Commit Graph

1010 Commits

Author SHA1 Message Date
Anthony Minessale
0150c862a2 FS-6854 #comment try this patch 2014-09-30 20:35:19 +05:00
Brian West
7c89c21153 FS-6860 #resolve this was fixed once but was lost in the last sync 2014-09-26 09:00:09 -05:00
Anthony Minessale
f7de058acd FS-6854 #resolve 2014-09-25 21:44:02 +05:00
Anthony Minessale
9e72c8477f fix possible buffer overrun in websocket uri and sync the ws.c between sofia and verto (missing code from last commit) 2014-09-24 01:09:44 +05:00
Anthony Minessale
59e71341db fix possible buffer overrun in websocket uri and sync the ws.c between sofia and verto 2014-09-23 20:17:20 +05:00
Travis Cross
3c32dd3bc9 Return NULL from sub_alloc for zero size
When zero was passed for the size to `sub_alloc`, we were passing this
size on to `malloc` or `calloc`, which is unusual enough that static
analyzers warn about this (POSIX says that either NULL or a pointer
will be returned).

We'll instead just return NULL right away.
2014-08-22 02:47:04 +00:00
Jeff Lenk
571cf932dc fix VS2010 build warning 2014-08-16 18:22:41 -05:00
Anthony Minessale
cbe0bc05d0 force sofia rebuild 2014-08-16 01:34:30 +05:00
Anthony Minessale
24413bfa11 copy changes from verto ws.c to sofia 2014-08-16 00:43:25 +05:00
Anthony Minessale
2411550727 add homer capture line to websocket transport 2014-08-11 21:02:25 +05:00
Travis Cross
8414c498cf Fix line endings per .gitattributes 2014-08-08 15:24:42 +00:00
Brian West
327146cecf Fix WS Compile on MSVC2012 2014-07-25 11:34:08 -05:00
Anthony Minessale
6c80281ce9 buffer websocket headers and body before sending to avoid fragmentation 2014-07-17 01:07:57 +05:00
Anthony Minessale
b53ba668fa rebuild 2014-07-12 04:39:56 +05:00
Anthony Minessale
cc75547672 merge ws.c change to sofia 2014-07-12 04:39:41 +05:00
Brian West
d2a487dce3 date would have done the same thing 2014-06-18 08:58:49 -05:00
Brian West
fb92ebc8f2 FS-5223 and FS-6603, don't trust docs... sheesh 2014-06-18 08:33:57 -05:00
Brian West
311889634b FS-5223 FS-6603 on platforms that have SO_REUSEPORT it also implies SO_REUSEADDR, On platforms that only have SO_REUSEADDR it seems to imply both in the absence of SO_REUSEPORT. 2014-06-17 21:15:02 -05:00
Anthony Minessale
0685027bd8 FS-6574 --resolve 2014-06-09 14:29:08 -04:00
Michael Jerris
b5a223cd1b CID:1215201 Explicit null dereferenced 2014-05-22 15:39:59 +00:00
Anthony Minessale
f0aa0fc1d8 seek chain cert from wss.pem just cat together the cert, the key and the chain cert into wss.pem 2014-05-20 23:18:38 +05:00
Michael Jerris
77bddb9f9c FS-6538: silence gcc 4.9 throwing incorrect warning 2014-05-20 15:46:46 +00:00
Anthony Minessale
af6c4b00b7 force sofia rebuild 2014-05-20 20:29:17 +05:00
Michael Jerris
f683ac2165 FS-6533: --resolve fix gcc 4.9 warning due to useless right-hand operand of comma expression 2014-05-19 10:36:02 -05:00
Anthony Minessale
88ce7dae1c minor tweak to make ws code work in blocking mode properly when used outside sofia 2014-05-07 06:13:27 +05:00
Natanael Copa
317f4b1442 Fix building with musl libc
POSIX says poll.h and signal.h should not be prefixed with sys/ (ie
poll.h instead of sys/poll.h)

