1. da852b0 Resolve issue 37 by always using BE byte ordering of the RTCP trailer. Note, this commit will break backwards compatibility of RTCP protection when an AEAD profile is used. by jfigus · 9 years ago
  2. 23c7c24 Merge pull request #136 from fancycode/unprotect_empty_payload by John Foley · 9 years ago
  3. 8494490 Add static qualifier to srtp_stream_free(). Allow compiler optimization to decide if this should be inlined. by jfigus · 9 years ago
  4. dae5325 Allow empty payloads when unprotecting. by Joachim Bauch · 9 years ago
  5. 985769a Release memory for custom header extension encryption kdf. by Joachim Bauch · 9 years ago
  6. f3965b4 Move code to release partially allocated stream to own function. by Joachim Bauch · 9 years ago
  7. fb0bd87 Fix build breakage due to last PR. by jfigus · 9 years ago
  8. ce37ef6 Merge pull request #128 from fancycode/header_extensions_encryption by John Foley · 9 years ago
  9. da33987 Decrypt headers after payload has been decrypted (and authenticated). by Joachim Bauch · 9 years ago
  10. c1fc2ba Prevent overflows when encrypting extensions headers. by Joachim Bauch · 9 years ago
  11. 102da17 Fix potential memleak introduced with srtp_update by Pascal Bühler · 9 years ago
  12. e0fb3df RTCP index should not be reset when updating / rekeying by Pascal Bühler · 9 years ago
  13. fa1e8c2 Implement header extensions encryption for packets encrypted with GCM ciphers. by Joachim Bauch · 9 years ago
  14. 2e95530 Allow zero payload packets to pass bounds check. by jfigus · 9 years ago
  15. 49848d1 Fix error handling and clean-up compiler warning in recently added stream update logic. by jfigus · 9 years ago
  16. 0380bf4 Check length of encrypted payload length of packet prior to encrypting to prevent overrun when hdr->cc contains malformed data. by jfigus · 9 years ago
  17. c6d347f Merge pull request #123 from pabuhler/srtp_rekey by John Foley · 9 years ago
  18. 99a7482 Support header extensions encryption (RFC 6904). by Joachim Bauch · 9 years ago
  19. 3444c4b Update too strict bounds checks introduced in 2583150. by Joachim Bauch · 9 years ago
  20. 356f1cd Refactor srtp_update_stream based on code review by Pascal Bühler · 9 years ago
  21. bd3112a Add srtp_update functions by Pascal Bühler · 9 years ago
  22. 2583150 Prevent potential DoS attack due to lack of bounds checking on RTP header CSRC count and extension header length. Credit goes to Randell Jesup and the Firefox team for reporting this issue. by jfigus · 9 years ago
  23. 3c56180 Merge remote-tracking branch 'upstream/master' by persmule · 9 years ago
  24. bfec1cd * remove const-correctness on iv-related variables, since aes_gcm_ossl needs iv to be writable. by persmule · 9 years ago
  25. 9bdcfc7 Prevent buffer overflow when clearing srtp_kdf_t by Pascal Bühler · 9 years ago
  26. 8301c36 Clear 'session' if 'srtp_create' fails. by Joachim Bauch · 9 years ago
  27. 038d2cf Add support for using OpenSSL SRTP KDF algorithm. This work was originally done by Barry Fussell, but has been adapted to the latest libsrtp. Added new configure option called --enable-openssl-kdf to enable this feature. Also added new configure option to specify the location of the OpenSSL directory (--with-openssl-dir). Lastly, this commit updates config_in.h (via autoheader). by jfigus · 9 years ago
  28. 7d67ce5 Sync latest from master by jfigus · 9 years ago
  29. 25a0e6c Added explicit casts, fixed compiler warnings on MSVC. by Joachim Bauch · 9 years ago
  30. 724bb29 Fix merge damage. by jfigus · 10 years ago
  31. 72b1a81 Merge lastest from master. by jfigus · 10 years ago
  32. 557a787 Additional header check from Chromium. by Joachim Bauch · 10 years ago
  33. 226ec56 Finish refactoring of cipher.h API. by jfigus · 10 years ago
  34. 0d99b71 More refactoring of internal cipher API. Eliminate usage of void* in set_iv function. by jfigus · 10 years ago
