Blame SOURCES/webrtc-nss-fix.patch
|
|
5b16e6 |
diff -up firefox-102.3.0/third_party/libsrtp/src/crypto/cipher/aes_gcm_nss.c.webrtc-fix firefox-102.3.0/third_party/libsrtp/src/crypto/cipher/aes_gcm_nss.c
|
|
|
5b16e6 |
--- firefox-102.3.0/third_party/libsrtp/src/crypto/cipher/aes_gcm_nss.c.webrtc-fix 2022-10-04 18:58:30.563683229 +0200
|
|
|
5b16e6 |
+++ firefox-102.3.0/third_party/libsrtp/src/crypto/cipher/aes_gcm_nss.c 2022-10-04 18:58:44.583652963 +0200
|
|
|
5b16e6 |
@@ -293,7 +293,7 @@ static srtp_err_status_t srtp_aes_gcm_ns
|
|
|
5b16e6 |
|
|
|
5b16e6 |
int rv;
|
|
|
5b16e6 |
SECItem param = { siBuffer, (unsigned char *)&c->params,
|
|
|
5b16e6 |
- sizeof(CK_GCM_PARAMS) };
|
|
|
5b16e6 |
+ sizeof(CK_NSS_GCM_PARAMS) };
|
|
|
5b16e6 |
if (encrypt) {
|
|
|
5b16e6 |
rv = PK11_Encrypt(c->key, CKM_AES_GCM, ¶m, buf, enc_len,
|
|
|
5b16e6 |
*enc_len + 16, buf, *enc_len);
|
|
|
5b16e6 |
diff -up firefox-102.3.0/third_party/libsrtp/src/crypto/include/aes_gcm.h.webrtc-fix firefox-102.3.0/third_party/libsrtp/src/crypto/include/aes_gcm.h
|
|
|
5b16e6 |
--- firefox-102.3.0/third_party/libsrtp/src/crypto/include/aes_gcm.h.webrtc-fix 2022-10-04 18:59:16.635583764 +0200
|
|
|
5b16e6 |
+++ firefox-102.3.0/third_party/libsrtp/src/crypto/include/aes_gcm.h 2022-10-04 18:59:31.848550924 +0200
|
|
|
5b16e6 |
@@ -101,7 +101,7 @@ typedef struct {
|
|
|
5b16e6 |
uint8_t iv[12];
|
|
|
5b16e6 |
uint8_t aad[MAX_AD_SIZE];
|
|
|
5b16e6 |
int aad_size;
|
|
|
5b16e6 |
- CK_GCM_PARAMS params;
|
|
|
5b16e6 |
+ CK_NSS_GCM_PARAMS params;
|
|
|
5b16e6 |
uint8_t tag[16];
|
|
|
5b16e6 |
} srtp_aes_gcm_ctx_t;
|
|
|
5b16e6 |
|
|
|
5b16e6 |
diff -up firefox-102.3.0/third_party/prio/prio/encrypt.c.webrtc-fix firefox-102.3.0/third_party/prio/prio/encrypt.c
|