1. 8104c7c Merge pull request #234 from pabuhler/exspose-ssrc-in-event-data by Pascal Bühler · 8 years ago
  2. 43186e7 remove ismacrypt references from code by Pascal Bühler · 8 years ago
  3. 8482bcc Use OPENSSL_cleanse() to set memory to zero, else use srtp_cleanse() by Geir Istad · 8 years ago
  4. f15c7e0 Report ssrc instead of srtp_stream_t in srtp_event_data_t by Pascal Bühler · 8 years ago
  5. 155ec97 Fix issue #220: No consistency when use some srtp_* functions. by bozho · 8 years ago
  6. f62a561 Add "srtp_" namespace prefix to auth functions, function pointer types, and enum values. by Jonathan Lennox · 8 years ago
  7. 1a7004b Merge pull request #191 from traud/master_ssrc_debug by Paul E. Jones · 8 years ago
  8. 36bb3e2 on debug, output correct endianness of SSRC by Alexander Traud · 8 years ago
  9. 078df39 Add a length check before reading packet data. by Katriel Cohn-Gordon · 8 years ago
  10. da852b0 Resolve issue 37 by always using BE byte ordering of the RTCP trailer. Note, this commit will break backwards compatibility of RTCP protection when an AEAD profile is used. by jfigus · 9 years ago
  11. 23c7c24 Merge pull request #136 from fancycode/unprotect_empty_payload by John Foley · 9 years ago
  12. 8494490 Add static qualifier to srtp_stream_free(). Allow compiler optimization to decide if this should be inlined. by jfigus · 9 years ago
  13. dae5325 Allow empty payloads when unprotecting. by Joachim Bauch · 9 years ago
  14. 985769a Release memory for custom header extension encryption kdf. by Joachim Bauch · 9 years ago
  15. f3965b4 Move code to release partially allocated stream to own function. by Joachim Bauch · 9 years ago
  16. fb0bd87 Fix build breakage due to last PR. by jfigus · 9 years ago
  17. ce37ef6 Merge pull request #128 from fancycode/header_extensions_encryption by John Foley · 9 years ago
  18. da33987 Decrypt headers after payload has been decrypted (and authenticated). by Joachim Bauch · 9 years ago
  19. c1fc2ba Prevent overflows when encrypting extensions headers. by Joachim Bauch · 9 years ago
  20. 102da17 Fix potential memleak introduced with srtp_update by Pascal Bühler · 9 years ago
  21. e0fb3df RTCP index should not be reset when updating / rekeying by Pascal Bühler · 9 years ago
  22. fa1e8c2 Implement header extensions encryption for packets encrypted with GCM ciphers. by Joachim Bauch · 9 years ago
  23. 2e95530 Allow zero payload packets to pass bounds check. by jfigus · 9 years ago
  24. 49848d1 Fix error handling and clean-up compiler warning in recently added stream update logic. by jfigus · 9 years ago
  25. 0380bf4 Check length of encrypted payload length of packet prior to encrypting to prevent overrun when hdr->cc contains malformed data. by jfigus · 9 years ago
  26. c6d347f Merge pull request #123 from pabuhler/srtp_rekey by John Foley · 9 years ago
  27. 99a7482 Support header extensions encryption (RFC 6904). by Joachim Bauch · 9 years ago
  28. 3444c4b Update too strict bounds checks introduced in 2583150. by Joachim Bauch · 9 years ago
  29. 356f1cd Refactor srtp_update_stream based on code review by Pascal Bühler · 9 years ago
  30. bd3112a Add srtp_update functions by Pascal Bühler · 9 years ago
  31. 2583150 Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC count and extension header length. Credit goes to Randell Jesup and the Firefox team for reporting this issue. by jfigus · 9 years ago
  32. 3c56180 Merge remote-tracking branch 'upstream/master' by persmule · 9 years ago
  33. bfec1cd * remove const-correctness on iv-related variables, since aes_gcm_ossl needs iv to be writable. by persmule · 9 years ago
  34. 9bdcfc7 Prevent buffer overflow when clearing srtp_kdf_t by Pascal Bühler · 9 years ago
  35. 8301c36 Clear 'session' if 'srtp_create' fails. by Joachim Bauch · 9 years ago