  35. 3f93c3c More refactoring of internal cipher API. by jfigus · 10 years ago
  36. 2964a15 Refactor cipher encrypt API. by jfigus · 10 years ago
  37. de8deb3 Rename replay functions to comply with library name. by jfigus · 10 years ago
  38. 02d6f03 Rename error functions to comply with library name. by jfigus · 10 years ago
  39. 92736bc Rename crypto kernel functions to comply with library name. by jfigus · 10 years ago
  40. a6cf208 Remove support for --enable-kernel-linux option. by jfigus · 10 years ago
  41. 67b9c73 Rename crypto type defines. Removed unused defines and also removed some obsolete unit test code in srtp_driver. by jfigus · 10 years ago
  42. c7cdc9a Rename key limit functions to comply with library name. by jfigus · 10 years ago
  43. 9a84043 Rename cipher functions to comply with library name. by jfigus · 10 years ago
  44. 8f66972 Rename auth functions to comply with library name. by jfigus · 10 years ago
  45. ed755f5 Rename alloc functions to comply with library name. by jfigus · 10 years ago
  46. 5a2b2d0 Rename functions to comply with library name. Fixed various code style issues. by jfigus · 10 years ago
  47. 46d6b47 Refactor debug API so app layer doesn't need to include crypto_kernel.h. Removed unused hex utils from libsrtp.a and moved them to the app layer. by jfigus · 10 years ago
  48. 267956d Remove obsoleted xfm.h. Remove doxygen directive for non-public defines. Add null/null policy helper to be used with rtpw. by jfigus · 10 years ago
  49. c5887e7 Continue the effort to rename API entry points so that all functions, structs, and defines begin with srtp_. by jfigus · 10 years ago
  50. 857009c Rename all public functions, types, and defines to begin with srtp_ prefix to comply with modern library coding convention. by jfigus · 10 years ago
  51. a9ac898 Begin header file refactoring. This is a work-in-progress. by jfigus · 10 years ago
  52. d4e3eec Declare as const char when use of literal strings by Christian Oien · 10 years ago
  53. b2edbef Return 0 when the version string can not be properly parsed. by jfigus · 10 years ago
  54. f62b64d Add support to return the library version number and string via the API. by jfigus · 10 years ago
  55. 6cffe24 Remove config.h from public headers and include it in non-header files instead by Teerapap Changwichukarn · 10 years ago
  56. 241fec3 Add srtp_set_user_data() and srtp_get_user_data() functions. by Iñaki Baz Castillo · 10 years ago
  57. e896bf7 Validate passed in signed length value (again) by Travis Cross · 10 years ago
  58. 73e3093 Moved packet length sanity check until after we've derived the expected tag length based on the session context. This resolves the compiler warning due to tag_len being used uninitialized. by jfigus · 10 years ago
  59. 3184400 Use `unsigned int` internally for `pkt_octet_len` by Travis Cross · 10 years ago
  60. 444a544 Validate passed in signed length value by Travis Cross · 10 years ago
  61. 1b8b1e7 Say `unsigned int` rather than `unsigned` by Travis Cross · 10 years ago
  62. dee3ee8 Simplify calculation of encrypted octet length by Travis Cross · 10 years ago
  63. 7d4c103 Fix cast to include entire expression by Travis Cross · 10 years ago
  64. 83439f7 Fix calculation of RTP/SRTP packet end address by Travis Cross · 10 years ago
  65. 8ba46eb Avoid buffer-overflow on short RTCP/SRTCP packets by Travis Cross · 10 years ago
  66. 3600c27 Avoid buffer over-read on null cipher AEAD by Travis Cross · 10 years ago
  67. fe36761 Prevent buffer overflow from untrusted RTP/SRTP lengths by Travis Cross · 10 years ago
  68. c13c100 Add support for 16-byte auth tag for AES GCM mode. by jfigus · 10 years ago
