pike.git / lib / modules / SSL.pmod / Session.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Session.pike:259:   //! May be @expr{0@} (zero) if the client hasn't sent any SNI.   //! @enddl   int select_cipher_suite(object context,    array(int) cipher_suites,    ProtocolVersion version)   {    if (!sizeof(cipher_suites)) return 0;       // First we need to check what certificate candidates we have.    array(CertificatePair) certs = -  ([function(array(string(8bit)): array(CertificatePair))] -  context->find_cert)( server_name && ({ server_name }) ); +  ([function(string(8bit): array(CertificatePair))] +  context->find_cert_domain)( server_name );       SSL3_DEBUG_MSG("Candidate certificates: %O\n", certs);       // Find the set of key exchange algorithms supported by the client.    int ke_mask = 0;    foreach(cipher_suites, int suite) {    if (CIPHER_SUITES[suite]) {    ke_mask |= 1 << [int](CIPHER_SUITES[suite][0]);    }    }