  36. 038d2cf Add support for using OpenSSL SRTP KDF algorithm. This work was originally done by Barry Fussell, but has been adapted to the latest libsrtp. Added new configure option called --enable-openssl-kdf to enable this feature. Also added new configure option to specify the location of the OpenSSL directory (--with-openssl-dir). Lastly, this commit updates config_in.h (via autoheader). by jfigus · 9 years ago
  37. 7d67ce5 Sync latest from master by jfigus · 9 years ago
  38. 25a0e6c Added explicit casts, fixed compiler warnings on MSVC. by Joachim Bauch · 9 years ago
  39. 724bb29 Fix merge damage. by jfigus · 10 years ago
  40. 72b1a81 Merge lastest from master. by jfigus · 10 years ago
  41. 557a787 Additional header check from Chromium. by Joachim Bauch · 10 years ago
  42. 226ec56 Finish refactoring of cipher.h API. by jfigus · 10 years ago
  43. 0d99b71 More refactoring of internal cipher API. Eliminate usage of void* in set_iv function. by jfigus · 10 years ago
  44. 3f93c3c More refactoring of internal cipher API. by jfigus · 10 years ago
  45. 2964a15 Refactor cipher encrypt API. by jfigus · 10 years ago
  46. de8deb3 Rename replay functions to comply with library name. by jfigus · 10 years ago
  47. 02d6f03 Rename error functions to comply with library name. by jfigus · 10 years ago
  48. 92736bc Rename crypto kernel functions to comply with library name. by jfigus · 10 years ago
  49. a6cf208 Remove support for --enable-kernel-linux option. by jfigus · 10 years ago
  50. 67b9c73 Rename crypto type defines. Removed unused defines and also removed some obsolete unit test code in srtp_driver. by jfigus · 10 years ago
  51. c7cdc9a Rename key limit functions to comply with library name. by jfigus · 10 years ago
  52. 9a84043 Rename cipher functions to comply with library name. by jfigus · 10 years ago
  53. 8f66972 Rename auth functions to comply with library name. by jfigus · 10 years ago
  54. ed755f5 Rename alloc functions to comply with library name. by jfigus · 10 years ago
  55. 5a2b2d0 Rename functions to comply with library name. Fixed various code style issues. by jfigus · 10 years ago
  56. 46d6b47 Refactor debug API so app layer doesn't need to include crypto_kernel.h. Removed unused hex utils from libsrtp.a and moved them to the app layer. by jfigus · 10 years ago
  57. 267956d Remove obsoleted xfm.h. Remove doxygen directive for non-public defines. Add null/null policy helper to be used with rtpw. by jfigus · 10 years ago
  58. c5887e7 Continue the effort to rename API entry points so that all functions, structs, and defines begin with srtp_. by jfigus · 10 years ago
  59. 857009c Rename all public functions, types, and defines to begin with srtp_ prefix to comply with modern library coding convention. by jfigus · 10 years ago
  60. a9ac898 Begin header file refactoring. This is a work-in-progress. by jfigus · 10 years ago
  61. d4e3eec Declare as const char when use of literal strings by Christian Oien · 10 years ago
  62. b2edbef Return 0 when the version string can not be properly parsed. by jfigus · 10 years ago
  63. f62b64d Add support to return the library version number and string via the API. by jfigus · 10 years ago
  64. 6cffe24 Remove config.h from public headers and include it in non-header files instead by Teerapap Changwichukarn · 10 years ago
  65. 241fec3 Add srtp_set_user_data() and srtp_get_user_data() functions. by Iñaki Baz Castillo · 10 years ago
  66. e896bf7 Validate passed in signed length value (again) by Travis Cross · 10 years ago
  67. 73e3093 Moved packet length sanity check until after we've derived the expected tag length based on the session context. This resolves the compiler warning due to tag_len being used uninitialized. by jfigus · 10 years ago
  68. 3184400 Use `unsigned int` internally for `pkt_octet_len` by Travis Cross · 10 years ago
