# HG changeset patch # User Daniel Atallah # Date 1262907984 0 # Node ID 1182e604439c8b3570121f4ef0eb5dac65991156 # Parent bc4401ae1ab1889e8314f58e93d9044120deaa2d *** Plucked rev 8549b9a30115559965e9bf93bb15a45b04c1d149 (f05c54b03e6bbfdbff38c01697fbd353a969e05e): certs: Cache certs once again (at the end of the verification process). It looks like I accidentally broke this (libpurple wouldn't replace a cert already in the cache) when extending the invalidity reasons. diff -r bc4401ae1ab1 -r 1182e604439c ChangeLog --- a/ChangeLog Thu Jan 07 23:46:01 2010 +0000 +++ b/ChangeLog Thu Jan 07 23:46:24 2010 +0000 @@ -2,6 +2,10 @@ Pidgin and Finch: The Pimpin' Penguin IM Clients That're Good for the Soul version 2.6.5 (??/??/20??): + libpurple: + * TLS certificates are actually stored to the local cache once again + (accepting a name mismatch on a certificate should now be remembered) + General: * Build-time fixes for Solaris. (Paul Townsend) diff -r bc4401ae1ab1 -r 1182e604439c libpurple/certificate.c --- a/libpurple/certificate.c Thu Jan 07 23:46:01 2010 +0000 +++ b/libpurple/certificate.c Thu Jan 07 23:46:24 2010 +0000 @@ -1431,9 +1431,8 @@ tls_peers = purple_certificate_find_pool(x509_tls_cached.scheme_name, "tls_peers"); if (tls_peers) { - if (!purple_certificate_pool_contains(tls_peers, vrq->subject_name) && - !purple_certificate_pool_store(tls_peers,vrq->subject_name, - peer_crt)) { + if (!purple_certificate_pool_store(tls_peers,vrq->subject_name, + peer_crt)) { purple_debug_error("certificate/x509/tls_cached", "FAILED to cache peer certificate\n"); }