1. 3223fac Compile when openssl is not enabled by Pascal Bühler · 8 years ago
  2. 796e008 Revert code style as requested in #188 & #185 by Pascal Bühler · 8 years ago
  3. 97ba021 add AES-GCM to DTLS-SRTP Protection Profiles by Alexander Traud · 8 years ago
  4. 29c6509 Merge pull request #224 from rsith71/mkiSupport by Pascal Bühler · 8 years ago
  5. 626e9e8 Apply some formatting nits by Geir Istad · 8 years ago
  6. 8104c7c Merge pull request #234 from pabuhler/exspose-ssrc-in-event-data by Pascal Bühler · 8 years ago
  7. 43186e7 remove ismacrypt references from code by Pascal Bühler · 8 years ago
  8. 5cd58c0 Addressing code review comments by Ryan Hooper · 8 years ago
  9. ab0345b Updated the srtp function to get the protected length added by LibSRTP via code review comments by Ryan Hooper · 8 years ago
  10. 5c9e1c4 Merge branch 'master' into mkiSupport by Pascal Bühler · 8 years ago
  11. f38d893 Moving the key limit structure to part of the Session Keys by Ryan Hooper · 8 years ago
  12. 04eeef8 Updating code base off of code review comments by Ryan Hooper · 8 years ago
  13. 8482bcc Use OPENSSL_cleanse() to set memory to zero, else use srtp_cleanse() by Geir Istad · 8 years ago
  14. f15c7e0 Report ssrc instead of srtp_stream_t in srtp_event_data_t by Pascal Bühler · 8 years ago
  15. def537a Fixing memory leak found in code review by Ryan Hooper · 8 years ago
  16. bac6076 Fixing issue where RTCP is not encrypted but only authenticated by AES GCM by Ryan Hooper · 8 years ago
  17. 89a288b Made the Master Keys Dynamic instead of caping them at only 4 master keys. Also kept key around in the policy to keep as much backward compatiblity as possible by Ryan Hooper · 8 years ago
  18. fe5d8b8 Apply MKI Support Patch by Ryan Hooper · 8 years ago
  19. 155ec97 Fix issue #220: No consistency when use some srtp_* functions. by bozho · 8 years ago
  20. f62a561 Add "srtp_" namespace prefix to auth functions, function pointer types, and enum values. by Jonathan Lennox · 8 years ago
  21. 1a7004b Merge pull request #191 from traud/master_ssrc_debug by Paul E. Jones · 8 years ago
  22. 36bb3e2 on debug, output correct endianness of SSRC by Alexander Traud · 8 years ago
  23. 078df39 Add a length check before reading packet data. by Katriel Cohn-Gordon · 8 years ago
  24. da852b0 Resolve issue 37 by always using BE byte ordering of the RTCP trailer. Note, this commit will break backwards compatibility of RTCP protection when an AEAD profile is used. by jfigus · 9 years ago
  25. 23c7c24 Merge pull request #136 from fancycode/unprotect_empty_payload by John Foley · 9 years ago
  26. 8494490 Add static qualifier to srtp_stream_free(). Allow compiler optimization to decide if this should be inlined. by jfigus · 9 years ago
  27. dae5325 Allow empty payloads when unprotecting. by Joachim Bauch · 9 years ago
  28. 985769a Release memory for custom header extension encryption kdf. by Joachim Bauch · 9 years ago
  29. f3965b4 Move code to release partially allocated stream to own function. by Joachim Bauch · 9 years ago
  30. fb0bd87 Fix build breakage due to last PR. by jfigus · 9 years ago
  31. ce37ef6 Merge pull request #128 from fancycode/header_extensions_encryption by John Foley · 9 years ago
  32. da33987 Decrypt headers after payload has been decrypted (and authenticated). by Joachim Bauch · 9 years ago
  33. c1fc2ba Prevent overflows when encrypting extensions headers. by Joachim Bauch · 9 years ago
  34. 102da17 Fix potential memleak introduced with srtp_update by Pascal Bühler · 9 years ago
  35. e0fb3df RTCP index should not be reset when updating / rekeying by Pascal Bühler · 9 years ago
  36. fa1e8c2 Implement header extensions encryption for packets encrypted with GCM ciphers. by Joachim Bauch · 9 years ago
