gcm | Google Cloud Messaging ) - CCS - CCS ( XMPP Cloud Connection Server | Android library
kandi X-RAY | gcm Summary
kandi X-RAY | gcm Summary
GCM (Google Cloud Messaging) CCS (Cloud Connection Server) implementation for application servers as described in Android developer docs. Uses the XMPP endpoint to have persistent and asynchronous connection with the Google's GCM servers. The HTTP implementation is a work in progress but it is advisable to use the CCS (XMPP) implementation instead as it is asynchronous and hence utilizes server resources more efficiently.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Connect creates a new xmpp connection
- Send a OutMsg
- Generate a new message ID
gcm Key Features
gcm Examples and Code Snippets
Community Discussions
Trending Discussions on gcm
QUESTION
I am using a company-hosted (Bitbucket) git repository that is accessible via HTTPS. Accessing it (e.g. git fetch
) worked using macOS 11 (Big Sur), but broke after an update to macOS 12 Monterey.
*
After the update of macOS to 12 Monterey my previous git setup broke. Now I am getting the following error message:
...ANSWER
Answered 2021-Nov-02 at 07:12Unfortunately I can't provide you with a fix, but I've found a workaround for that exact same problem (company-hosted bitbucket resulting in exact same error).
I also don't know exactly why the problem occurs, but my best guess would be that the libressl library shipped with Monterey has some sort of problem with specific (?TLSv1.3) certs. This guess is because the brew-installed openssl v1.1 and v3 don't throw that error when executed with /opt/homebrew/opt/openssl/bin/openssl s_client -connect ...:443
To get around that error, I've built git from source built against different openssl and curl implementations:
- install
autoconf
,openssl
andcurl
with brew (I think you can select the openssl lib you like, i.e. v1.1 or v3, I chose v3) - clone git version you like, i.e.
git clone --branch v2.33.1 https://github.com/git/git.git
cd git
make configure
(that is why autoconf is needed)- execute
LDFLAGS="-L/opt/homebrew/opt/openssl@3/lib -L/opt/homebrew/opt/curl/lib" CPPFLAGS="-I/opt/homebrew/opt/openssl@3/include -I/opt/homebrew/opt/curl/include" ./configure --prefix=$HOME/git
(here LDFLAGS and CPPFLAGS include the libs git will be built against, the right flags are emitted by brew on install success of curl and openssl; --prefix is the install directory of git, defaults to/usr/local
but can be changed) make install
- ensure to add the install directory's subfolder
/bin
to the front of your$PATH
to "override" the default git shipped by Monterey - restart terminal
- check that
git version
shows the new version
This should help for now, but as I already said, this is only a workaround, hopefully Apple fixes their libressl fork ASAP.
QUESTION
I'm generating a key for encrypting data, then wrap it using a master key and store it alongside the encrypted data. All is well when wrapping into raw
format, but when wrapping as jwk
I get the error DOMException: Data provided to an operation does not meet requirements
.
It works when specifying they key for being used either for encryption or for decryption, but not when both are specified as key usages.
...ANSWER
Answered 2022-Mar-06 at 16:30AES-KW is a key wrap algorithm described in RFC3394. The algorithm is used to wrap i. e. encrypt a key. The input, i.e. the key to be encrypted, must be an integer multiple of 8 bytes, s. also here.
The key to be encrypted is passed in SubtleCrypto.wrapKey()
in the 2nd parameter key
as CryptoKey
and must therefore be exported before the actual encryption. For this purpose the format in which the key is exported is specified in the 1st parameter format
:
QUESTION
Today I got the following message when I used Git + BitBucket on MacOS while pushing a new branch to BitBucket.
You are using an account password for Git over HTTPS.
Beginning March 1, 2022, users are required to use app passwords remote: for Git over HTTPS. To avoid any disruptions, change the password used in your Git client remote: to an app password. Note, these credentials may have been automatically stored in your Git client and/or a credential manager such as Git Credential Manager (GCM).'
