Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
|
|
This seems to be the same issue as:
https://dev.louiz.org/issues/3164
Using their suggested fix, if the DNS lookup doesn't return a port, use
the one passed in instead.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This is used to provide hash agility support and let other XEPs select
which hash function they support.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fix CVE-2015-8688, and a few bugfixes.
|
|
slixmpp is vulnerable to roster push attacks as described by Daniel
Gultsch at https://gultsch.de/gajim_roster_push_and_message_interception.html.
(CVE-2015-8688)
|
|
|
|
|
|
|
|
|
|
|
|
(probably a past typo)
|
|
|
|
|
|
(typo)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fix a few bugs along with the testsuite, and remove the asyncio loop
monkeypatch hack.
|