  37. 2e95530 Allow zero payload packets to pass bounds check. by jfigus · 9 years ago
  38. 49848d1 Fix error handling and clean-up compiler warning in recently added stream update logic. by jfigus · 9 years ago
  39. 0380bf4 Check length of encrypted payload length of packet prior to encrypting to prevent overrun when hdr->cc contains malformed data. by jfigus · 9 years ago
  40. c6d347f Merge pull request #123 from pabuhler/srtp_rekey by John Foley · 9 years ago
  41. 99a7482 Support header extensions encryption (RFC 6904). by Joachim Bauch · 9 years ago
  42. 3444c4b Update too strict bounds checks introduced in 2583150. by Joachim Bauch · 9 years ago
  43. 356f1cd Refactor srtp_update_stream based on code review by Pascal Bühler · 9 years ago
  44. bd3112a Add srtp_update functions by Pascal Bühler · 9 years ago
  45. 2583150 Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC count and extension header length. Credit goes to Randell Jesup and the Firefox team for reporting this issue. by jfigus · 9 years ago
  46. 3c56180 Merge remote-tracking branch 'upstream/master' by persmule · 9 years ago
  47. bfec1cd * remove const-correctness on iv-related variables, since aes_gcm_ossl needs iv to be writable. by persmule · 9 years ago
  48. 9bdcfc7 Prevent buffer overflow when clearing srtp_kdf_t by Pascal Bühler · 9 years ago
  49. 8301c36 Clear 'session' if 'srtp_create' fails. by Joachim Bauch · 9 years ago
  50. 038d2cf Add support for using OpenSSL SRTP KDF algorithm. This work was originally done by Barry Fussell, but has been adapted to the latest libsrtp. Added new configure option called --enable-openssl-kdf to enable this feature. Also added new configure option to specify the location of the OpenSSL directory (--with-openssl-dir). Lastly, this commit updates config_in.h (via autoheader). by jfigus · 10 years ago
  51. 7d67ce5 Sync latest from master by jfigus · 10 years ago
  52. 25a0e6c Added explicit casts, fixed compiler warnings on MSVC. by Joachim Bauch · 10 years ago
  53. 724bb29 Fix merge damage. by jfigus · 10 years ago
  54. 72b1a81 Merge lastest from master. by jfigus · 10 years ago
  55. 557a787 Additional header check from Chromium. by Joachim Bauch · 10 years ago
  56. 226ec56 Finish refactoring of cipher.h API. by jfigus · 10 years ago
  57. 0d99b71 More refactoring of internal cipher API. Eliminate usage of void* in set_iv function. by jfigus · 10 years ago
  58. 3f93c3c More refactoring of internal cipher API. by jfigus · 10 years ago
  59. 2964a15 Refactor cipher encrypt API. by jfigus · 10 years ago
  60. de8deb3 Rename replay functions to comply with library name. by jfigus · 10 years ago
  61. 02d6f03 Rename error functions to comply with library name. by jfigus · 10 years ago
  62. 92736bc Rename crypto kernel functions to comply with library name. by jfigus · 10 years ago
  63. a6cf208 Remove support for --enable-kernel-linux option. by jfigus · 10 years ago
  64. 67b9c73 Rename crypto type defines. Removed unused defines and also removed some obsolete unit test code in srtp_driver. by jfigus · 10 years ago
  65. c7cdc9a Rename key limit functions to comply with library name. by jfigus · 10 years ago
  66. 9a84043 Rename cipher functions to comply with library name. by jfigus · 10 years ago
  67. 8f66972 Rename auth functions to comply with library name. by jfigus · 10 years ago
  68. ed755f5 Rename alloc functions to comply with library name. by jfigus · 10 years ago
  69. 46d6b47 Refactor debug API so app layer doesn't need to include crypto_kernel.h. Removed unused hex utils from libsrtp.a and moved them to the app layer. by jfigus · 10 years ago
  70. 267956d Remove obsoleted xfm.h. Remove doxygen directive for non-public defines. Add null/null policy helper to be used with rtpw. by jfigus · 10 years ago