...ANSWER
Answered 2022-Jan-31 at 09:00In my case, I used BitBucket via HTTPS and not via SSH. Therefore I had to change it.
- Follow this guide to create and add a new SSH key.
- Follow this guide to switch from HTTPS to SSH.
Unrelated and optional:
While you are at this security related task, activate 2FA in your BitBucket security settings.
QUESTION
Targeting S+ (version 31 and above) requires that one of FLAG_IMMUTABLE or FLAG_MUTABLE be specified when creating a PendingIntent. I got it after updating target SDK to 31. the error always come after AlarmPingSender. But i dont know any class that used AlarmPingSender.
...ANSWER
Answered 2021-Oct-31 at 07:02Possible solution
Upgrade google analytics to firebase analaytics. Hope it'll solve your problems.Also upgrade all the library what're you using.
For me below solutions solve the problem.
Add PendingIntent.FLAG_IMMUTABLE
to your pending intents.
Here is an example -
PendingIntent pendingIntent = PendingIntent.getActivity(this, alarmID, notificationIntent, PendingIntent.FLAG_IMMUTABLE);
For further information follow this link - https://developer.android.com/reference/android/app/PendingIntent#FLAG_IMMUTABLE
QUESTION
I have a Python 3 application running on CentOS Linux 7.7 executing SSH commands against remote hosts. It works properly but today I encountered an odd error executing a command against a "new" remote server (server based on RHEL 6.10):
encountered RSA key, expected OPENSSH key
Executing the same command from the system shell (using the same private key of course) works perfectly fine.
On the remote server I discovered in /var/log/secure
that when SSH connection and commands are issued from the source server with Python (using Paramiko) sshd complains about unsupported public key algorithm:
userauth_pubkey: unsupported public key algorithm: rsa-sha2-512
Note that target servers with higher RHEL/CentOS like 7.x don't encounter the issue.
It seems like Paramiko picks/offers the wrong algorithm when negotiating with the remote server when on the contrary SSH shell performs the negotiation properly in the context of this "old" target server. How to get the Python program to work as expected?
Python code
...ANSWER
Answered 2022-Jan-13 at 14:49Imo, it's a bug in Paramiko. It does not handle correctly absence of server-sig-algs
extension on the server side.
Try disabling rsa-sha2-*
on Paramiko side altogether:
QUESTION
I am making an https request to a server that supplies a 2048 bit Diffie-Hellman cipher, and trying to get my code to reject the connection and issue a handshake failure back to the server and close the connection. I don't think its used, but I have a 4096 bit DH key in the client, and the connection is made perfectly if the server also uses a 4096 bit DH key.
...ANSWER
Answered 2021-Oct-24 at 09:26There is no message coming from the client to indicate a handshake failure and the TCP connection has not been closed.
The handshake, as such, does not fail. OpenSSL has no facility to require a minimum classic-DH size in keyexchange (for DHE and DH_anon which OpenSSL calls ADH), so nodejs enforces this limit after OpenSSL completes the handshake but before allowing any data to pass -- as it also does for the server cert name check, which OpenSSL originally didn't implement and now implements differently from what nodejs chose. See onSecureConnect
in _tls_wrap.js
.
The TCP connection is closed, and that is probably why your server is sending close_notify
-- or trying to; this send will actually fail because of the TCP closure. The servers I tested (OpenSSL and Java) both show TCP closed from the (nodejs) client, although OpenSSL does so implicitly (as read count 0), and they respond differently: only older Java 8 (before the new 11 stack was backported in 8u261) tried to send close_notify in 'response'. I suspect your server just isn't logging the TCP closure; try an external tool like wireshark or similar.
To be clear, you set in the client 4096-bit DH parameters, not a key. Only the parameters are set in the server; the keys at both ends are generated per-handshake (in the subgroup defined by the parameters) which is why they are called ephemeral. And (user-chosen) DH parameters set in the client are ignored (but see next).
