1. 07 Sep, 2019 2 commits
  2. 18 Aug, 2019 1 commit
  3. 10 Aug, 2019 1 commit
  4. 07 Jul, 2019 1 commit
  5. 02 Jul, 2019 1 commit
  6. 09 Jun, 2019 1 commit
  7. 06 Jun, 2019 1 commit
  8. 01 Jun, 2019 1 commit
  9. 21 May, 2019 1 commit
    • Michael Catanzaro's avatar
      openssl: fix some uninitialized memory use · b2107f8a
      Michael Catanzaro authored
      g_tls_database_openssl_initable_init() is returning uninitialized memory
      on its success path. For me, result is usually 0, causing the call to
      fail. But for Ignacio, it's nonzero, causing the call to succeed.
      
      
      (cherry picked from commit ab9a3761)
      b2107f8a
  10. 18 May, 2019 1 commit
  11. 13 May, 2019 2 commits
  12. 07 May, 2019 1 commit
  13. 06 May, 2019 1 commit
  14. 02 May, 2019 1 commit
  15. 01 May, 2019 1 commit
  16. 29 Apr, 2019 3 commits
  17. 26 Apr, 2019 3 commits
  18. 25 Apr, 2019 1 commit
    • Ignacio Casal Quinteiro's avatar
      database: use the default system store provided by openssl · ba00aaa9
      Ignacio Casal Quinteiro authored
      And let the file database an independent class in case that we
      need to use it.
      Note the default database does not implement all the base class
      methods since openssl does not provide us the api to iterate
      over the ca certificates.
      This is the reason the file database stays as is so we can iterate
      over and have good unit tests. In theory for the file database
      we should just add the file to the store and be done with it.
      ba00aaa9
  19. 03 Apr, 2019 2 commits
  20. 02 Apr, 2019 2 commits
    • Michael Catanzaro's avatar
      Prepare 2.60.1 · 8f73d92b
      Michael Catanzaro authored
      8f73d92b
    • Michael Catanzaro's avatar
      Fix flaky failures in client auth failure tests · a5c18b55
      Michael Catanzaro authored
      The test is currently too strict about which errors to expect after the
      server drops the connection. It expects G_IO_ERROR_BROKEN_PIPE to only
      occur during the close, but it could also occur during the read, in
      which case there will be no error on close. It's a shame we can't
      guarantee a consistent error in this case and the errors in general
      could stand to be improved, but important thing is that there is some
      error: the read is (properly) not working.
      
      Fixes #66
      a5c18b55
  21. 01 Apr, 2019 1 commit
  22. 30 Mar, 2019 1 commit
    • Michael Catanzaro's avatar
      gnutls: fix spurious wakeups from GTlsConnectionGnutlsSource · 85051d2d
      Michael Catanzaro authored
      I lazily reused the need_finish_handshake variable to signal that it's
      time to stop cranking the handshake context, not realizing there are
      serious consequences to misusing the variable in this way. Now
      need_finish_handshake is always true after a sync handshake. This causes
      telepathy-idle to churn CPU with constant unnecessary wakeups. I didn't
      notice before because WebKit only uses async handshake.
      
      Note this bug meant telepathy-idle would never idle. HAR HAR!
      
      Fixes #69
      85051d2d
  23. 29 Mar, 2019 2 commits
    • Michael Catanzaro's avatar
      gnutls: simplify certificate verification · 14aebd56
      Michael Catanzaro authored
      This just moves code around. We currently have four different
      similarly-named functions that get called during certificate
      verification. We need three of them. This merges two together, and
      renames two of them to improve clarity.
      14aebd56
    • Michael Catanzaro's avatar
      gnutls: handshake context should not be exposed to API users · 3e26ae12
      Michael Catanzaro authored
      The handshake context is supposed to be private to glib-networking, but
      here it's accidentally exposed as the thread-default main context at the
      time the accept-certificate signal is emitted. So that's no good. Let's
      temporarily restore the previous thread-default main context for the
      signal emission.
      3e26ae12
  24. 26 Mar, 2019 1 commit
  25. 13 Mar, 2019 1 commit
  26. 12 Mar, 2019 3 commits
  27. 11 Mar, 2019 1 commit
  28. 08 Mar, 2019 2 commits