Commit Graph

27140 Commits

Author SHA1 Message Date
Brian West
28e90addf2 FS-5501 fire event on profile start 2014-07-09 08:53:14 -05:00
Brian West
ec008234e9 FS-5516 allow get params in URL 2014-07-09 08:52:01 -05:00
Brian West
a79a9ea9ed FS-6373 2014-07-09 08:25:54 -05:00
Brian West
8951d26f8c FS-6626 fix winter DST issue 2014-07-09 07:58:11 -05:00
Brian West
ba067f3237 FS-6563 2014-07-09 07:47:17 -05:00
Brian West
e1d814b7e7 FS-6565 2014-07-09 07:45:55 -05:00
Brian West
99d0f134e7 FS-6566 2014-07-09 07:44:37 -05:00
Steve Underwood
54b6a0abce Added explanatory comment on a recent change. 2014-07-09 10:18:00 +08:00
Steve Underwood
992debeea4 Merge branch 'master' of ssh://stash.freeswitch.org:7999/fs/freeswitch 2014-07-09 00:14:31 +08:00
Michael Jerris
a99f06dfc6 sync changes from srtp upstream 2014-07-08 10:26:08 -04:00
Steve Underwood
40214821cb Added additional checks that HDLC frames arriving at the T.38 gateway engine
begin with the correct 2 bytes.
2014-07-08 20:48:15 +08:00
Brian West
ebe4238a7e Lets get loud 2014-07-07 14:51:43 -05:00
Brian West
3b629c8004 updated directory using asr/tts 2014-07-05 09:22:59 -05:00
Brian West
cdbed1f66e Update to use PocketSphinx 0.8 2014-07-05 09:14:06 -05:00
Travis Cross
c17d58b856 Refactor the curl PUT read callback 2014-07-04 07:47:04 +00:00
Travis Cross
2fea35282f Advance the data_stream data pointer 2014-07-04 07:43:59 +00:00
Travis Cross
a84b76be2a Add PUT support to mod_curl curl api and app
With both the `curl` api command and application, you can now ask for
data to be PUT where previously it could only be sent via POST.
2014-07-04 07:40:13 +00:00
Anthony Minessale
0df352c4fc update image 2014-07-04 03:58:55 +05:00
Mike Jerris
e9ef4b143c Merge pull request #2 in FS/freeswitch from ~KATHLEEN.KING/freeswitch-fork:doxygen-switch_apr.h to master
* commit '64fc3f7934888175b80e0cdd3a065d717d0a9014':
  Changed the function parameter name in the function definition to match the updated parameter name in the function declaration. #doxygen
  Changed the variable name for clarity.
2014-07-03 16:45:52 -05:00
Kathleen King
64fc3f7934 Changed the function parameter name in the function definition to
match the updated parameter name in the function declaration. #doxygen
2014-07-03 14:19:33 -07:00
Anthony Minessale
831d5892b9 preserve timer name for recovery 2014-07-03 23:50:14 +05:00
Anthony Minessale
c9d0f89261 update ico 2014-07-03 22:36:08 +05:00
Anthony Minessale
6fad1bf8ff clean up demo a little 2014-07-03 22:20:30 +05:00
Anthony Minessale
2cbea0437f clean up demo a little 2014-07-03 22:14:23 +05:00
Mike Jerris
64763398fa Merge pull request #4 in FS/freeswitch from ~KATHLEEN.KING/freeswitch-fork:doxygen-switch_regex.h-2 to master
* commit '35755d37d5dd47c2f8470ca9a294b55f124ee1e7':
  Fixed parameter name of variable in switch_regex_match_partial. #doxygen
2014-07-03 12:03:04 -05:00
Ken Rice
8732abef40 test commit hooks, whitespace change only 2014-07-03 08:50:04 -05:00
Ken Rice
ceb1f375d1 Merge pull request #1 in FS/freeswitch from ~ARESKI/freeswitch:code-style to master
* commit 'b0e86e65cf16f106a4254e10ab8f8a984b3699db':
  misc of python pep8 fixes
2014-07-03 08:42:15 -05:00
Brian West
4a51650b16 reswig 2014-07-03 08:09:18 -05:00
areski
b0e86e65cf misc of python pep8 fixes 2014-07-03 13:46:56 +02:00
Kathleen King
f47ecb25a1 Changed the variable name for clarity. 2014-07-02 20:10:31 -07:00
Kathleen King
35755d37d5 Fixed parameter name of variable in
switch_regex_match_partial. #doxygen
2014-07-02 17:46:55 -07:00
Anthony Minessale
39200cd13b increase memory for buffers to hold new decoded stereo codecs 2014-07-03 02:55:21 +05:00
Anthony Minessale
99f15662e2 fix jb endless loop of missing packets 2014-07-03 02:16:32 +05:00
Travis Cross
0efcc9b973 Update SubmittingPatches doc for JIRA smart commits 2014-07-02 18:37:11 +00:00
Anthony Minessale
9e0d1d6841 only count unmuted channels in positioning 2014-07-02 22:57:29 +05:00
Jeff Lenk
9807a92a70 vs2010 reswig 2014-07-02 12:46:26 -05:00
Anthony Minessale
d833b9d726 expand table width a bit 2014-07-02 22:18:44 +05:00
Anthony Minessale
f0d16d0d18 expand positioning api usage 2014-07-02 04:49:16 +05:00
Anthony Minessale
1518240bab FS-6637 try this instead 2014-07-01 23:59:40 +05:00
Anthony Minessale
0f017814dd FS-6637 nevermind, this is already in the code 2014-07-01 23:53:45 +05:00
Anthony Minessale
5d70df9b1c FS-6637 try this patch 2014-07-01 22:32:02 +05:00
Chris Rienzo
9b14633cf3 fs_cli: fix compiler error on CentOS 6 caused by recent short uuid logging change 2014-06-30 17:30:59 -04:00
jfigus
024162cfc9 Add support for 16-byte auth tag for AES GCM mode. 2014-06-30 19:18:20 +00:00
jfigus
b9da5149e2 Set the algorithm member on cipher_t when allocating AES crypto instance. Apply same fix to NULL cipher. 2014-06-30 19:18:20 +00:00
Travis Cross
aa4261d11f Avoid buffer-overflow on short RTCP/SRTCP packets
In `srtp_unprotect_rtcp()` we are not validating that the packet
length is as long as the minimum required.  This would cause
`enc_octet_len` to underflow, which would cause us to try to decrypt
data past the end of the packet in memory -- a buffer over-read and
buffer overflow.

