pike.git / lib / modules / SSL.pmod / Session.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Session.pike:82:   //! The set of <hash, signature> combinations supported by the other end.   //!   //! Only used with TLS 1.2 and later.   //!   //! Defaults to the settings from RFC 5246 7.4.1.4.1.   array(array(int)) signature_algorithms = ({    // RFC 5246 7.4.1.4.1:    // Note: this is a change from TLS 1.1 where there are no explicit    // rules, but as a practical matter one can assume that the peer    // supports MD5 and SHA-1. -  ({ HASH_md5, SIGNATURE_rsa }), -  ({ HASH_md5, SIGNATURE_dsa }), -  // NB: MD5 is not supported with ECDSA. +     ({ HASH_sha, SIGNATURE_rsa }),    ({ HASH_sha, SIGNATURE_dsa }),    ({ HASH_sha, SIGNATURE_ecdsa }),   });      //! Supported elliptical curve cipher curves in order of preference.   array(int) ecc_curves = ({});      //! The selected elliptical curve point format.   //!