- 22 Nov, 2021 3 commits
-
-
Ole André Vadla Ravnås authored
Due to off-by-one errors. Since the code added above now handles what this code tried to handle, we can go ahead and remove it.
-
Ole André Vadla Ravnås authored
-
Fabrice Bellet authored
With this patch we ensure that local socket errors during connection establishment are properly transmitted to the connection check layer, so the related pair can be put in state failed when needed. The local socket errors we are interested in, are those occuring when the local source address cannot be bound anymore, because the underlying interface vanished for example. In particular, we don't ignore errors coming from g_socket_bind() with tcp active sockets, that perform a bind to *whatever* local address is available, in case it cannot bind to the specified address. This behaviour was demonstrated with the test-tcp example, that tried to bind to the IPv4 loopback address on a socket initially created for the IPv6 loopback.
-
- 15 Nov, 2021 1 commit
-
-
Nirbheek Chauhan authored
Meson picks up the includedirs from the library target that it is building the pkgconfig file for. Since libnice's headers are split into the nice/ and agent/ subdirs, we need to add agent/ to include_directories: so that it's automatically added to the uninstalled pkgconfig file by Meson.
-
- 03 Nov, 2021 1 commit
-
-
Ole André Vadla Ravnås authored
E.g. if the server address is IPv6 but the local system cannot reach it, so connect() fails right away.
-
- 02 Nov, 2021 8 commits
-
-
Fabrice Bellet authored
The patch invokes the conncheck timer creation where it makes most sense: when a new pair is inserted in the conncheck list, and when a pair is added to the triggered check list (because the conncheck scheduler works on these two lists).
-
Olivier Crête authored
This should make it possible to use OpenSSL or GnuTLS also on Windows if required.
-
Olivier Crête authored
-
Olivier Crête authored
-
Olivier Crête authored
Remove duplicated calls to dependency() so we can have fallback in all cases.
-
Olivier Crête authored
This is a fix over the recent fix in commit 574f44b4
-
Olivier Crête authored
-
Olivier Crête authored
-
- 01 Nov, 2021 4 commits
-
-
Fabrice Bellet authored
This patch ensures that related succeeded-discovered pairs change to state failed simultaneously, to avoid leaving dangling pointers if one is freeed while the other is still in the conncheck list. Such transition is very rare, and only occurs in regular nomination mode, when the network conditions change between the time the pair is initially discovered and the time it is rechecked with the use-candidate flag.
-
Xavier Claessens authored
In that case crypto_dep is a list and we can't call .found() method.
-
Juan Navarro authored
Instead of having 3 independent implementations, make the simpler versions delegate into the full one. The simplest constructor needs to pass "no option", for which no constant exists in the NiceAgentOption enum. Thus the new NICE_AGENT_OPTION_NONE constant is added to reflect this possibility.
-
Ole André Vadla Ravnås authored
As we only need a few primitives there isn't much OS-specific code needed, and for applications that don't already depend on OpenSSL or GnuTLS it simplifies the build process quite a lot. Note that we use the vintage WinCrypt APIs as the Cryptography Next Generation APIs are only available on Vista and newer.
-
- 04 Oct, 2021 1 commit
-
-
Fabrice Bellet authored
The stun agent may contain references to the password previously stored in some remote candidates, freeed by nice_component_restart(), that were used by keep-alive stun requests. These stun replies may arrive later after ice has been restarted. Since the remote candidates are freeed when ice is restarted, the stun agent must be reset to get rid of these related references.
-
- 01 Oct, 2021 2 commits
-
-
Olivier Crête authored
-
Olivier Crête authored
-
- 19 Aug, 2021 3 commits
-
-
Olivier Crête authored
It's not released yet and we don't do even/odd in this project.
-
Olivier Crête authored
Also update the Since to 0.1.19, because it's not really usable now
-
Olivier Crête authored
Also update the Since to 0.1.19, because it's not really usable now
-
- 21 Jul, 2021 1 commit
-
-
abhijeetbhagat authored
Add the relevant ifdef extern C bits
-
- 20 Jul, 2021 6 commits
-
-
Olivier Crête authored
The component can go from any state to FAILED, so simplify that and make it explicit.
-
Olivier Crête authored
When doing a ICE restart, which can be done from any state, we can always go back into the gathering state. This fixes a regression introduced by b20ac5ba
-
Olivier Crête authored
It just won't work for now.
-
Olivier Crête authored
Getting it from the upstream mirror seems to fail miserably
-
Olivier Crête authored
-
Olivier Crête authored
-
- 13 May, 2021 2 commits
-
-
Fabrice Bellet authored
-
Fabrice Bellet authored
-
- 11 May, 2021 1 commit
-
-
Ole André Vadla Ravnås authored
-
- 10 May, 2021 1 commit
-
-
Ole André Vadla Ravnås authored
To be consistent with what we do for ICE-TCP.
-
- 09 May, 2021 1 commit
-
-
Ole André Vadla Ravnås authored
-
- 03 May, 2021 4 commits
-
-
Olivier Crête authored
The type is already checked to not be peer reflexive earlier.
-
Olivier Crête authored
Even if the agent is invalid, don't leak. This makes coverity a little happier.
-
Olivier Crête authored
This should make Coverity's job a little easier. And also fix a little leak in the error path.
-
Olivier Crête authored
As removing the request from the queue looks into the SendRequest, one needs to unqueue it before freeing it.
-
- 20 Apr, 2021 1 commit
-
-
Fabrice Bellet authored
With this patch we free all outstanding refreshes when the agent dispose method is called, even those that are in the way to be discarded asynchronously, when a stream is removed. We also make the final user callback of the refresh proces synchronous, so we don't have to deal with an heap use-after-free problem. This also requires to order some parts of code.
-