In `srtp_protect_rtcp()`, we were similarly not validating the packet
length.  Here we were also polluting the address of the SRTCP
encrypted flag and index (the `trailer`), causing us to write one word
to a bogus memory address before getting to the encryption where we
would also overflow.

In this commit we add checks to appropriately validate the RTCP/SRTCP
packet lengths.

`srtp_unprotect_rtcp_aead()` (but not protect) did correctly validate
the packet length; this check would now be redundant as the check in
`srtcp_unprotect_rtcp()` will also run first, so it has been removed.
2014-06-30 19:00:35 +00:00
Travis Cross
9ea93c4c50 Avoid buffer over-read on null cipher AEAD
In the defined AEAD modes, SRTP packets must always be encrypted and
authenticated, but SRTCP packets may be only authenticated.  It's
possible, therefore, for us to end up in `srtp_protect_aead()` without
the `sec_serv_conf` bit being set.  We should just ignore this and
encrypt the RTP packet anyway.

What we are doing instead is encrypting the packet anyway, but setting
`enc_start` to NULL first.  This causes `aad_len` to underflow which
will cause us to over-read in `cipher_set_aad()`.

If we could get past that, we would try to read and write memory
starting at 0x0 down in `cipher_encrypt()`.

This commit causes us to not check the `sec_serv_conf` bit and never
set `enc_start` to NULL in `srtp_protect_aead()`.

`srtp_unprotect_aead()` does not contain a similar error.
2014-06-30 19:00:35 +00:00
Travis Cross
3bf2b9af75 Prevent buffer overflow from untrusted RTP/SRTP lengths
When computing the start address of the RTP data to encrypt or SRTP
data to decrypt (`enc_start`), we are using `hdr->cc` (the CSRC
count), which is untrusted data from the packet, and the length field
of an RTP header extension, which is also untrusted and unchecked data
from the packet.

This value then pollutes our calculation of how much data we'll be
encrypting or decrypting (`enc_octet_len`), possibly causing us to
underflow.

We'll then call `cipher_encrypt()` or `cipher_decrypt()` with these
two values, causing us to read from and write to arbitrary addresses
in memory.

(In the AEAD functions, we'd also pollute `aad_len`, which would cause
us to read undefined memory in `cipher_set_aad`.)

This commit adds checks to verify that the `enc_start` we calculate is
sane based on the actual packet length.
2014-06-30 19:00:35 +00:00
Travis Cross
d2aaf15992 Fix misspelling in comment 2014-06-30 19:00:34 +00:00
Anthony Minessale
2423fc7d0f FS-6540 This should proxy all refers now, the param has changed to proxy-refer 2014-06-30 12:53:22 -05:00
Anthony Minessale
7f9348dbc3 fix volume adjustments in stereo conference 2014-06-30 23:39:42 +05:00