pike.git / lib / modules / SSL.pmod / Connection.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Connection.pike:44:      Session session;   Context context;      State pending_read_state;   State pending_write_state;      /* State variables */      int handshake_state; // Constant.STATE_* + int previous_handshake; // Constant.HANDSHAKE_*   int reuse;      constant CERT_none = 0;   constant CERT_requested = 1;   constant CERT_received = 2;   constant CERT_no_certificate = 3;   int certificate_state;      int expect_change_cipher; /* Reset to 0 if a change_cipher message is    * received */
pike.git/lib/modules/SSL.pmod/Connection.pike:455:    ])[packet->content_type];       if ((packet->content_type == PACKET_handshake) &&    (priority == PRI_application)) {    // Assume the packet is either hello_request or client_hello,    // and that we want to renegotiate.    expect_change_cipher = 0;    certificate_state = 0;    state = [int(0..0)|ConnectionState](state | CONNECTION_handshaking);    handshake_state = STATE_wait_for_hello; +  previous_handshake = 0;    }       SSL3_DEBUG_MSG("SSL.Connection->send_packet: type %d, pri %d, %O\n",    packet->content_type, priority, packet->fragment[..5]);    switch (priority)    {    default:    error( "Internal error\n" );    case PRI_alert:    alert_q->put(packet);