pike.git / lib / modules / SSL.pmod / Session.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Session.pike:34:   int cipher_suite;      //! Information about the encryption method derived from the   //! cipher_suite.   Cipher.CipherSpec cipher_spec;      //! 48 byte secret shared between the client and the server. Used for   //! deriving the actual keys.   string(8bit) master_secret;    - //! information about the certificate in use by the peer, such as issuing authority, and verification status. + //! Information about the certificate in use by the peer, such as + //! issuing authority, and verification status.   mapping cert_data;      //! Negotiated protocol version.   ProtocolVersion version;      //! the peer certificate chain   array(string(8bit)) peer_certificate_chain;      //! our certificate chain   array(string(8bit)) certificate_chain;
pike.git/lib/modules/SSL.pmod/Session.pike:260:   //! the client claims to support.   //! @enddl   int select_cipher_suite(array(CertificatePair) certs,    array(int) cipher_suites,    ProtocolVersion version)   {    if (!sizeof(cipher_suites)) return 0;       SSL3_DEBUG_MSG("Candidate certificates: %O\n", certs);    -  // Find the set of key exchange and hash algorithms supported by the client. +  // Find the set of key exchange and hash algorithms supported by the +  // client.    int ke_mask = 0;    int h_max = 0;    foreach(cipher_suites, int suite) {    if (CIPHER_SUITES[suite]) {    ke_mask |= 1 << [int](CIPHER_SUITES[suite][0]);    Crypto.Hash hash =    [object(Crypto.Hash)]HASH_lookup[CIPHER_SUITES[suite][2]];    if (hash && (hash->digest_size() > h_max)) {    h_max = hash->digest_size();    }