Skip to content
Snippets Groups Projects
  1. Aug 17, 2016
    • Guillaume Roguez's avatar
      ringdht: add missing return statement · d9c847c0
      Guillaume Roguez authored
      Add a return to an error handling of unwaited rx IM msg.
      
      Coverity CI # 1296815
      
      Change-Id: Ib4503f639e80f7a24e039043f70f8597b6f141d4
      Tuleap: #909
      d9c847c0
    • Guillaume Roguez's avatar
      security: fix resource leaks in TlsVAlidator · f0449b12
      Guillaume Roguez authored
      This patch fix two calls to strdup() without any free().
      
      Change-Id: I8619794e71d4165c154ba6ddd89bf6237e444a67
      Tuleap: #906
      f0449b12
    • Guillaume Roguez's avatar
      RingAccount: fix uninitialized class members · 99cd560e
      Guillaume Roguez authored
      Set true as default value to members:
      allowPeersFromHistory_
      allowPeersFromContact_
      allowPeersFromTrusted_
      
      Coverity CID # 1369576
      
      Change-Id: I38499608ee35692e96c511f08d261eea8ad9b72b
      Tuleap: #909
      99cd560e
    • Guillaume Roguez's avatar
      sip presence: fix uninitialized class member · 1403a9bb
      Guillaume Roguez authored
      Set default value of mutex_nesting_level_ to 0.
      
      Coverity CID # 1291689
      
      Change-Id: Ib794fe5a90679669c837e2ad8064998caae01f42
      Tuleap: #909
      1403a9bb
    • aviau's avatar
      fix check for zlib · a77d6be3
      aviau authored
      AC_CHECK_LIB was not correctly checking for the presence of zlib.
      We use PKG_CHECK_MODULES instead to add -lz to libring_la_LDFLAGS.
      
      Change-Id: Icfffb898030f886aae8c2c82dc5327f923f0f78e
      Tuleap: #746
      [stepan.salenikovich@savoirfairelinux.com: modified to use PKG_CHECK_MODULES and ZLIB_LIBS variable instead of -lz]
      Signed-off: Stepan Salenikovich <stepan.salenikovich@savoirfairelinux.com>
      a77d6be3
    • Guillaume Roguez's avatar
      TlsValidator: fix uninitialized member · 2f9f6b0d
      Guillaume Roguez authored
      Init default value of caValidationOutput_ member of TlsValidator class.
      This prevents warns from static coverage tests.
      
      (issue detected by coverity.com analysis)
      
      Change-Id: Ib9a930bb233208cd99b7003d1a72b6d8003e3e9d
      Tuleap: #909
      2f9f6b0d
    • Guillaume Roguez's avatar
      fileutils: fix bad numeric comparison in loadFile · b4923aaa
      Guillaume Roguez authored
      The file size was wrongly checked in loadFile,
      giving a always true comparaison.
      
      (issue detected by coverity.com analysis)
      
      Change-Id: I2aa4f5c737df3a3b815caebc97bdc3820df8b534
      Tuleap: #909
      b4923aaa
  2. Aug 16, 2016
  3. Aug 15, 2016
    • Adrien Béraud's avatar
      sip: set transport secure state · b3b3a6ce
      Adrien Béraud authored
      When receiving an incoming SIPS or Ring call, enforces the
      secure state of the media as it should be per the SIP
      standard.
      
      Also prevents to accidentally configure an insecure
      transport on a secure call.
      
      Change-Id: I28836c76f79218a026b07d7c182adbaaf50aedbb
      Tuleap: #901
      b3b3a6ce
  4. Aug 14, 2016
  5. Aug 12, 2016
  6. Aug 11, 2016
  7. Aug 10, 2016
  8. Aug 09, 2016
  9. Aug 08, 2016
    • Andreas Traczyk's avatar
      daemon: avoid intrin.h conflict on Windows · c221eb0e
      Andreas Traczyk authored
      The Microsoft compiler will include the common header <intrin.h>
      regardless of the use of quotes. The file "intrin.h" should be renamed,
      and all references to it changed, as well as defining the UNUSED macro
      to nothing on the Windows platform.
      
      Change-Id: Id04d36e70d149746be8d78eed09aa963514b2810
      Tuleap: #801
      c221eb0e
  10. Aug 04, 2016
  11. Aug 03, 2016
    • Guillaume Roguez's avatar
      sdes: fix SdesNegotiator::negotiate() · ad8076ff
      Guillaume Roguez authored
      SdesNegotiator::negotiate() does an invalid check on given offered crypto-suite.
      The current setup is made in a way that this function always returns
      the remote crypto suite, supported or not! Dangerous.
      
      This patch fixes that by correctly comparing crypto-suite names.
      
      Change-Id: I0ef022486e00b5fef91d2552b83d57463282a683
      Tuleap: #747
      ad8076ff
  12. Aug 02, 2016
    • Adrien Béraud's avatar
      archiver: resize compressed data to actual size · 6545b2ce
      Adrien Béraud authored
      archiver::compress used to rely on compressBound, but the actual
      compressed size might be smaller, leading to larger output (with
      trailing zeroes).
      
      Change-Id: Ic33614f2d6bc648e59a76dec7275e71466ecaff1
      Tuleap: #888
      6545b2ce
    • Guillaume Roguez's avatar
      reduce UDP payload size to 1232 · 5a09b307
      Guillaume Roguez authored
      This patch reduces the maximal payload of all UDP stream to 1232 bytes.
      This value is computed from the minimal MTU requested by rfc 2460
      to support IPv6.
      This value ensures that common networks (going to IPv6) support
      a large enough packet size to be efficient, but a minimal size to
      not be fragmented. This last case has a great incidence on packet drop
      and reordering and validated by heuristic.
      