  69. 444a544 Validate passed in signed length value by Travis Cross · 10 years ago
  70. 1b8b1e7 Say `unsigned int` rather than `unsigned` by Travis Cross · 10 years ago
  71. dee3ee8 Simplify calculation of encrypted octet length by Travis Cross · 10 years ago
  72. 7d4c103 Fix cast to include entire expression by Travis Cross · 10 years ago
  73. 83439f7 Fix calculation of RTP/SRTP packet end address by Travis Cross · 10 years ago
  74. 8ba46eb Avoid buffer-overflow on short RTCP/SRTCP packets by Travis Cross · 10 years ago
  75. 3600c27 Avoid buffer over-read on null cipher AEAD by Travis Cross · 10 years ago
  76. fe36761 Prevent buffer overflow from untrusted RTP/SRTP lengths by Travis Cross · 10 years ago
  77. c13c100 Add support for 16-byte auth tag for AES GCM mode. by jfigus · 10 years ago
  78. 8719f95 This commit resolves issue #46. The GCM mode was using the wrong master SALT length. The master SALT should be 96 bits instead of 112 bits. Note, GCM mode uses the legacy CTR mode for the KDF. The legagacy CTR mode cipher implementations assume a 112 bit SALT. Changes to the cipher abstraction layer API are required to provide the ability to specify the SALT length. For now this commit modifies the SRTP layer to ensure the SALT is zero-appended before initializing the KDF. This commit also provides public definitions for the GCM cipher suite master key sizes to avoid confusion for application developers. by jfigus · 10 years ago
  79. 367d5d3 - fixed read of memory out of 'seq' variable bounds by Dmitry Sobinov · 10 years ago
  80. ffa134d Sync latest changes from master. by jfigus · 11 years ago
  81. 8c36da2 Add support for [draft-ietf-avtcore-srtp-aes-gcm-07] by jfigus · 11 years ago
  82. 7882dd9 Add AES-GCM crypto engine that leverages OpenSSL. by jfigus · 11 years ago
  83. 0acbb03 Undo the changes to the RTCP profile helper function. The prior commit was not compliant with RFC 3711. by jfigus · 11 years ago
  84. 8e47faf Fix 32-bit tag policies to use correct profile. by jfigus · 11 years ago
  85. 8884f4d Remove double-invocations to prevent buffer-overflow vulnerability. by jfigus · 11 years ago
  86. e4bba71 Merge branch 'master' into feature-openssl by Cullen Jennings · 11 years ago
  87. e4a506f remove unwanted code by TV Sriram · 11 years ago
  88. 4986a36 Security fix to not ignore of RTCP encryption, if required by TV Sriram · 11 years ago
  89. 0d3a268 Add support for OpenSSL based HMAC implementation, which optionally replaces the native HMAC/SHA1 implementation. This commit also fixes some problems with the test apps when OpenSSL support is configured into the library. by jfigus · 11 years ago
  90. c0f1f1b Call debug_print for key and salt values separately, for both SRTP and SRTCP, by Jonathan Lennox · 12 years ago
  91. e2774db Fix inline functions when compiling as C99. by Jonathan Lennox · 13 years ago
  92. 23dc1e2 Patch from Jaap Keuter: by Jonathan Lennox · 14 years ago
  93. 20505b3 Fix memory corruption if the first stream in a session is removed. (Bug by Jonathan Lennox · 14 years ago
  94. 75b3687 Fix warnings exposed by gcc -Wcast-qual and -Wshadow. by Jonathan Lennox · 14 years ago
  95. f433241 Check cipher->type->id to determine whether a cipher is AES_ICM, rather than by Jonathan Lennox · 14 years ago
  96. 5df951a Add AES-256 support. by Jonathan Lennox · 14 years ago
  97. 507c03f Change core crypto/cipher/aes.c APIs, in preparation for big-aes support: by Jonathan Lennox · 14 years ago
  98. 1c93fd7 Call cipher_set_iv, rather than aes_icm_set_iv, when setting IV for by Jonathan Lennox · 14 years ago
  99. 953f46f Don't hard-code aes_icm cipher in SRTP KDF; instead, fetch cipher from crypto_kernel. by Jonathan Lennox · 14 years ago
  100. dcee5c6 Add allow_repeat_tx parameter to srtp_policy_t, allowing a sender to perform by Jonathan Lennox · 14 years ago