Commit graph

3215 commits

Author SHA1 Message Date
ThomasV
85d9b8aa8d fix: dePem cert before parsing 2015-08-07 11:58:59 +02:00
ThomasV
ca3c320ef4 simplify x509 constructor 2015-08-07 11:39:30 +02:00
ThomasV
713fa00d86 fix estimatefee for daemon 2015-08-07 10:54:32 +02:00
ThomasV
65c7dfafbc check alias in signrequest 2015-08-07 09:00:00 +02:00
ThomasV
34e3261efd fix estimate_fee 2015-08-06 19:26:34 +02:00
ThomasV
714445aba8 fix: wallet.is_used 2015-08-06 19:19:25 +02:00
ThomasV
e93ff18776 rename help -> commands 2015-08-06 15:52:38 +02:00
ThomasV
aadffa0c8f check_ssl_config: verify pubkey 2015-08-05 20:59:51 +02:00
ThomasV
a9e74da11c check SSL certificate in config dialog 2015-08-05 20:49:45 +02:00
ThomasV
43880d452e dynamic fees 2015-08-05 15:45:28 +02:00
ThomasV
476d198be9 fix missing occurences of X509.parse 2015-08-04 18:31:08 +02:00
ThomasV
e8d30129ea replace TLSLite dependency with minimal RSA implementation 2015-08-04 18:16:06 +02:00
Neil Booth
4c8408b42d Print reason for failure to connect headers
Used to fail just with a "header didn't connect" message, now
it gives a reason too.
2015-08-01 13:09:52 +09:00
ThomasV
8ae64064b6 dont silence dns errors 2015-07-31 21:56:22 +02:00
ThomasV
380bccacf0 request_queue.put should never block, because maxsize is not set 2015-07-31 20:11:12 +02:00
ThomasV
963ec4ca3e dnssec: don't call get_default_resolver 2015-07-31 20:02:55 +02:00
ThomasV
9938fbd160 version 2.4.1 2015-07-31 14:52:16 +02:00
ThomasV
465d1dfd8b fix #1378 2015-07-31 14:51:48 +02:00
ThomasV
2ec19e7528 fix bugs with ecdsa/dnssec 2015-07-31 13:49:14 +02:00
Eagle[TM]
4731418af9 Use ssl.PROTOCOL_TLSv1 on client side to avoid SSLv23 2015-07-30 20:40:05 +02:00
ThomasV
77b0e7be5e network: initial status should be 'unknown', distinct from 'connecting' 2015-07-30 11:32:16 +02:00
ThomasV
348a9b0e21 fix imports, cleanup 2015-07-29 22:16:36 +02:00
ThomasV
e96a0945ca do not use pycrypto for DNSSEC validation 2015-07-29 22:06:44 +02:00
Roman Zeyde
5fbd7553ed interface: fix check_host_name() pattern matching
The existing pattern matching code:

    val.find('*.') == 0 and name.find(val[1:]) + len(val[1:]) == len(name)

will return True in the following case:

   val = '*.host.com'
   name = 'blah.org'

since string.find() will return -1, len(val[1:]) == 9 and len(name) == 8.
2015-07-26 18:11:30 +03:00
ThomasV
70d59bbe06 Merge pull request #1376 from romanz/master
util: fix small typo at parse_URI() and update its unittests
2015-07-25 17:19:28 +02:00
ThomasV
96c3513cb2 add character encoding declaration to index.html 2015-07-25 12:50:00 +02:00
ThomasV
cbf13197e2 websocket: hostname 2015-07-25 12:31:35 +02:00
ThomasV
e9f5e6866d check www dir on daemon start 2015-07-25 12:25:47 +02:00
Roman Zeyde
87d3fafa22 util: fix small typo at parse_URI() and update its unittests 2015-07-25 12:41:37 +03:00
ThomasV
0c5bfb8c26 print -> util.print_error 2015-07-24 14:23:03 +02:00
ThomasV
e6924d9912 prevent websocket closing with balnk target 2015-07-24 13:30:51 +02:00
ThomasV
3da148f406 use local copy of javascript files 2015-07-24 12:36:08 +02:00
ThomasV
f0e6f5bf64 Merge branch 'master' of github.com:spesmilo/electrum 2015-07-24 11:39:31 +02:00
ThomasV
18d145cced add websocket to webpages 2015-07-24 11:39:12 +02:00
Neil Booth
0f2d4bd375 Add bitflyer.jp block explorer 2015-07-24 15:17:15 +09:00
ThomasV
41d9c94821 don't add bip70 suffixes 2015-07-22 16:00:08 +02:00
ThomasV
6d54512627 clearrequests command; minor type fix 2015-07-22 15:46:53 +02:00
ThomasV
508b5373ac minor fixes 2015-07-22 15:33:50 +02:00
ThomasV
8960b16e09 more sanitization 2015-07-22 15:28:43 +02:00
ThomasV
b813ba0bdd sanitize timestamp and expiration in requests 2015-07-22 15:24:15 +02:00
ThomasV
37c07278d5 update var names 2015-07-22 09:37:17 +02:00
ThomasV
8f507d2afd change var name 2015-07-22 09:24:44 +02:00
ThomasV
acbd434f76 cleanup request signing 2015-07-22 09:06:03 +02:00
ThomasV
a8ed934a7f fix bug with make_unsigned_request 2015-07-21 16:30:25 +02:00
ThomasV
a6c65b8997 change internal format of requests 2015-07-21 12:26:37 +02:00
ThomasV
2c1fb1e37c do not raise exception if uri has an unknown key 2015-07-21 11:54:45 +02:00
ThomasV
e77f0c98e7 extend bitcoin: URI with signature data, instead of serialized format 2015-07-21 11:40:55 +02:00
ThomasV
9c30ad3dd5 extend bitcoin URIs with signed payment requests passed directly 2015-07-18 18:42:56 +02:00
ThomasV
e879cb4552 https download of headers 2015-07-18 11:17:19 +02:00
ThomasV
380e072842 fix bug with import_key 2015-07-18 11:00:41 +02:00