summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_srtp.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Hide all public symbols in libsslbeck2023-07-081-1/+5
| | | | | | With the guentherizer 9000 ok tb@
* Make internal header file names consistenttb2022-11-261-3/+3
| | | | | | | | | | | | | | | | Libcrypto currently has a mess of *_lcl.h, *_locl.h, and *_local.h names used for internal headers. Move all these headers we inherited from OpenSSL to *_local.h, reserving the name *_internal.h for our own code. Similarly, move dtls_locl.h and ssl_locl.h to dtls_local and ssl_local.h. constant_time_locl.h is moved to constant_time.h since it's special. Adjust all .c files in libcrypto, libssl and regress. The diff is mechanical with the exception of tls13_quic.c, where #include <ssl_locl.h> was fixed manually. discussed with jsing, no objection bcook
* Get rid of SSL_CTX_INTERNAL and SSL_INTERNAL.jsing2022-10-021-8/+8
| | | | | | | | These are no longer necessary due to SSL_CTX and SSL now being fully opaque. Merge SSL_CTX_INTERNAL back into SSL_CTX and SSL_INTERNAL back into SSL. Prompted by tb@
* Error check for sk_push in libsslinoguchi2022-01-281-2/+5
| | | | | | CID 24838 comment and ok tb@
* add AES-GCM constants from RFC 7714 for SRTPlandry2021-06-111-1/+9
| | | | | | | | | | SRTP_AEAD_AES_128_GCM/SRTP_AEAD_AES_256_GCM can be used as DTLS-SRTP protection profiles - seen with an update of telephony/baresip i'm working on. adapted from openssl commit 43e5faa2539ae8aae6ef55be2239b9b1a77fea45 ok tb@ jsing@
* Move DTLS structs/definitions/prototypes to dtls_locl.h.jsing2021-05-161-3/+3
| | | | | | | | Now that the DTLS structs are opaque, add a dtls_locl.h header and move internal-only structs from dtls1.h, along with prototypes from ssl_locl.h. Only pull this header in where DTLS code actually exists. ok inoguchi@ tb@
* Explicitly include <openssl/opensslconf.h> in files using OPENSSL_NO_*jsing2021-05-161-1/+2
| | | | | | Where a file references to OPENSSL_NO_* conditions, ensure that we explicitly include <openssl/opensslconf.h> before any references, rather than relying on another header to pull this in.
* Make profile_name const in srtp_find_profile_by_name()tb2020-10-111-5/+3
| | | | | | | | There is no reason (and there never was any) for profile_name to be non-const, it was always just passed to strncmp(). Changing this allows removing an ugly instance of casting away const. ok guenther jsing
* Constipate srtp_known_profiles, pushing it into .data.rel.roguenther2020-10-111-9/+10
| | | | ok tb@ jsing@
* Consistently spell 'unsigned' as 'unsigned int', as style(9) seemstb2020-03-161-3/+4
| | | | | | | | | to prefer that. No binary change except in d1_srtp.c where the generated assembly differs only in line numbers (due to a wrapped long line) and in s3_cbc.c where there is no change in the generated assembly. ok inoguchi jsing
* Avoid leak: free existing SRTP connection profiles beforetb2018-11-091-1/+2
| | | | | | setting it. From Ben L <bobsayshilol () live ! co ! uk>.
* Rewrite SRTP extension using CBB/CBS and the new extension framework.doug2017-08-271-214/+6
| | | | input + ok beck@, jsing@
* Change SSLerror() back to taking two args, with the first one being an SSL *.beck2017-02-071-16/+16
| | | | | | | | | Make a table of "function codes" which maps the internal state of the SSL * to something like a useful name so in a typical error in the connection you know in what sort of place in the handshake things happened. (instead of by arcane function name). Add SSLerrorx() for when we don't have an SSL * ok jsing@ after us both being prodded by bluhm@ to make it not terrible
* Finish the fallout of the SSLerr->SSLerror cleanup to get rid of the uglybeck2017-01-261-31/+16
| | | | line wraps that resulted
* Send the error function codes to rot in the depths of hell where they belongbeck2017-01-261-16/+16
| | | | | | | We leave a single funciton code (0xFFF) to say "SSL_internal" so the public API will not break, and we replace all internal use of the two argument SSL_err() with the internal only SSL_error() that only takes a reason code. ok jsing@
* sk_free() checks for NULL so do not bother doing it from the callers.jsing2017-01-241-3/+2
|
* Move a large part of ssl_st into internal, so we can see what squeals.beck2017-01-231-9/+9
| | | | ok jsing@
* Move most of the fields in SSL_CTX to internal - the ones that remain arejsing2017-01-231-4/+4
| | | | | | known to be in use. ok beck@
* Fix SRTP parsing.doug2015-07-311-3/+2
| | | | | | | jsing@ noticed that during the CBS conversion, an extra CBS_len comparison was introduced. It should be 0 after extracting MKI. ok jsing@ bcook@ deraadt@
* Convert ssl_parse_serverhello_use_srtp_ext to CBS.doug2015-07-171-10/+15
| | | | ok miod@ jsing@
* test for n<0 before use in CBS_init - mostly to shut up coverity.beck2015-07-151-4/+9
| | | | reluctant ok miod@
* Convert ssl_parse_clienthello_use_srtp_ext to CBS.doug2015-07-141-40/+23
| | | | ok miod@ jsing@
* Remove trailing whitespace.jsing2014-12-141-9/+9
|
* Avoid a double-free in an error path.jsing2014-11-271-2/+1
| | | | | | Reported by Felix Groebert of the Google Security Team. ok beck@ miod@
* Sort and group includes.jsing2014-11-161-1/+3
|
* Fix memory leak upon error in ssl_parse_clienthello_use_srtp_ext().miod2014-07-141-6/+6
| | | | From BoringSSL.
* More KNF.jsing2014-06-291-32/+49
|
* Fix 2 memory leaks.logan2014-06-281-1/+3
| | | | | | (Thanks to Brent Cook) OK from tedu@
* tags as requested by miod and teduderaadt2014-06-121-1/+1
|
* remove some #if 0 code. we don't need any more reminders that we're usingtedu2014-05-301-10/+0
| | | | a not quite appropriate data structure. ok jsing
* More KNF and style consistency tweaksguenther2014-04-191-9/+9
|
* First pass at applying KNF to the OpenSSL code, which almost makes itjsing2014-04-141-260/+237
| | | | | readable. This pass is whitespace only and can readily be verified using tr and md5.
* Import OpenSSL 1.0.1gmiod2014-04-131-2/+3
|
* import OpenSSL-1.0.1cdjm2012-10-131-0/+493