pike.git / lib / modules / SSL.pmod / Session.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Session.pike:173:    int found;    foreach(signature_algorithms, array(int) sup_alg) {    if (found = equal(sign_alg, sup_alg)) break;    }    if (!found) return 0;    }    } else if (!(ke_mask & cp->ke_mask))    return 0;      #if constant(Crypto.ECC.Curve) -  if (cp->key->curve) { +  if (cp->key->get_curve) {    // Is the ECC curve supported by the client?    Crypto.ECC.Curve c = -  ([object(Crypto.ECC.SECP_521R1.ECDSA)]cp->key)->curve(); +  ([object(Crypto.ECC.Curve.ECDSA)]cp->key)->get_curve();    SSL3_DEBUG_MSG("Curve: %O (%O)\n",    c, ECC_NAME_TO_CURVE[c->name()]);    return has_value(ecc_curves, ECC_NAME_TO_CURVE[c->name()]);    }   #endif    return 1;   }      //! Used to filter the set of cipher suites suggested by the peer   //! based on our available certificates.
pike.git/lib/modules/SSL.pmod/Session.pike:385:    if (!cert) {    error("No suitable certificate for selected cipher suite: %s.\n",    fmt_cipher_suite(suite));    }       private_key = cert->key;    SSL3_DEBUG_MSG("Selected server key: %O\n", private_key);       certificate_chain = cert->certs;   #if constant(Crypto.ECC.Curve) -  if (private_key->curve) { -  curve = [object(Crypto.ECC.Curve)]private_key->curve(); +  if (private_key->get_curve) { +  curve = [object(Crypto.ECC.Curve)]private_key->get_curve();    }   #endif /* Crypto.ECC.Curve */       if (private_key->block_size) {    // FIXME: The maximum allowable hash size depends on the size of the    // RSA key when RSA is in use. With a 64 byte (512 bit) key,    // the block size is 61 bytes, allow for 23 bytes of overhead.    max_hash_size = [int]private_key->block_size() - 23;    }    }