[Freeswitch-svn] [commit] r11509 - freeswitch/trunk/libs/srtp/crypto/cipher

FreeSWITCH SVN brian at freeswitch.org
Tue Jan 27 10:01:17 PST 2009


Author: brian
Date: Tue Jan 27 12:01:17 2009
New Revision: 11509

Log:
FSCORE-280

Modified:
   freeswitch/trunk/libs/srtp/crypto/cipher/aes_icm.c

Modified: freeswitch/trunk/libs/srtp/crypto/cipher/aes_icm.c
==============================================================================
--- freeswitch/trunk/libs/srtp/crypto/cipher/aes_icm.c	(original)
+++ freeswitch/trunk/libs/srtp/crypto/cipher/aes_icm.c	Tue Jan 27 12:01:17 2009
@@ -98,15 +98,15 @@
   uint8_t *pointer;
   int tmp;
 
-  debug_print(mod_aes_icm, 
-            "allocating cipher with key length %d", key_len);
+  debug_print(mod_aes_icm, "allocating cipher with key length %d", key_len);
 
-  // Ismacryp, for example, uses 16 byte key + 8 byte 
-  // salt  so this function is called with key_len = 24.
-  // The check for key_len = 30 does not apply. Our usage
-  // of aes functions with key_len = values other than 30
-  // has not broken anything. Don't know what would be the
-  // effect of skipping this check for srtp in general.
+  /* Ismacryp, for example, uses 16 byte key + 8 byte 
+	 salt  so this function is called with key_len = 24.
+	 The check for key_len = 30 does not apply. Our usage
+	 of aes functions with key_len = values other than 30
+	 has not broken anything. Don't know what would be the
+	 effect of skipping this check for srtp in general.
+  */
   if (!forIsmacryp && key_len != 30)
     return err_status_bad_param;
 
@@ -300,7 +300,7 @@
 
   if (forIsmacryp) {
     uint32_t temp;    
-    //alex's clock counter forward
+    /* alex's clock counter forward */
     temp = ntohl(c->counter.v32[3]);
     c->counter.v32[3] = htonl(++temp);
   } else {



More information about the Freeswitch-svn mailing list