limits.h also defines a TZNAME_MAX so we change name of the define for
spandsp.
2014-05-02 11:20:36 -04:00
Michael Jerris
906467b360 fix log message on sending tport ping over ws to log error in failure cases 2014-05-01 14:20:27 -04:00
Michael Jerris
cfd8d28bc8 silence clang unused function warnings and get rid of some unused functions 2014-05-01 09:03:19 -04:00
Michael Jerris
fc25bbc23c remove unused function 2014-05-01 08:32:23 -04:00
Michael Jerris
b55ba90def fix 2 potential use after free errors 2014-05-01 08:30:52 -04:00
Anthony Minessale
2cdae46b19 FS-6476 regression where sock would sometimes drop while reading logical frames 2014-04-29 18:25:05 -04:00
Anthony Minessale
61e22e8b50 FS-6476 --resolve 2014-04-22 23:25:41 +05:00
Anthony Minessale
cbd20d8a05 update 2014-04-17 04:33:02 +05:00
Anthony Minessale
bce51017fb FS-6462 --resolve
I found a problem here but it may not completely match your expectations.
I reviewed the RFC 4028 and checked against the code and I discovered we should not be putting a Min-SE in any response at all besides a 422:

section 5:

   The Min-SE header field MUST NOT be used in responses except for
   those with a 422 response code.  It indicates the minimum value of
   the session interval that the server is willing to accept.

I corrected this problem and implemented the 422 response so if you request a value lower than the minimum specified for the profile.
If the value is equal or higher to the minimum, it will be reflected in the Session-Expires header in the response and no Min-SE will be present.
2014-04-17 04:26:43 +05:00
Anthony Minessale
01254eaa5c force sofia rebuild 2014-04-04 13:42:49 -05:00
Anthony Minessale
180282cd9a FS-6287 2014-04-04 13:42:13 -05:00
Anthony Minessale
7ea4acaece FS-6426 --resolve 2014-04-03 23:25:48 +05:00
Michael Jerris
f50f04be51 FS-6356: --resolve fix assert when you set the time > 15 days in the future during operation while things are in queue to be processeed 2014-03-28 14:33:47 -04:00
Brian West
74ab9515a4 FS-6294 DragonFly requires this also. 2014-03-21 11:14:15 -05:00
Brian West
16577339be FS-6387 don't fail if your openssl package has been compiled without EC support...LOOKING AT YOU GENTOO 2014-03-20 08:07:53 -05:00
Brian West
c4c0f38aab FS-6294 FS-6308 NetBSD support should work test and report back please. 2014-03-19 14:34:07 -05:00
Brian West
c210510c15 FS-6375 bump sofia so it rebuilds 2014-03-18 17:44:05 -05:00
Brian West
f6d9027282 FS-6375 ifdef for sun in this case 2014-03-18 17:43:46 -05:00
Anthony Minessale
240f5d984f force sofia rebuild 2014-03-17 16:18:24 -05:00
Anthony Minessale
bd1492e43e FS-6287 --resolve 2014-03-17 16:16:42 -05:00
Anthony Minessale
1d28639cac revert revert 2014-03-17 16:15:59 -05:00
Brian West
be1efcc1fa Revert 6e818216e2, from FS-6287 as it breaks challenge to invites we don't come back and respond 2014-03-17 15:03:08 -05:00
Michael Jerris
340b697e1b FS-6341: --resolve add 3pcc invite w/o sdp support for 100rel/PRACK 2014-03-17 12:27:42 -04:00
Travis Cross
19fc943f59 Mitigate the CRIME TLS flaw
If an attacker can cause a device to make an authenticated request to
a service via TLS while including a payload of the attacker's choice
in that request, and if TLS compression is enabled, the attacker can
uncover the plaintext authentication information by making a series of
guesses and observing changes in the length of the ciphertext.

This is CVE-2012-4929.

FS-6360 --resolve

Thanks-to: Brian West <brian@freeswitch.org>
2014-03-16 16:24:58 +00:00
Anthony Minessale
6a1d552430 force sofia update 2014-03-14 12:27:25 -05:00