pike.git / lib / modules / SSL.pmod / Connection.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Connection.pike:355:    else if(version <= PROTOCOL_TLS_1_1) {    return session->cipher_spec->prf(session->master_secret, sender,    Crypto.MD5.hash(handshake_messages)+    Crypto.SHA1.hash(handshake_messages), 12);    } else if(version >= PROTOCOL_TLS_1_2) {    return session->cipher_spec->prf(session->master_secret, sender,    session->cipher_spec->hash->hash(handshake_messages), 12);    }   }    - Packet finished_packet(string(0..255) sender) - { -  SSL3_DEBUG_MSG("Sending finished_packet, with sender=\""+sender+"\"\n" ); -  string(0..255) verify_data = hash_messages(sender); -  if (handshake_state >= STATE_client_min) { -  // We're the client. -  client_verify_data = verify_data; -  } else { -  // We're the server. -  server_verify_data = verify_data; -  } -  return handshake_packet(HANDSHAKE_finished, verify_data); - } -  +    Packet certificate_request_packet(SSL.context context)   {    /* Send a CertificateRequest message */    ADT.struct struct = ADT.struct();    struct->put_var_uint_array(context->preferred_auth_methods, 1, 1);    if (version >= PROTOCOL_TLS_1_2) {    // TLS 1.2 has var_uint_array of hash and sign pairs here.    struct->put_var_string(get_signature_algorithms(), 2);    }    struct->put_var_string([string(0..255)]