Quoting Joseph Wang <joequ...@gmail.com> from ml.softs.gtk-gnutella.devel: :I'm getting segfaults in gtk-gnutella that seem to be the result of bad :data in the gnutls layer when verifying SVN signatures. I've gotten :everything to work by converting the call to the non-deprecated SVN api.
Thanks Joseph. Which version of TLS are you using? You can conveniently get this information by running gtk-gnutella --version FYI, your patch does not compile with TLS 2.10.2 and TLS 2.12.23, which are the versions I use on Windows and Linux respectively. To be able to add your patch to the source tree, I need to know which version you have on your system so that I can make the compilation conditional to a specific version. The gnutls_pubkey_verify_data2() is missing in TLS 2.12.23. The gnutls_pubkey_t typedef is missing in TLS 2.10.2. Thanks, Raphael ------------------------------------------------------------------------------ Android is increasing in popularity, but the open development platform that developers love is also attractive to malware creators. Download this white paper to learn more about secure code signing practices that can help keep Android apps secure. http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk _______________________________________________ gtk-gnutella-devel mailing list gtk-gnutella-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/gtk-gnutella-devel