Many hyperlinks are disabled.
Use anonymous login
to enable hyperlinks.
History of file src/tls/OFGnuTLSTLSStream.m at check-in ef881e727069d4bb
|
2025-06-22
| ||
| 19:32 | Deleted: Point to the new repository check-in: [ec62287f25] user: js branch: trunk, size: 0 | |
|
2025-06-07
| ||
| 21:30 | OFGnuTLSTLSStream: Fix bytesWritten in exception file: [8bf3aae680] check-in: [873eb9ac12] user: js branch: 1.3, size: 12608 | |
| 21:30 | OFGnuTLSTLSStream: Fix bytesWritten in exception file: [8f2292c4d1] check-in: [c569fa74df] user: js branch: trunk, size: 12632 | |
|
2025-04-15
| ||
| 22:48 | Continue migrating to the ARC functions for RR file: [09d9c37e8c] check-in: [b085f6cc17] user: js branch: trunk, size: 12634 | |
|
2025-01-01
| ||
| 13:07 | Update copyright file: [d59f0c58a4] check-in: [a892e75baf] user: js branch: 1.2, size: 9368 | |
| 12:58 | Update copyright file: [b0b67ed6c7] check-in: [9d802a786d] user: js branch: trunk, size: 12610 | |
|
2024-11-30
| ||
| 18:25 | OFGnuTLSTLSStream: Skip system trust for server file: [df458e4aef] check-in: [ef881e7270] user: js branch: trunk, size: 12610 | |
|
2024-11-26
| ||
| 01:20 | OFX509Certificate: Support associated private key This removes OFX509CertificatePrivateKey and should work better with PKCS #12, where certificates and private keys are parsed together. file: [9fe18bbbbf] check-in: [feba3d2535] user: js branch: tls-server, size: 12609 | |
|
2024-11-20
| ||
| 22:33 | Merge trunk into branch "tls-server" file: [5b1899b257] check-in: [edac376fdf] user: js branch: tls-server, size: 12684 | |
|
2024-11-18
| ||
| 23:27 | OFGnuTLSTLSStream: Restore old close behavior file: [8dbe0324ed] check-in: [716f5721f5] user: js branch: tls-server, size: 12144 | |
| 23:18 | OFOpenSSLTLSStream: Add server support file: [4722d3e575] check-in: [7636fc0143] user: js branch: tls-server, size: 12087 | |
| 00:51 | OFGnuTLSTLSStream: Improve error codes file: [772ec409ee] check-in: [f2e96ebd9a] user: js branch: trunk, size: 10676 | |
| 00:47 | Make GCC happy again file: [e559b50391] check-in: [f6cc2092af] user: js branch: tls-server, size: 12077 | |
| 00:38 | OFGnuTLSTLSStream: Add server support file: [2feefe95de] check-in: [2cb48ceaf1] user: js branch: tls-server, size: 11974 | |
|
2024-11-16
| ||
| 14:17 | OFSecureTransportTLSStream: Use more error codes file: [84d62d35d3] check-in: [33dbefb035] user: js branch: trunk, size: 10136 | |
|
2024-11-12
| ||
| 00:29 | OFGnuTLSTLSStream: Use more error codes file: [49ed6aa948] check-in: [909ad7d8c8] user: js branch: trunk, size: 10136 | |
|
2024-04-03
| ||
| 02:16 | Change license to LGPLv3 only file: [5ff0b3f552] check-in: [7413a728a7] user: js branch: trunk, size: 9368 | |
|
2024-02-03
| ||
| 11:41 | Update copyright file: [95cdd65340] check-in: [7324ec8590] user: js branch: 1.0, size: 9629 | |
|
2024-01-14
| ||
| 11:01 | Mbed TLS: Don't hardcode path to CA file file: [25d18fe2f0] check-in: [027f5e11cf] user: js branch: trunk, size: 9160 | |
|
2024-01-06
| ||
| 00:52 | Initial support for Mbed TLS Mbed TLS is never automatically picked as a TLS implementation and always needs to be manually enabled using --with-tls=mbedtls. file: [570186048d] check-in: [11b2a17595] user: js branch: trunk, size: 9052 | |
|
2024-01-02
| ||
| 17:17 | Update copyright file: [96b9c1a36c] check-in: [26ddd2e4e4] user: js branch: trunk, size: 9133 | |
|
2023-10-15
| ||
| 12:32 | Add -[OFStream lowlevelIsAtEndOfStream] This allows for a much cleaner solution to avoid the internal read buffer of e.g. a TLS connection never being processed while waiting for a delimiter. file: [3f3e9b7029] check-in: [a61e0594b4] user: js branch: trunk, size: 9133 | |
|
2023-09-10
| ||
| 12:11 | More consistency between TLS implementations While GnuTLS and SecureTransport haven't shown in practice to need this, this makes it more robust for future changes in those. In theory, both could return less data on a read than they have buffered, meaning the delimiter is not found but in the buffered data, which would then make them have the same issue OpenSSL had with hanging connections (though there the problem was that the BIO was not processed and never would without the same change as in this commit). file: [ba84ecba17] check-in: [1a3613d573] user: js branch: trunk, size: 9629 | |
|
2023-01-06
| ||
| 09:04 | Update copyright file: [b0bb2b39ec] check-in: [8939cbdb52] user: js branch: trunk, size: 9125 | |
|
2022-12-27
| ||
| 13:58 | Rename OFAlready{Connected -> Open}Exception file: [603af24307] check-in: [29a41e5a78] user: js branch: trunk, size: 9125 | |
|
2022-02-12
| ||
| 07:46 | Update copyright file: [fad8797bf6] check-in: [1a86b8175b] user: js branch: trunk, size: 9135 | |
|
2022-01-29
| ||
| 12:38 | Add OpenSSL support for OFTLSStream file: [02a55ce27d] check-in: [c9b6dcad9e] user: js branch: trunk, size: 9135 | |
|
2022-01-28
| ||
| 19:34 | Don't assume EWOULDBLOCK and EAGAIN are the same file: [c3efe28992] check-in: [d9586ed175] user: js branch: trunk, size: 9117 | |
|
2022-01-26
| ||
| 16:52 | Define GNUTLS_SAFE_PADDING_CHECK 0 if it's missing file: [e2b641b948] check-in: [dd853203d3] user: js branch: trunk, size: 9127 | |
|
2021-11-21
| ||
| 10:40 | OFTLSStream: wrappedStream -> underlyingStream file: [72367f1922] check-in: [3ed8cf7a52] user: js branch: trunk, size: 9007 | |
| 00:30 | Added: Add OFGnuTLSTLSStream file: [633e4da737] check-in: [6b4dd1f24f] user: js branch: trunk, size: 8985 | |