Quantcast

Apache Qpid Proton

This forum is an archive for the mailing list proton@qpid.apache.org (more options) Messages posted here will be sent to this mailing list.
Discussion list for the Apache Qpid Proton™ project, a lightweight messaging library enabling integration with the AMQP 1.0 ecosystem
1234 ... 88
Topics (3063)
Replies Last Post Views
[jira] [Assigned] (PROTON-686) va_copy is C99 (not C89) and is not supported by the Microsoft Visual Studio C compiler before VS 2013 by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Updated] (PROTON-686) va_copy is C99 (not C89) and is not supported by the Microsoft Visual Studio C compiler before VS 2013 by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Created] (PROTON-686) va_copy is C99 (not C89) and is not supported by the Miscrosoft Visual Studio C compiler before VS 2013 by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Commented] (PROTON-651) Export the proton version numbers via the bindings. by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Resolved] (PROTON-685) calling free() on session with multiple Sender or Receiver links leads to ConcurrentModificationException by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Updated] (PROTON-685) calling free() on session with multiple Sender or Receiver links leads to ConcurrentModificationException by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Comment Edited] (PROTON-685) calling free() on session with multiple Sender or Receiver links leads to ConcurrentModificationException by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Comment Edited] (PROTON-685) calling free() on session with multiple Sender or Receiver links leads to ConcurrentModificationException by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Updated] (PROTON-685) calling free() on session with multiple Sender or Receiver links leads to ConcurrentModificationException by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Commented] (PROTON-685) calling free() on session with multiple Sender or Receiver links leads to ConcurrentModificationException by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Created] (PROTON-685) calling free() on session with multiple Sender or Receiver links leads to ConcurrentModificationException by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Commented] (PROTON-668) Document Proton-c IO restrictions for 0.8 release by JIRA jira@apache.org
1
by Bozo Dragojevic
[jira] [Commented] (PROTON-684) Restrict IOCP enlistment to pn_selector_t usage scenarios in Windows by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Commented] (PROTON-668) Document Proton-c IO restrictions for 0.8 release by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Updated] (PROTON-684) Restrict IOCP enlistment to pn_selector_t usage scenarios in Windows by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Created] (PROTON-684) Restrict IOCP enlistment to pn_selector_t usage scenarios in Windows by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Commented] (PROTON-660) Fix openssl.c build on windows by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Created] (PROTON-683) Register Proton for Coverity scans by JIRA jira@apache.org
0
by JIRA jira@apache.org
proton javascript binding problem/question by Ernie
8
by fadams
[jira] [Created] (PROTON-668) Document Proton-c IO restrictions for 0.8 release by JIRA jira@apache.org
1
by Bozo Dragojevic
[jira] [Updated] (PROTON-682) proton-c: a call to pn_messenger_stop can get into an infinite loop if the remote connection is severed by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Created] (PROTON-682) proton-c: a call to pn_messenger_stop can get into an infinite loop if the remote connection is severed by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Closed] (PROTON-573) proton-c: Messenger appears to have hard-coded address limits of 1024 by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Closed] (PROTON-575) proton-j: LoggingProtocolTracer used by FrameWriter cannot be overridden by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Closed] (PROTON-610) proton-c: messenger doesn't honour an advertised remote idle timeout by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Closed] (PROTON-611) [proton-c] transport buffer increased to peer's max frame size if initial output_size is not enough by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Closed] (PROTON-681) proton-c: pni_map_ensure infinite loop if `load = map->load_factor` by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Resolved] (PROTON-681) proton-c: pni_map_ensure infinite loop if `load = map->load_factor` by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Commented] (PROTON-681) proton-c: pni_map_ensure infinite loop if `load = map->load_factor` by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Updated] (PROTON-548) Proton-C driver and URL Parsers don't support AF_INET6 (IPv6) by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Commented] (PROTON-681) proton-c: pni_map_ensure infinite loop if `load = map->load_factor` by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Updated] (PROTON-625) prevert looping when map->load_factor exactly equals load by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Updated] (PROTON-625) prevert looping when map->load_factor exactly equals load by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Created] (PROTON-681) proton-c: pni_map_ensure infinite loop if `load = map->load_factor` by JIRA jira@apache.org
0
by JIRA jira@apache.org
[jira] [Updated] (PROTON-681) proton-c: pni_map_ensure infinite loop if `load = map->load_factor` by JIRA jira@apache.org
0
by JIRA jira@apache.org
1234 ... 88