pike.git / lib / modules / SSL.pmod / Context.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Context.pike:32:   //!   //! @seealso   //! @[sslfile], @[sslport], @[Standards.X509]      #ifdef SSL3_DEBUG   #define SSL3_DEBUG_MSG(X ...) werror(X)   #else /*! SSL3_DEBUG */   #define SSL3_DEBUG_MSG(X ...)   #endif /* SSL3_DEBUG */    - import .Constants; + import "."; + import Constants;    - #define Session .Session -  +    //! The minimum supported protocol version.   //!   //! Defaults to @[PROTOCOL_SSL_3_0].   //!   //! @note   //! This value should not be greater than @[max_version].   ProtocolVersion min_version = PROTOCOL_SSL_3_0;      //! The maximum supported protocol version.   //!   //! Defaults to @[PROTOCOL_TLS_MAX].   //!   //! @note   //! This value should not be less than @[min_version].   ProtocolVersion max_version = PROTOCOL_TLS_MAX;    - //! @decl Alert alert_factory(SSL.connection con, int level, int description, @ + //! @decl Alert alert_factory(SSL.Connection con, int level, int description, @   //! ProtocolVersion version, @   //! string|void message, mixed|void trace)   //!   //! Alert factory.   //!   //! This function may be overloaded to eg obtain logging of   //! generated alerts.   //!   //! @param con   //! Connection which caused the alert.
pike.git/lib/modules/SSL.pmod/Context.pike:76:   //!   //! @param description   //! Description code for the alert.   //!   //! @param message   //! Optional log message for the alert.   //!   //! @note   //! Not all alerts are fatal, and some (eg @[ALERT_close_notify]) are used   //! during normal operation. - .Alert alert_factory(object con, + Alert alert_factory(object con,    int(1..2) level, int(0..255) description,    ProtocolVersion version, string|void message)   { -  return .Alert(level, description, version, message); +  return Alert(level, description, version, message);   }      //! Should an SSL client include the Server Name extension?   //!   //! If so, then client_server_names should specify the values to send.   int client_use_sni = 0;      //! Host names to send to the server when using the Server Name   //! extension.   array(string(8bit)) client_server_names = ({});
pike.git/lib/modules/SSL.pmod/Context.pike:221:   //! Supported elliptical curve cipher curves in order of preference.   array(int) ecc_curves = reverse(sort(indices(ECC_CURVES)));      //! List of advertised protocols using using TLS application level   //! protocol negotiation.   array(string(8bit)) advertised_protocols;      //! The maximum amount of data that is sent in each SSL packet by   //! @[sslfile]. A value between 1 and   //! @[SSL.Constants.PACKET_MAX_SIZE]. - int packet_max_size = SSL.Constants.PACKET_MAX_SIZE; + int packet_max_size = PACKET_MAX_SIZE;      protected int cert_sort_key(CertificatePair cp)   {    array(HashAlgorithm|SignatureAlgorithm) sign_alg = cp->sign_algs[0];    int bits = cp->key->key_size();       // Adjust the bits to be comparable for the different algorithms.    switch(sign_alg[1]) {    case SIGNATURE_rsa:    // The normative size.
pike.git/lib/modules/SSL.pmod/Context.pike:1128:      //! Compatibility.   //! @deprecated add_cert   __deprecated__ void `dsa=(Crypto.DSA k)   {    error("The old DSA API is not supported anymore.\n");   }      #if 0   //! Parameters for dh keyexchange. - .Cipher.DHKeyExchange dh_ke; + Cipher.DHKeyExchange dh_ke;   #endif      //! Set @[preferred_suites] to RSA based methods.   //!   //! @param min_keylength   //! Minimum acceptable key length in bits.   //!   //! @seealso   //! @[dhe_dss_mode()], @[filter_weak_suites()]   //!