  69. 8719f95 This commit resolves issue #46. The GCM mode was using the wrong master SALT length. The master SALT should be 96 bits instead of 112 bits. Note, GCM mode uses the legacy CTR mode for the KDF. The legagacy CTR mode cipher implementations assume a 112 bit SALT. Changes to the cipher abstraction layer API are required to provide the ability to specify the SALT length. For now this commit modifies the SRTP layer to ensure the SALT is zero-appended before initializing the KDF. This commit also provides public definitions for the GCM cipher suite master key sizes to avoid confusion for application developers. by jfigus · 10 years ago
  70. 367d5d3 - fixed read of memory out of 'seq' variable bounds by Dmitry Sobinov · 10 years ago
  71. ffa134d Sync latest changes from master. by jfigus · 11 years ago
  72. 8c36da2 Add support for [draft-ietf-avtcore-srtp-aes-gcm-07] by jfigus · 11 years ago
  73. 7882dd9 Add AES-GCM crypto engine that leverages OpenSSL. by jfigus · 11 years ago
  74. 0acbb03 Undo the changes to the RTCP profile helper function. The prior commit was not compliant with RFC 3711. by jfigus · 11 years ago
  75. 8e47faf Fix 32-bit tag policies to use correct profile. by jfigus · 11 years ago
  76. 8884f4d Remove double-invocations to prevent buffer-overflow vulnerability. by jfigus · 11 years ago
  77. e4bba71 Merge branch 'master' into feature-openssl by Cullen Jennings · 11 years ago
  78. e4a506f remove unwanted code by TV Sriram · 11 years ago
  79. 4986a36 Security fix to not ignore of RTCP encryption, if required by TV Sriram · 11 years ago
  80. 0d3a268 Add support for OpenSSL based HMAC implementation, which optionally replaces the native HMAC/SHA1 implementation. This commit also fixes some problems with the test apps when OpenSSL support is configured into the library. by jfigus · 11 years ago
  81. c0f1f1b Call debug_print for key and salt values separately, for both SRTP and SRTCP, by Jonathan Lennox · 12 years ago
  82. e2774db Fix inline functions when compiling as C99. by Jonathan Lennox · 13 years ago
  83. 23dc1e2 Patch from Jaap Keuter: by Jonathan Lennox · 14 years ago
  84. 20505b3 Fix memory corruption if the first stream in a session is removed. (Bug by Jonathan Lennox · 14 years ago
  85. 75b3687 Fix warnings exposed by gcc -Wcast-qual and -Wshadow. by Jonathan Lennox · 14 years ago
  86. f433241 Check cipher->type->id to determine whether a cipher is AES_ICM, rather than by Jonathan Lennox · 14 years ago
  87. 5df951a Add AES-256 support. by Jonathan Lennox · 14 years ago
  88. 507c03f Change core crypto/cipher/aes.c APIs, in preparation for big-aes support: by Jonathan Lennox · 14 years ago
  89. 1c93fd7 Call cipher_set_iv, rather than aes_icm_set_iv, when setting IV for by Jonathan Lennox · 14 years ago
  90. 953f46f Don't hard-code aes_icm cipher in SRTP KDF; instead, fetch cipher from crypto_kernel. by Jonathan Lennox · 14 years ago
  91. dcee5c6 Add allow_repeat_tx parameter to srtp_policy_t, allowing a sender to perform by Jonathan Lennox · 14 years ago
  92. a1242f8 Add support for user-selectable srtp window size, as a parameter in srtp_policy_t. by Jonathan Lennox · 14 years ago
  93. d8d5cd0 Update references to Internet-Drafts to refer to their published RFCs instead. by Jonathan Lennox · 14 years ago
  94. 5ae7633 Add srtp_shutdown function, to free state associcated with libsrtp. by Jonathan Lennox · 14 years ago
  95. 7ef6ab5 Make explicit C casts that narrow integer widths (avoid Visual Studio warning). by Jonathan Lennox · 14 years ago
  96. 80a3b12 Explicitly cast argument to aes_decrypt_with_raw_key to (void*), to avoid warning on Visual Studio. by Jonathan Lennox · 14 years ago
  97. 2cb8b8e Avoid pointer arithmetic on void* (a GCC extension); use uint8_t* instead. by Jonathan Lennox · 14 years ago
  98. 7bc3c7c Initialize *stream_data (to NULL, for now) in ekt_alloc. Fixes a crash by Jonathan Lennox · 14 years ago
  99. cf0ddd4 EKT additions by David McGrew · 17 years ago
  100. 79870d6 initial EKT work by David McGrew · 17 years ago