| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | | - |
| 5 | | - |
| 6 | | - |
| 7 | | - |
| 8 | | - |
| 9 | | - |
| 10 | | - |
| 11 | | - |
| 12 | | - |
| 13 | | - |
| 14 | | - |
| 15 | | - |
| 16 | #include <stdio.h> | - |
| 17 | #include <openssl/objects.h> | - |
| 18 | #include "ssl_locl.h" | - |
| 19 | | - |
| 20 | #ifndef OPENSSL_NO_SRTP | - |
| 21 | | - |
| 22 | static SRTP_PROTECTION_PROFILE srtp_known_profiles[] = { | - |
| 23 | { | - |
| 24 | "SRTP_AES128_CM_SHA1_80", | - |
| 25 | SRTP_AES128_CM_SHA1_80, | - |
| 26 | }, | - |
| 27 | { | - |
| 28 | "SRTP_AES128_CM_SHA1_32", | - |
| 29 | SRTP_AES128_CM_SHA1_32, | - |
| 30 | }, | - |
| 31 | { | - |
| 32 | "SRTP_AEAD_AES_128_GCM", | - |
| 33 | SRTP_AEAD_AES_128_GCM, | - |
| 34 | }, | - |
| 35 | { | - |
| 36 | "SRTP_AEAD_AES_256_GCM", | - |
| 37 | SRTP_AEAD_AES_256_GCM, | - |
| 38 | }, | - |
| 39 | {0} | - |
| 40 | }; | - |
| 41 | | - |
| 42 | static int find_profile_by_name(char *profile_name, | - |
| 43 | SRTP_PROTECTION_PROFILE **pptr, size_t len) | - |
| 44 | { | - |
| 45 | SRTP_PROTECTION_PROFILE *p; | - |
| 46 | | - |
| 47 | p = srtp_known_profiles; | - |
| 48 | while (p->name) {| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 49 | if ((len == strlen(p->name))| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 50 | && strncmp(p->name, profile_name, len) == 0) { never executed: __result = (((const unsigned char *) (const char *) ( p->name ))[3] - __s2[3]); never executed: end of block never executed: end of block never executed: __result = (((const unsigned char *) (const char *) ( profile_name ))[3] - __s2[3]); never executed: end of block never executed: end of block | TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 51 | *pptr = p; | - |
| 52 | return 0; never executed: return 0; | 0 |
| 53 | } | - |
| 54 | | - |
| 55 | p++; | - |
| 56 | } never executed: end of block | 0 |
| 57 | | - |
| 58 | return 1; never executed: return 1; | 0 |
| 59 | } | - |
| 60 | | - |
| 61 | static int ssl_ctx_make_profiles(const char *profiles_string, | - |
| 62 | STACK_OF(SRTP_PROTECTION_PROFILE) **out) | - |
| 63 | { | - |
| 64 | STACK_OF(SRTP_PROTECTION_PROFILE) *profiles; | - |
| 65 | | - |
| 66 | char *col; | - |
| 67 | char *ptr = (char *)profiles_string; | - |
| 68 | SRTP_PROTECTION_PROFILE *p; | - |
| 69 | | - |
| 70 | if ((profiles = sk_SRTP_PROTECTION_PROFILE_new_null()) == NULL) {| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 71 | SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, | - |
| 72 | SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES); | - |
| 73 | return 1; never executed: return 1; | 0 |
| 74 | } | - |
| 75 | | - |
| 76 | do { | - |
| 77 | col = strchr(ptr, ':');| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 78 | | - |
| 79 | if (!find_profile_by_name(ptr, &p, col ? (size_t)(col - ptr)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 80 | : strlen(ptr))) {| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 81 | if (sk_SRTP_PROTECTION_PROFILE_find(profiles, p) >= 0) {| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 82 | SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, | - |
| 83 | SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); | - |
| 84 | goto err; never executed: goto err; | 0 |
| 85 | } | - |
| 86 | | - |
| 87 | if (!sk_SRTP_PROTECTION_PROFILE_push(profiles, p)) {| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 88 | SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, | - |
| 89 | SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES); | - |
| 90 | goto err; never executed: goto err; | 0 |
| 91 | } | - |
| 92 | } else { never executed: end of block | 0 |
| 93 | SSLerr(SSL_F_SSL_CTX_MAKE_PROFILES, | - |
| 94 | SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE); | - |
| 95 | goto err; never executed: goto err; | 0 |
| 96 | } | - |
| 97 | | - |
| 98 | if (col)| TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 99 | ptr = col + 1; never executed: ptr = col + 1; | 0 |
| 100 | } while (col); never executed: end of block | TRUE | never evaluated | | FALSE | never evaluated |
| 0 |
| 101 | | - |
| 102 | sk_SRTP_PROTECTION_PROFILE_free(*out); | - |
| 103 | | - |
| 104 | *out = profiles; | - |
| 105 | | - |
| 106 | return 0; never executed: return 0; | 0 |
| 107 | err: | - |
| 108 | sk_SRTP_PROTECTION_PROFILE_free(profiles); | - |
| 109 | return 1; never executed: return 1; | 0 |
| 110 | } | - |
| 111 | | - |
| 112 | int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx, const char *profiles) | - |
| 113 | { | - |
| 114 | return ssl_ctx_make_profiles(profiles, &ctx->srtp_profiles); never executed: return ssl_ctx_make_profiles(profiles, &ctx->srtp_profiles); | 0 |
| 115 | } | - |
| 116 | | - |
| 117 | int SSL_set_tlsext_use_srtp(SSL *s, const char *profiles) | - |
| 118 | { | - |
| 119 | return ssl_ctx_make_profiles(profiles, &s->srtp_profiles); never executed: return ssl_ctx_make_profiles(profiles, &s->srtp_profiles); | 0 |
| 120 | } | - |
| 121 | | - |
| 122 | STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *s) | - |
| 123 | { | - |
| 124 | if (s != NULL) {| TRUE | evaluated 4939 times by 1 test | | FALSE | never evaluated |
| 0-4939 |
| 125 | if (s->srtp_profiles != NULL) {| TRUE | never evaluated | | FALSE | evaluated 4939 times by 1 test |
| 0-4939 |
| 126 | return s->srtp_profiles; never executed: return s->srtp_profiles; | 0 |
| 127 | } else if ((s->ctx != NULL) && (s->ctx->srtp_profiles != NULL)) {| TRUE | evaluated 4939 times by 1 test | | FALSE | never evaluated |
| TRUE | never evaluated | | FALSE | evaluated 4939 times by 1 test |
| 0-4939 |
| 128 | return s->ctx->srtp_profiles; never executed: return s->ctx->srtp_profiles; | 0 |
| 129 | } | - |
| 130 | }executed 4939 times by 1 test: end of block | 4939 |
| 131 | | - |
| 132 | return NULL;executed 4939 times by 1 test: return ((void *)0) ; | 4939 |
| 133 | } | - |
| 134 | | - |
| 135 | SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s) | - |
| 136 | { | - |
| 137 | return s->srtp_profile;executed 191 times by 1 test: return s->srtp_profile; | 191 |
| 138 | } | - |
| 139 | #endif | - |
| | |