><p>The public key cipher used for the certificate, <ref resolved='predef::Crypto.RSA'>Crypto.RSA</ref>, <ref resolved='predef::Crypto.DSA'>Crypto.DSA</ref> or <ref resolved='predef::Crypto.ECC.Curve.ECDSA'>Crypto.ECC.Curve.ECDSA</ref>. The object should be initialized with both public and private keys.</p>
autodoc.git/traditional.xml:130889:
</docgroup> <docgroup homogen-name='ext_subjectKeyIdentifier' homogen-type='variable'><doc><text><p>Set to the value of the SubjectKeyIdentifier if the certificate contains the subjectKeyIdentifier extension. <rfc>3280:4.2.1.2</rfc>.</p> </text></doc> <variable name='ext_subjectKeyIdentifier'><type><string/></type></variable> </docgroup> <docgroup homogen-name='extensions' homogen-type='variable'><doc><group><note/><text><p>optional</p> </text></group><group><note/><text><p>Read only</p> </text></group></doc>
-
<variable name='extensions'><type><mapping><indextype><object resolved='predef::Standards.ASN1.Types.Identifier'>Identifier</object></indextype><valuetype><object resolved='predef::
Standards.ASN1.Types.
Object'>Object</object></valuetype></mapping></type></variable>
+
<variable name='extensions'><type><mapping><indextype><object resolved='predef::Standards.ASN1.Types.Identifier'>Identifier</object></indextype><valuetype><object resolved='predef::Object'>Object</object></valuetype></mapping></type></variable>
</docgroup> <docgroup homogen-name='hash' homogen-type='variable'><doc><text><p>Algorithm hash if known and supported. Otherwise <ref resolved='predef::.UNDEFINED'>UNDEFINED</ref>.</p> </text><group><note/><text><p>Read only</p> </text></group></doc> <variable name='hash'><type><object resolved='predef::Crypto.Hash'>Crypto.Hash</object></type></variable> </docgroup> <docgroup homogen-name='Sequence' homogen-type='inherit'> <inherit name='Sequence'><classname resolved='predef::Standards.ASN1.Types.Sequence'>Sequence</classname></inherit> </docgroup> <docgroup homogen-name='init' homogen-type='method'><doc><text><p>Populates the object from a certificate decoded into an ASN.1 Object. Returns the object on success, otherwise <expr>0</expr>. You probably want to call <ref resolved='predef::Standards.X509.decode_certificate'>decode_certificate</ref> or even <ref resolved='predef::Standards.X509.verify_certificate'>verify_certificate</ref>.</p> </text></doc> <method name='init'>
-
<arguments><argument name='asn1'><type><or><array/><object resolved='predef::
Standards.ASN1.Types.
Object'>Object</object></or></type></argument></arguments>
+
<arguments><argument name='asn1'><type><or><array/><object resolved='predef::Object'>Object</object></or></type></argument></arguments>
<returntype><object resolved='predef::Standards.X509.TBSCertificate'>this_program</object></returntype> </method> </docgroup> <docgroup homogen-name='internal_critical' homogen-type='variable'><doc><group><note/><text><p>optional</p> </text></group></doc> <variable name='internal_critical'><modifiers><protected/></modifiers><type><multiset/></type></variable> </docgroup> <docgroup homogen-name='internal_extensions' homogen-type='variable'><doc><group><note/><text><p>optional</p> </text></group></doc>
-
<variable name='internal_extensions'><modifiers><protected/></modifiers><type><mapping><indextype><object resolved='predef::Standards.ASN1.Types.Identifier'>Identifier</object></indextype><valuetype><object resolved='predef::
Standards.ASN1.Types.
Object'>Object</object></valuetype></mapping></type></variable>
+
<variable name='internal_extensions'><modifiers><protected/></modifiers><type><mapping><indextype><object resolved='predef::Standards.ASN1.Types.Identifier'>Identifier</object></indextype><valuetype><object resolved='predef::Object'>Object</object></valuetype></mapping></type></variable>
</docgroup> <docgroup homogen-name='issuer' homogen-type='variable'><doc><text><p>Certificate issuer.</p> </text></doc> <variable name='issuer'><type><void/></type></variable> </docgroup> <docgroup homogen-name='issuer_id' homogen-type='variable'><doc><group><note/><text><p>optional</p> </text></group></doc> <variable name='issuer_id'><type><void/></type></variable> </docgroup> <docgroup homogen-name='keyinfo' homogen-type='variable'>