#StackBounty: #ios #uiscrollview I want to make effect simliar to resizing top view on contacts app?

Bounty: 50

Native contacts app has interesting effect – when user tries to scroll, the scroll view pushes the top view with avatar and only when top view is in “small mode” it is scrolled up.

enter image description here

enter image description here

I was able to resize view on scrolling, via didScroll method. But problem is, content offset is also changing while i push the top vied. In native contacts, content offset changes only when top view is in “small mode”

Any suggestions, how did they made this?


Get this bounty!!!

#StackBounty: #java #android #libgdx #ios Libgdx: Aligning buttons inside dialog

Bounty: 50

I have the following dialog, semi circle shape. I want to position buttons in it.

enter image description here

        dialog.button(closeButton, false);
        dialog.getContentTable().add(buttonS);
        dialog.getContentTable().add(button);
        dialog.getContentTable().add(hwTo);

The only way I am able to move a button is by using for a example

    dialog.getContentTable().add(hwTo).pad(300);

But I don’t want to pad anything, since it affects other buttons, I tried align, button.setPosition and whatnot, nothing works.

I was told to remove the table and ise Custom WidgetGroup.


Get this bounty!!!

#StackBounty: iOS : NSInputStream / NSOutputStream – CFNetwork SSLHandshake failed (-9806)

Bounty: 50

I’m trying to open an input/output stream to a secure server but keep getting CFNetwork SSLHandshake failed (-9806)

I have set the plist values for exception domains etc

<key>NSAppTransportSecurity</key>
<dict>
    <key>NSExceptionDomains</key>
    <dict>
        <key>someserver.com</key>
        <dict>
            <key>NSIncludesSubdomains</key>
            <true/>
            <key>NSThirdPartyExceptionMinimumTLSVersion</key>
            <string>TLSv1.0</string>
            <key>NSThirdPartyExceptionRequiresForwardSecrecy</key>
            <false/>
            <key>NSTemporaryExceptionAllowsInsecureHTTPLoads</key>
            <true/>
        </dict>
    </dict>
</dict>

I also tried this in plist:

<key>NSAppTransportSecurity</key>
<dict>
    <key>NSAllowsArbitraryLoads</key>
    <true/>
</dict>

Here is my code:

-(void)startStream{


NSString *urlStr = @"https://stream.someserver.com";
NSURL *website = [NSURL URLWithString:urlStr];


CFReadStreamRef readStream;
CFWriteStreamRef writeStream;
CFStreamCreatePairWithSocketToHost(NULL, (CFStringRef)CFBridgingRetain([website host]), 443, &readStream, &writeStream);

NSInputStream *inputStream = (__bridge_transfer NSInputStream *)readStream;
NSOutputStream *outputStream = (__bridge_transfer NSOutputStream *)writeStream;


[inputStream setDelegate:self];
[outputStream setDelegate:self];

[inputStream scheduleInRunLoop:[NSRunLoop currentRunLoop] forMode:NSDefaultRunLoopMode];
[outputStream scheduleInRunLoop:[NSRunLoop currentRunLoop] forMode:NSDefaultRunLoopMode];


NSMutableDictionary *settings = [NSMutableDictionary dictionaryWithCapacity:1];
[settings setObject:(NSString *)NSStreamSocketSecurityLevelTLSv1 forKey:(NSString *)kCFStreamSSLLevel];
[settings setObject:[NSNumber numberWithBool:YES] forKey:(NSString *)kCFStreamSSLValidatesCertificateChain];
[settings setObject:@"stream.someserver.com" forKey:(NSString *)kCFStreamSSLPeerName];

CFWriteStreamSetProperty((CFWriteStreamRef)outputStream, kCFStreamPropertySSLSettings, (CFTypeRef)settings);
CFReadStreamSetProperty((CFReadStreamRef)inputStream, kCFStreamPropertySSLSettings, (CFTypeRef)settings);


[inputStream open];
[outputStream open];

}

There is a about a 5 second delay after the stream is open before the CFNetwork SSLHandshake failed (-9806) error is thrown.