FYI: There is a fairly recent protocol option, RFC7919, for TLS1.2* to use standardized (not user-chosen) DHE/anon groups, now called FFDHE to distinguish from ECDHE, which the client can request with the former supported_curves extension now repurposed as supported_groups (in particular it could demand 4096), but OpenSSL and thus nodejs does not implement this option. In 1.3 supported_groups is required, but the FFDHE groups are not required or even particularly encouraged, and AFAICT OpenSSL doesn't (yet?) support them there either -- and anyway 1.3 doesn't allow 'anon' at all. (* Formally 7919 applies to 1.1 and 1.0 also, but I can't imagine any implementation includes 7919 but not 1.2, so you would never need lower protocols.)
QUESTION
When I do openssl s_client -CApath ~/cacert.pem -crlf -connect getcomposer.org:443 -servername getcomposer.org
I get the following output:
ANSWER
Answered 2021-Oct-23 at 21:25This is a stab in the dark, as I don't understand that openssl output much, but judging by the timing and the keywords 'openssl' and 'Lets Encrypt' this has a reasonably high chance of success.
On September 30, 2021 Let's Encrypt's old Root Certificate has expired. This had a major implication that now they have started to use their own root cert which should be trusted by most devices. 'Most' part was troublesome as there are some devices alive which did not receive updates in years. So the people at Let's Encrypt found a way to still remain supported/trusted on those devices, just under one condition - its openssl version must be 1.1.0+ (which is already 4+ years old). Another important detail is that this openssl version requirement also applies to systems that would have otherwise trusted LE's new cert.
So I've seen numerous people over October scrambling to get LE issued certificates to be trusted again by their systems and the answer was always as simple as: Get your openssl / libopenssl updated to v1.1.0+
QUESTION
I am aware that Let's Encrypt made changes that may impact older clients because a root certificate would expire. See DST Root CA X3 Expiration (September 2021).
However, I didn't think this could impact me because my development machine is up-to-date.
But since today I get the message while doing a git pull
:
ANSWER
Answered 2021-Oct-17 at 13:39I was facing a similar issue with DevOps build agents. But I can access the DevOps server web interface without any issue.
To solve this,
- I updated my Let's Encrypt client (I'm using Certify The Web)
- I have renewed my certificate
After that, the DevOps agent is able to do a Git pull.
QUESTION
I setup a Postgresql Aurora DB and a Proxy via Terraform (code below), which is apparently running fine. But for some reason I can not connect to the DB through the proxy. The proxy claims that there are lacking credentials for the role, but if I connect directly to the DB everything is fine and the credentials are working.
I tried this from a VPN and directly from an EC2 instance:
...ANSWER
Answered 2021-Sep-16 at 06:04Your aws_iam_policy
policy has no effect. You forgot to associate it with the role:
QUESTION
I've Encrypted my text by a key in Client by AES-256-GCM algorithm and I can decrypt it in Client, But when I send it to the Backend which has a SharedKey
(the same as the Client has), it can decrypt the message by AES-256-CTR algorithm(I used this algo because the AES-256-GCM in Nodejs needs authTag
that I don't create it in Client and iv
is the only thing I have).
When I decrypt the message on the Backend side, it works with no error, but the result is not what I encrypted in the Client
Here is what I wrote: Client:
...ANSWER
Answered 2021-Sep-11 at 08:13Since GCM is based on CTR, decryption with CTR is in principle also possible. However, this should generally not be done in practice, since it skips the authentication of the ciphertext, which is the added value of GCM over CTR.
The correct way is to decrypt on the NodeJS side with GCM and properly consider the authentication tag.
The authentication tag is automatically appended to the ciphertext by the WebCrypto API, while the crypto module of NodeJS handles ciphertext and tag separately. Therefore, not only the nonce but also the authentication tag must be separated on the NodeJS side.
The following JavaScript/WebCrypto code demonstrates the encryption:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install gcm
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page