1. 05 Nov, 2016 1 commit
  2. 01 Oct, 2016 2 commits
  3. 01 Jun, 2016 1 commit
  4. 14 May, 2016 1 commit
  5. 04 May, 2016 2 commits
  6. 03 May, 2016 1 commit
  7. 21 Feb, 2016 3 commits
  8. 18 Feb, 2016 2 commits
  9. 11 Feb, 2016 1 commit
    • Pieter Hintjens's avatar
      Problem: use of libsodium vs. tweetnacl is confused · b49a6041
      Pieter Hintjens authored
      It's unclear which we need and in the source code, conditional code
      treats tweetnacl as a subclass of libsodium, which is inaccurate.
      
      Solution: redesign the configure/cmake API for this:
      
      * tweetnacl is present by default and cannot be enabled
      * libsodium can be enabled using --with-libsodium, which replaces
        the built-in tweetnacl
      * CURVE encryption can be disabled entirely using --enable-curve=no
      
      The macros we define in platform.hpp are:
      
          ZMQ_HAVE_CURVE    1        //  When CURVE is enabled
          HAVE_LIBSODIUM    1        //  When we are using libsodium
          HAVE_TWEETNACL    1        //  When we're using tweetnacl (default)
      
      As of this patch, the default build of libzmq always has CURVE
      security, and always uses tweetnacl.
      b49a6041
  10. 09 Feb, 2016 1 commit
    • Pieter Hintjens's avatar
      Problem: ZMQ_TCP_RECV_BUFFER/SEND_BUFFER are redundant · 7470c00d
      Pieter Hintjens authored
      These options are confusing and redundant. Their names suggest
      they apply to the tcp:// transport, yet they are used for all
      stream protocols. The methods zmq::set_tcp_receive_buffer and
      zmq::set_tcp_send_buffer don't use these values at all, they use
      ZMQ_SNDBUF and ZMQ_RCVBUF.
      
      Solution: merge these new options into ZMQ_SNDBUF and ZMQ_RCVBUF.
      
      This means defaulting these two options to 8192, and removing the
      new options. We now have ZMQ_SNDBUF and ZMQ_RCVBUF being used both
      for TCP socket control, and for input/output buffering.
      
      Note: the default for SNDBUF and RCVBUF are otherwise 4096.
      7470c00d
  11. 28 Jan, 2016 1 commit
  12. 30 Nov, 2015 1 commit
  13. 18 Nov, 2015 1 commit
  14. 08 Nov, 2015 1 commit
  15. 08 Oct, 2015 1 commit
  16. 21 Aug, 2015 1 commit
  17. 16 Aug, 2015 1 commit
  18. 23 Jul, 2015 1 commit
  19. 26 Jun, 2015 1 commit
    • Jonathan Reams's avatar
      Fix units and default values for heartbeats options · e9a5bc8d
      Jonathan Reams authored
      Set the ZMQ_HEARTBEAT_TIMEOUT to default to the value of
      ZMQ_HEARTBEAT_IVL if it's not explicitly set.
      Change the units of ZMQ_HEARTBEAT_TTL to milliseconds in the API
      and round down to the nearest decisecond so that all the options
      are using the same units.
      Make the maximum heartbeat TTL match the spec (6553 seconds)
      e9a5bc8d
  20. 24 Jun, 2015 1 commit
  21. 14 Jun, 2015 1 commit
    • Jens Auer's avatar
      Fixed wrong buffer end detection in v2_decoder. · dfe19080
      Jens Auer authored
      zero-copy msg_t::init cannot be used when the message exceeds either
      the buffer end or the last received byte. To detect this, the buffer
      is now resized to the numnber of received bytes.
      dfe19080
  22. 02 Jun, 2015 1 commit
  23. 19 May, 2015 1 commit
  24. 22 Apr, 2015 1 commit
  25. 19 Feb, 2015 2 commits
  26. 18 Feb, 2015 1 commit
  27. 27 Jan, 2015 1 commit
  28. 23 Jan, 2015 1 commit
    • Pieter Hintjens's avatar
      Problem: commit afb24b53 broke ZMQ_STREAM contract · 6ced7027
      Pieter Hintjens authored
      Symptom is that ZMQ_STREAM sockets in 4.1.0 and 4.1.1 generate zero
      sized messages on each new connection, unlike 4.0.x which did not do
      this.
      
      Person who made this commit also changed test cases so that contract
      breakage did not show. Same person was later banned for persistently
      poor form in CZMQ contributions.
      
      Solution: enable connect notifications on ZMQ_STREAM sockets using a
      new ZMQ_STREAM_NOTIFY setting. By default, socket does not deliver
      notifications, and behaves as in 4.0.x.
      
      Fixes #1316
      6ced7027
  29. 22 Jan, 2015 1 commit
  30. 16 Jan, 2015 3 commits
  31. 19 Dec, 2014 1 commit
    • Pieter Hintjens's avatar
      Problem: very hard to debug security mechanism mismatch · 17937ffc
      Pieter Hintjens authored
      E.g. when server is not configured, and client tries PLAIN security,
      there is no hint of why this does not work.
      
      Solution: add debugging output for this case. Note that the various
      debugging outputs for security failures should probably be sent to
      an inproc monitor of some kind.
      17937ffc
  32. 03 Dec, 2014 1 commit