  71. c5887e7 Continue the effort to rename API entry points so that all functions, structs, and defines begin with srtp_. by jfigus · 10 years ago
  72. 857009c Rename all public functions, types, and defines to begin with srtp_ prefix to comply with modern library coding convention. by jfigus · 10 years ago
  73. a9ac898 Begin header file refactoring. This is a work-in-progress. by jfigus · 10 years ago
  74. d4e3eec Declare as const char when use of literal strings by Christian Oien · 10 years ago
  75. b2edbef Return 0 when the version string can not be properly parsed. by jfigus · 10 years ago
  76. f62b64d Add support to return the library version number and string via the API. by jfigus · 10 years ago
  77. 6cffe24 Remove config.h from public headers and include it in non-header files instead by Teerapap Changwichukarn · 10 years ago
  78. 241fec3 Add srtp_set_user_data() and srtp_get_user_data() functions. by Iñaki Baz Castillo · 10 years ago
  79. e896bf7 Validate passed in signed length value (again) by Travis Cross · 10 years ago
  80. 73e3093 Moved packet length sanity check until after we've derived the expected tag length based on the session context. This resolves the compiler warning due to tag_len being used uninitialized. by jfigus · 10 years ago
  81. 3184400 Use `unsigned int` internally for `pkt_octet_len` by Travis Cross · 10 years ago
  82. 444a544 Validate passed in signed length value by Travis Cross · 10 years ago
  83. 1b8b1e7 Say `unsigned int` rather than `unsigned` by Travis Cross · 10 years ago
  84. dee3ee8 Simplify calculation of encrypted octet length by Travis Cross · 10 years ago
  85. 7d4c103 Fix cast to include entire expression by Travis Cross · 10 years ago
  86. 83439f7 Fix calculation of RTP/SRTP packet end address by Travis Cross · 10 years ago
  87. 8ba46eb Avoid buffer-overflow on short RTCP/SRTCP packets by Travis Cross · 10 years ago
  88. 3600c27 Avoid buffer over-read on null cipher AEAD by Travis Cross · 10 years ago
  89. fe36761 Prevent buffer overflow from untrusted RTP/SRTP lengths by Travis Cross · 10 years ago
  90. c13c100 Add support for 16-byte auth tag for AES GCM mode. by jfigus · 11 years ago
  91. 8719f95 This commit resolves issue #46. The GCM mode was using the wrong master SALT length. The master SALT should be 96 bits instead of 112 bits. Note, GCM mode uses the legacy CTR mode for the KDF. The legagacy CTR mode cipher implementations assume a 112 bit SALT. Changes to the cipher abstraction layer API are required to provide the ability to specify the SALT length. For now this commit modifies the SRTP layer to ensure the SALT is zero-appended before initializing the KDF. This commit also provides public definitions for the GCM cipher suite master key sizes to avoid confusion for application developers. by jfigus · 11 years ago
  92. 367d5d3 - fixed read of memory out of 'seq' variable bounds by Dmitry Sobinov · 11 years ago
  93. ffa134d Sync latest changes from master. by jfigus · 11 years ago
  94. 8c36da2 Add support for [draft-ietf-avtcore-srtp-aes-gcm-07] by jfigus · 11 years ago
  95. 7882dd9 Add AES-GCM crypto engine that leverages OpenSSL. by jfigus · 11 years ago
  96. 0acbb03 Undo the changes to the RTCP profile helper function. The prior commit was not compliant with RFC 3711. by jfigus · 11 years ago
  97. 8e47faf Fix 32-bit tag policies to use correct profile. by jfigus · 11 years ago
  98. 8884f4d Remove double-invocations to prevent buffer-overflow vulnerability. by jfigus · 11 years ago
  99. 4986a36 Security fix to not ignore of RTCP encryption, if required by TV Sriram · 12 years ago
  100. c0f1f1b Call debug_print for key and salt values separately, for both SRTP and SRTCP, by Jonathan Lennox · 13 years ago