      Change-Id: Icee79bb25b2fdcc70fef3efb4527209f8309be61
      Tuleap: #887
      5a09b307
  13. Aug 01, 2016
  14. Jul 27, 2016
    • Simon Désaulniers's avatar
      contrib: bump opendht -> 0.6.3 · a386003f
      Simon Désaulniers authored
      * Add Microsoft compiler support;
      * Work around the issue compiling on Apple's LLVM 7.3.0;
      * Add Network id feature;
      * License OpenDHT compatible with GPL>=3;
      * Adding cryptographic API;
      * Consistent library naming between diffrent build tools.
      
      Change-Id: I4e7a53619d89f7b2034326ea8d5f75848335c533
      Tuleap: #556
      a386003f
    • aviau's avatar
      Contrib: new --no-checksums parameter · 7fa53d79
      aviau authored
      The new --no-checksums parameter allows for skipping checksums
      verifications. This can be used to replace tarballs and still use the
      contrib system.
      
      This is useful for atleast the two following cases:
      
       - Distro developper needs contrib to patch the source, but has the
         original source in the distribution.
      
       - Distro developper repacks the source, breaking the checksum.
      
      Change-Id: I015ce3d0f6f4fb2f5fd5ec2f95528bfb4b045298
      Tuleap: #879
      Unverified
      7fa53d79
  15. Jul 26, 2016
  16. Jul 25, 2016
  17. Jul 22, 2016
    • Stepan Salenikovich's avatar
      add connectivityChanged API · 20f40205
      Stepan Salenikovich authored
      This allows the clients to notify the daemon when the conenctivity
      (ie: network status) has changed. The daemon will then try to detect
      the new IGD (UPnP) and re-connect all enabled accounts.
      
      Change-Id: I5c8fc57f75e48d86eda5d195b0586c61a26134ad
      Tuleap: #841
      20f40205
  18. Jul 21, 2016
  19. Jul 20, 2016
    • Andreas Traczyk's avatar
      daemon: replace remaining usleep with sleep_for · 88405c00
      Andreas Traczyk authored
      Provide better cross platform compiler compliance by using c++11
      standard library's std::this_thread::sleep_for.
      
      Change-Id: Ib0ef9bec8336ae620315c05b53706e4605ab00fb
      Tuleap: #794
      88405c00
    • aviau's avatar
      Allow for disabling contrib downloads · 451d6973
      aviau authored and Guillaume Roguez's avatar Guillaume Roguez committed
      This adds the support for the DISABLE_CONTRIB_DOWNLOADS environment
      variable. It if it set to TRUE, the contrib system will not download
      tarballs from the internet.
      
      It can be set from the bootstrap script with the --disable-downloads
      option.
      
      This is useful for distro packaging because distribution developpers
      have to make sure they have full control of what is included in the
      package. In Debian, some tarballs are included such as pjsip but the
      rest should not be downloaded. A small mistake such as a missging build
      dependency could cause a tarball download. This new options will help
      pervent such issues.
      
      Tuleap: #847
      Change-Id: I5f579774c53def751111f9366750670fcd75d893
      451d6973
    • Simon Désaulniers's avatar
      contrib: bump opendht -> 0.6.2 · b469ecdd
      Simon Désaulniers authored
      
      * Permanent 'put' feature;
      * Enhanced search's nodes handler algorithm;
      * fix bug when IPv[46] empty table, would not call some callbacks;
      * man page for dhtnode;
      * support for make DESTDIR= syntax;
      
      Change-Id: I0ae58edb706a6344a45fc7c254c7cd29ef8bc90a
      Reviewed-by: default avatarEdric Milaret <edric.ladent-milaret@savoirfairelinux.com>
      b469ecdd
  20. Jul 19, 2016
    • Stepan Salenikovich's avatar
      sipaccount: call SIPStartCall after returning call · 9b4e874e
      Stepan Salenikovich authored
      Some functions in SIPStartCall can take a long time to return, such
      as ICE initialization. This allows the manager to return the callId
      in outgoingCall() to the client sooner and so prevents the UI from
      freezing.
      
      Change-Id: I87b0c4b5d56f69e087f0117b2b78daa026679aab
      Tuleap: #620
      9b4e874e
    • Stepan Salenikovich's avatar
      ringaccount: perform ICE init after returning call · e4daf6cd
      Stepan Salenikovich authored
      This way we don't have to wait for the ICE init before the manager
      can get a callId to return to the client. The ICE init can take a long
      time in certain cases (eg: bad TURN password, slow UPnP) which causes
      the UI to freeze while waiting for the daemon to return outgoingCall()
      with the callId.
      
      Note this changes the behaviour of the daemon slightly. Before if the
      ICE init failed then no callId would be returned. Now the callId is
      always returned and the call will later emit a state change of Fail if
      the ICE init fails.
      
      Tuleap: #620
      Change-Id: I712d1d52be9e9b809b794bb7694ad31bdd2e3bb1
      e4daf6cd
  21. Jul 18, 2016
    • Guillaume Roguez's avatar
      manager: make addTask method thread safe · 2f006c57
      Guillaume Roguez authored
      The code of Manager::addTask() has a comment
      about the fact that this function is not thread-safe
      and must be called by the same thread calling Manager::pollEvent().
      But many part of code seem not taking in account this notice
      and call it outside of the correct thread.
      
      This ticket fixes this by using a mutex.
      
      Change-Id: I82d4cc2d6f26c1157caae0e4826dbf96a73561c6
      Tuleap: #837
      2f006c57
Loading