NOTE: The secure server is not mine and I cannot change any settings there. It is a tested and established server with many users streaming


Get this bounty!!!

#StackBounty: Nginx gives "unsupported certificate purpose" for a client certificate from an iPad, but the same cert works fine on desktop browsers?

Bounty: 50

Our company’s web application uses client certificates to authenticate. We want to add some iPad clients to the mix for inventory counting, etc. Client certificate authentication is working just fine in desktop browsers, but when we use the exact same certificate that works in a desktop browser on an iPad, we get this error in nginx:

7200#7200: *2 client SSL certificate verify error: (26:unsupported certificate purpose) while reading client request headers

Nginx returns a 400 bad request “The SSL Certificate Error” to the iPad client.

The CA public cert and intermediate CA cert is installed on the iPad, and installed on the server as well. Again, client certificate authentication works just fine for desktop browsers with our setup.

Is this an iPad problem, an nginx problem, or a certificate problem? And how can we troubleshoot and solve it?

Updating with more information:

openssl x509 -purpose for the cert used to create the pkcs file is:

Certificate purposes:
SSL client : Yes
SSL client CA : No
SSL server : Yes
SSL server CA : No
Netscape SSL server : Yes
Netscape SSL server CA : No
S/MIME signing : Yes
S/MIME signing CA : No
S/MIME encryption : Yes
S/MIME encryption CA : No
CRL signing : Yes
CRL signing CA : No
Any Purpose : Yes
Any Purpose CA : Yes
OCSP helper : Yes
OCSP helper CA : No
Time Stamp signing : No
Time Stamp signing CA : No

… which appears correct.

The command used to create the pkcs file is:

openssl pkcs12 -export -out file.pk12 -inkey file.key -in file.crt -nodes -passout pass:mypassword

The iPad install profile dialog claims the Identity Certificate is not signed, but lets me install it.

Update 2

Possible clue:

When you view the certificate details on the iPad after it is installed, the iPad says “signed by” and lists the certificates own name. When you view the certificate in Firefox, Firefox shows the correct CA in the Issued By field. I’m not sure if this is an iPad glitch or the certificate isn’t signed right.

Here’s the exact code (with file names simplified) used to create and sign the certificates:

openssl genrsa -out file.key 4096

openssl req -new -key file.key -out file.csr -subj "$DN"

openssl x509 -req -days 365 -in file.csr -CA ca.crt -CAkey ca.key -set_serial $SerialNumber -out file.crt

openssl pkcs12 -export -out file.pk12 -inkey file.key -in file.crt -certfile ca.pem -nodes -passout pass:secret 2>&1

Notes: $DN and $SerialNumber are generated by PHP and are omitted here. ca.pem is the certificate authority’s key and public cert combined into one file.


Get this bounty!!!

#StackBounty: GameCenter Leaderboard will not update after release

Bounty: 50

GameCenter has been working fine before release when updating the high scores. Now, it has been over 24 hours and the highscores will not update at all. Instead, it only shows my score in “Today” and does not share it with anyone nor can I see anyone else’s score although they have played the game.

Prior to the release it worked fine.

Here is what I have done,

Enabled GameCenter in Xcode

enter image description here

Created the Leaderboard in iTunes Connect

enter image description here

Enabled Leaderboard for App

enter image description here

Added correct methods to authenticate player & show leaderboard

enter image description here

Added correct methods to send scores

enter image description here

It all worked in the app prior to launch and updated scores to everyone. Now it just updates scores for that one person with their own score.

I have even deleted my own scores within iTunes Connect and it will not update on any devices and just keeps the score prior to deleting.

This is the Today section even after many people played

enter image description here

This is how All Time looks, it has not updated once since release

enter image description here

There are multiple questions like this but are not recent and deal with the sandbox (which was eliminated) and everything seems correct

Is there a crucial step I am missing? Are Apple’s servers down? Does it just take very long for new apps to update leaderboards?


Get this bounty!!!