pike.git / lib / modules / SSL.pmod / Session.pike

version» Context lines:

pike.git/lib/modules/SSL.pmod/Session.pike:30:   int compression_algorithm;      //! Constant defining a choice of keyexchange, encryption and mac   //! algorithm.   int cipher_suite;      //! Information about the encryption method derived from the   //! cipher_suite.   Cipher.CipherSpec cipher_spec;    - //! Key exchange method, also derived from the cipher_suite. - int ke_method; -  +    //! 48 byte secret shared between the client and the server. Used for   //! deriving the actual keys.   string(8bit) master_secret;      //! information about the certificate in use by the peer, such as issuing authority, and verification status.   mapping cert_data;      //! Negotiated protocol version.   ProtocolVersion version;   
pike.git/lib/modules/SSL.pmod/Session.pike:311:    if (!sizeof(cipher_suites)) {    SSL3_DEBUG_MSG("No suites left after certificate filtering.\n");    return 0;    }       SSL3_DEBUG_MSG("intersection:\n%s\n",    fmt_cipher_suites(cipher_suites));       int suite = cipher_suites[0];    -  ke_method = [int]CIPHER_SUITES[suite][0]; +  int ke_method = [int]CIPHER_SUITES[suite][0];       SSL3_DEBUG_MSG("Selecting server key and certificate.\n");       int max_hash_size = 512;       // Now we can select the actual cert to use.    if ( !KE_Anonymous[ke_method] ) {    CertificatePair cert;       if (version >= PROTOCOL_TLS_1_2) {