pike.git / lib / modules / Protocols.pmod / HTTP.pmod / Server.pmod / SSLPort.pike

version» Context lines:

pike.git/lib/modules/Protocols.pmod/HTTP.pmod/Server.pmod/SSLPort.pike:1:   #pike __REAL_VERSION__ + #require constant(SSL.Cipher)    - #if constant(SSL.Cipher.CipherAlgorithm) -  +    import ".";      MySSLPort port;   int portno;   string|int(0..0) interface;   function(Request:void) callback;      //!   object|function|program request_program=Request;   
pike.git/lib/modules/Protocols.pmod/HTTP.pmod/Server.pmod/SSLPort.pike:95: Inside #if constant(SSL.Cipher.CipherAlgorithm)
   // ECDSA.    private_key->generate_key();    break;    }       mapping a = ([    "organizationName" : "Pike TLS server",    "commonName" : "*",    ]);    -  add_cert( private_key, -  ({ -  Standards.X509.make_selfsigned_certificate(private_key, -  3600*24*365, a) -  }) ); +  string c = Standards.X509.make_selfsigned_certificate(private_key, +  3600*24*365, a); +  +  ctx->add_cert( private_key, ({ c }) );    }    }          // ---- Remove this?       private Crypto.Sign tmp_key;    private array(string) tmp_cert;       //! @deprecated add_cert    __deprecated__ void set_key(string skey)    {    tmp_key = Standards.PKCS.RSA.parse_private_key(skey) ||    Standards.PKCS.DSA.parse_private_key(skey) ||   #if constant(Crypto.ECC.Curve)    Standards.PKCS.ECDSA.parse_private_key(skey) ||   #endif    0;    if( tmp_key && tmp_cert ) -  add_cert( tmp_key, tmp_cert ); +  ctx->add_cert( tmp_key, tmp_cert );    }       //! @deprecated add_cert    __deprecated__ void set_certificate(string|array(string) certificate)    {    if(arrayp(certificate))    tmp_cert = [array(string)]certificate;    else    tmp_cert = ({ [string]certificate });    if( tmp_key && tmp_cert ) -  add_cert( tmp_key, tmp_cert ); +  ctx->add_cert( tmp_key, tmp_cert );    }   }    - string _sprintf(int t) { + protected string _sprintf(int t) {    return t=='O' && sprintf("%O(%O:%d)", this_program, interface, portno);   } -  - #endif +