pike.git / lib / modules / SSL.pmod / Context.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Context.pike:651:   // known to support it, or risk getting MITM attacks.      //! A context created for server side PSK use can optionally implement   //! get_psk_hint to return a hint string to be sent to the client. If   //! not implemented, or returning 0, no PSK hint will be sent.   optional string(8bit) get_psk_hint();      //! A context created for client side PSK use must implement a   //! get_psk_id method, which will be called with the server provided   //! hint, or 0 if no hint was sent. The method should return a key id - //! for the PSK, which will be sent to the server. + //! for the PSK, which will be sent to the server. If the hint is not + //! valid, 0 should be returned.   optional string(8bit) get_psk_id(string(8bit) hint);      //! A context created for PSK use must implement a get_psk method,   //! which will be called with the key id, and should return the key to - //! be used for the connection. + //! be used for the connection. If the id is not valid, 0 should be + //! returned.   optional string(8bit) get_psk(string(8bit) id);      //   // --- Certificates and authentication   //      // Unless connecting in anonymous mode the server has to have a set of   // CertificatePair certificate chains to sign its handshake with.   // These are stored in the cert_chains_domain mapping, where they are   // retrieved based on domain the client is connecting to.