changeset 32212:1bcedeb32bb4

Remove the old deprecated purple_certificate_check_signature_chain. Rename purple_certificate_check_signature_chain_with_failing to purple_certificate_check_signature_chain.
author andrew.victor@mxit.com
date Sat, 24 Sep 2011 16:36:57 +0000
parents fa4b88cf8b56
children 2571b01e849c
files ChangeLog.API libpurple/certificate.c libpurple/certificate.h libpurple/plugins/perl/common/Certificate.xs
diffstat 4 files changed, 6 insertions(+), 31 deletions(-) [+]
line wrap: on
line diff
--- a/ChangeLog.API	Fri Sep 23 18:24:01 2011 +0000
+++ b/ChangeLog.API	Sat Sep 24 16:36:57 2011 +0000
@@ -53,6 +53,8 @@
 		* xmlnode_strip_prefixes
 
 		Changed:
+		* purple_certificate_check_signature_chain_with_failing renamed
+		  to purple_certificate_check_signature_chain
 		* purple_connection_error now takes a PurpleConnectionError
 		  as the second parameter
 		* purple_notify_user_info_add_pair renamed to
--- a/libpurple/certificate.c	Fri Sep 23 18:24:01 2011 +0000
+++ b/libpurple/certificate.c	Sat Sep 24 16:36:57 2011 +0000
@@ -275,7 +275,7 @@
 }
 
 gboolean
-purple_certificate_check_signature_chain_with_failing(GList *chain,
+purple_certificate_check_signature_chain(GList *chain,
                                                       PurpleCertificate **failing)
 {
 	GList *cur;
@@ -363,12 +363,6 @@
 	return TRUE;
 }
 
-gboolean
-purple_certificate_check_signature_chain(GList *chain)
-{
-	return purple_certificate_check_signature_chain_with_failing(chain, NULL);
-}
-
 PurpleCertificate *
 purple_certificate_import(PurpleCertificateScheme *scheme, const gchar *filename)
 {
@@ -1622,7 +1616,7 @@
 	ca = purple_certificate_find_pool(x509_tls_cached.scheme_name, "ca");
 
 	/* Next, check that the certificate chain is valid */
-	if (!purple_certificate_check_signature_chain_with_failing(chain,
+	if (!purple_certificate_check_signature_chain(chain,
 				&failing_crt))
 	{
 		gboolean chain_validated = FALSE;
--- a/libpurple/certificate.h	Fri Sep 23 18:24:01 2011 +0000
+++ b/libpurple/certificate.h	Sat Sep 24 16:36:57 2011 +0000
@@ -462,33 +462,12 @@
  *                   chain fails to validate, this will be set to the
  *                   certificate whose signature could not be validated.
  * @return TRUE if the chain is valid. See description.
- *
- * @since 2.6.0
- * @deprecated  This function will become
- *              purple_certificate_check_signature_chain in 3.0.0
  */
 gboolean
-purple_certificate_check_signature_chain_with_failing(GList *chain,
+purple_certificate_check_signature_chain(GList *chain,
 		PurpleCertificate **failing);
 
 /**
- * Check that a certificate chain is valid
- *
- * Uses purple_certificate_signed_by() to verify that each PurpleCertificate
- * in the chain carries a valid signature from the next. A single-certificate
- * chain is considered to be valid.
- *
- * @param chain      List of PurpleCertificate instances comprising the chain,
- *                   in the order certificate, issuer, issuer's issuer, etc.
- * @return TRUE if the chain is valid. See description.
- * @todo Specify which certificate in the chain caused a failure
- * @deprecated  This function will be removed in 3.0.0 and replaced with
- *              purple_certificate_check_signature_chain_with_failing
- */
-gboolean
-purple_certificate_check_signature_chain(GList *chain);
-
-/**
  * Imports a PurpleCertificate from a file
  *
  * @param scheme      Scheme to import under
--- a/libpurple/plugins/perl/common/Certificate.xs	Fri Sep 23 18:24:01 2011 +0000
+++ b/libpurple/plugins/perl/common/Certificate.xs	Sat Sep 24 16:36:57 2011 +0000
@@ -202,7 +202,7 @@
 			l = g_list_prepend(l, purple_perl_ref_object(ST(i)));
 		}
 		l = g_list_reverse(l);
-		ret = purple_certificate_check_signature_chain(l);
+		ret = purple_certificate_check_signature_chain(l, NULL);
 		g_list_free(l);
 		if(ret) XSRETURN_YES;
 		XSRETURN_NO;