summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_srtp.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb2020-03-161-3/+4
| | | | | | | | | to prefer that. No binary change except in d1_srtp.c where the generated assembly differs only in line numbers (due to a wrapped long line) and in s3_cbc.c where there is no change in the generated assembly. ok inoguchi jsing
* Avoid leak: free existing SRTP connection profiles beforetb2018-11-091-1/+2
| | | | | | setting it. From Ben L <bobsayshilol () live ! co ! uk>.
* Rewrite SRTP extension using CBB/CBS and the new extension framework.doug2017-08-271-214/+6
| | | | input + ok beck@, jsing@
* Change SSLerror() back to taking two args, with the first one being an SSL *.beck2017-02-071-16/+16
| | | | | | | | | Make a table of "function codes" which maps the internal state of the SSL * to something like a useful name so in a typical error in the connection you know in what sort of place in the handshake things happened. (instead of by arcane function name). Add SSLerrorx() for when we don't have an SSL * ok jsing@ after us both being prodded by bluhm@ to make it not terrible
* Finish the fallout of the SSLerr->SSLerror cleanup to get rid of the uglybeck2017-01-261-31/+16
| | | | line wraps that resulted
* Send the error function codes to rot in the depths of hell where they belongbeck2017-01-261-16/+16
| | | | | | | We leave a single funciton code (0xFFF) to say "SSL_internal" so the public API will not break, and we replace all internal use of the two argument SSL_err() with the internal only SSL_error() that only takes a reason code. ok jsing@
* sk_free() checks for NULL so do not bother doing it from the callers.jsing2017-01-241-3/+2
|
* Move a large part of ssl_st into internal, so we can see what squeals.beck2017-01-231-9/+9
| | | | ok jsing@
* Move most of the fields in SSL_CTX to internal - the ones that remain arejsing2017-01-231-4/+4
| | | | | | known to be in use. ok beck@
* Fix SRTP parsing.doug2015-07-311-3/+2
| | | | | | | jsing@ noticed that during the CBS conversion, an extra CBS_len comparison was introduced. It should be 0 after extracting MKI. ok jsing@ bcook@ deraadt@
* Convert ssl_parse_serverhello_use_srtp_ext to CBS.doug2015-07-171-10/+15
| | | | ok miod@ jsing@
* test for n<0 before use in CBS_init - mostly to shut up coverity.beck2015-07-151-4/+9
| | | | reluctant ok miod@
* Convert ssl_parse_clienthello_use_srtp_ext to CBS.doug2015-07-141-40/+23
| | | | ok miod@ jsing@
* Remove trailing whitespace.jsing2014-12-141-9/+9
|
* Avoid a double-free in an error path.jsing2014-11-271-2/+1
| | | | | | Reported by Felix Groebert of the Google Security Team. ok beck@ miod@
* Sort and group includes.jsing2014-11-161-1/+3
|
* Fix memory leak upon error in ssl_parse_clienthello_use_srtp_ext().miod2014-07-141-6/+6
| | | | From BoringSSL.
* More KNF.jsing2014-06-291-32/+49
|
* Fix 2 memory leaks.logan2014-06-281-1/+3
| | | | | | (Thanks to Brent Cook) OK from tedu@
* tags as requested by miod and teduderaadt2014-06-121-1/+1
|
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-10/+0
| | | | a not quite appropriate data structure. ok jsing
* More KNF and style consistency tweaksguenther2014-04-191-9/+9
|
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-260/+237
| | | | | readable. This pass is whitespace only and can readily be verified using tr and md5.
* Import OpenSSL 1.0.1gmiod2014-04-131-2/+3
|
* import OpenSSL-1.0.1cdjm2012-10-131-0/+493