pike.git / lib / modules / Protocols.pmod / LDAP.pmod / client.pike

version» Context lines:

pike.git/lib/modules/Protocols.pmod/LDAP.pmod/client.pike:679: Inside #if undefined(PARSE_RFCS)
   THROW(({"Unknown scheme in server URL.\n",backtrace()}));    }       if(!lauth->host)    lauth += ([ "host" : LDAP_DEFAULT_HOST ]);    if(!lauth->port)    lauth += ([ "port" : lauth->scheme == "ldap" ? LDAP_DEFAULT_PORT : LDAPS_DEFAULT_PORT ]);      #if constant(SSL.Cipher.CipherAlgorithm)    if(lauth->scheme == "ldaps" && !context) { -  context = SSL.context(); +  context = SSL.Context();    // Allow only strong crypto    context->preferred_suites = ({    SSL_rsa_with_idea_cbc_sha,    SSL_rsa_with_rc4_128_sha,    SSL_rsa_with_rc4_128_md5,    SSL_rsa_with_3des_ede_cbc_sha,    });    }   #endif   
pike.git/lib/modules/Protocols.pmod/LDAP.pmod/client.pike:780: Inside #if constant(SSL.Cipher.CipherAlgorithm)
         msgval = ASN1_APPLICATION_SEQUENCE(23, ({Standards.ASN1.Types.OctetString("1.3.6.1.4.1.1466.20037")}));       do_op(msgval);    int result = ASN1_RESULTCODE(.ldap_privates.ldap_der_decode (readbuf));    if(result!=0) return 0;    // otherwise, we can try to negotiate.    if(!context)    { -  context = SSL.context(); +  context = SSL.Context();    // Allow only strong crypto    context->preferred_suites = ({    SSL_rsa_with_idea_cbc_sha,    SSL_rsa_with_rc4_128_sha,    SSL_rsa_with_rc4_128_md5,    SSL_rsa_with_3des_ede_cbc_sha,    });    }    object _f = ldapfd;    ldapfd=SSL.sslfile(_f, context, 1, 1);
pike.git/lib/modules/Protocols.pmod/LDAP.pmod/client.pike:805:       //! Requests that a SSL/TLS session be negotiated on the connection.    //! If the connection is already secure, this call will fail.    //!    //! @param context    //! an optional SSL.context object to provide to the    //! SSL/TLS connection client.    //!    //! Returns @expr{1@} on success, @expr{0@} otherwise.    //! -  int start_tls (void|SSL.context context) { +  int start_tls (void|SSL.Context context) {       if(ldap_version < 3)    {    seterr (LDAP_PROTOCOL_ERROR);    THROW(({"LDAP: Unknown/unsupported protocol version.\n",backtrace()}));    return -ldap_errno;    }       return send_starttls_op(context||UNDEFINED);