pike.git / lib / modules / Protocols.pmod / LDAP.pmod / client.pike

version» Context lines:

pike.git/lib/modules/Protocols.pmod/LDAP.pmod/client.pike:1:   #pike __REAL_VERSION__      // LDAP client protocol implementation for Pike.   // - // $Id: client.pike,v 1.53 2004/02/29 02:58:12 nilsson Exp $ + // $Id: client.pike,v 1.54 2004/03/18 18:06:12 mast Exp $   //   // Honza Petrous, hop@unibase.cz   //   // ----------------------------------------------------------------------   //   // History:   //   // v0.0 1998-05-25 Starting up!   // v1.0 1998-06-21 Core functions (open, bind, unbind, delete, add,   // compare, search), only V2 operations,
pike.git/lib/modules/Protocols.pmod/LDAP.pmod/client.pike:353:    //! @expr{"ldap://hostname/basedn?attrlist?scope?ext"@}    //!    //! @param context    //! TLS context of connection    //!    //! @seealso    //! @[LDAP.client.bind], @[LDAP.client.search]    void create(string|void url, object|void context)    {    -  info = ([ "code_revision" : ("$Revision: 1.53 $"/" ")[1] ]); +  info = ([ "code_revision" : ("$Revision: 1.54 $"/" ")[1] ]);       if(!url || !sizeof(url))    url = LDAP_DEFAULT_URL;       lauth = parse_url(url);       if(!stringp(lauth->scheme) ||    ((lauth->scheme != "ldap")   #if constant(SSL.Cipher.CipherAlgorithm)    && (lauth->scheme != "ldaps")
pike.git/lib/modules/Protocols.pmod/LDAP.pmod/client.pike:402:    //ldap=0;    //ok = 0;    //if(con_fail)    // con_fail(this, @extra_args);    THROW(({"Failed to connect to LDAP server.\n",backtrace()}));    }      #if constant(SSL.Cipher.CipherAlgorithm)    if(lauth->scheme == "ldaps") {    context->random = Crypto.Random.random_string; -  ::create(SSL.sslfile(::_fd, context, 1,1)); +  ::create(SSL.sslfile(this, context, 1,1));    info->tls_version = ldapfd->version;    } else    ::create(::_fd);   #else    if(lauth->scheme == "ldaps") {    THROW(({"LDAP: LDAPS is not available without SSL support.\n",backtrace()}));    }    else    ::create(::_fd);   #endif