Commit 95d6e5bd authored by Michael Niedermayer's avatar Michael Niedermayer

Merge remote-tracking branch 'qatar/master'

* qatar/master:
  vp5: Fix illegal read.
  vp6: Fix illegal read.
  tls: Use TLSv1_client_method for OpenSSL
Merged-by: 's avatarMichael Niedermayer <michaelni@gmx.at>
parents 640424e0 bb4b0ad8
...@@ -185,7 +185,8 @@ static void vp5_parse_coeff(VP56Context *s) ...@@ -185,7 +185,8 @@ static void vp5_parse_coeff(VP56Context *s)
model1 = model->coeff_dccv[pt]; model1 = model->coeff_dccv[pt];
model2 = model->coeff_dcct[pt][ctx]; model2 = model->coeff_dcct[pt][ctx];
for (coeff_idx=0; coeff_idx<64; ) { coeff_idx = 0;
for (;;) {
if (vp56_rac_get_prob(c, model2[0])) { if (vp56_rac_get_prob(c, model2[0])) {
if (vp56_rac_get_prob(c, model2[2])) { if (vp56_rac_get_prob(c, model2[2])) {
if (vp56_rac_get_prob(c, model2[3])) { if (vp56_rac_get_prob(c, model2[3])) {
...@@ -222,8 +223,11 @@ static void vp5_parse_coeff(VP56Context *s) ...@@ -222,8 +223,11 @@ static void vp5_parse_coeff(VP56Context *s)
ct = 0; ct = 0;
s->coeff_ctx[vp56_b6to4[b]][coeff_idx] = 0; s->coeff_ctx[vp56_b6to4[b]][coeff_idx] = 0;
} }
coeff_idx++;
if (coeff_idx >= 64)
break;
cg = vp5_coeff_groups[++coeff_idx]; cg = vp5_coeff_groups[coeff_idx];
ctx = s->coeff_ctx[vp56_b6to4[b]][coeff_idx]; ctx = s->coeff_ctx[vp56_b6to4[b]][coeff_idx];
model1 = model->coeff_ract[pt][ct][cg]; model1 = model->coeff_ract[pt][ct][cg];
model2 = cg > 2 ? model1 : model->coeff_acct[pt][ct][cg][ctx]; model2 = cg > 2 ? model1 : model->coeff_acct[pt][ct][cg][ctx];
......
...@@ -442,7 +442,8 @@ static void vp6_parse_coeff(VP56Context *s) ...@@ -442,7 +442,8 @@ static void vp6_parse_coeff(VP56Context *s)
model1 = model->coeff_dccv[pt]; model1 = model->coeff_dccv[pt];
model2 = model->coeff_dcct[pt][ctx]; model2 = model->coeff_dcct[pt][ctx];
for (coeff_idx=0; coeff_idx<64; ) { coeff_idx = 0;
for (;;) {
if ((coeff_idx>1 && ct==0) || vp56_rac_get_prob(c, model2[0])) { if ((coeff_idx>1 && ct==0) || vp56_rac_get_prob(c, model2[0])) {
/* parse a coeff */ /* parse a coeff */
if (vp56_rac_get_prob(c, model2[2])) { if (vp56_rac_get_prob(c, model2[2])) {
...@@ -483,8 +484,10 @@ static void vp6_parse_coeff(VP56Context *s) ...@@ -483,8 +484,10 @@ static void vp6_parse_coeff(VP56Context *s)
run += vp56_rac_get_prob(c, model3[i+8]) << i; run += vp56_rac_get_prob(c, model3[i+8]) << i;
} }
} }
coeff_idx += run;
cg = vp6_coeff_groups[coeff_idx+=run]; if (coeff_idx >= 64)
break;
cg = vp6_coeff_groups[coeff_idx];
model1 = model2 = model->coeff_ract[pt][ct][cg]; model1 = model2 = model->coeff_ract[pt][ct][cg];
} }
......
...@@ -147,7 +147,7 @@ static int tls_open(URLContext *h, const char *uri, int flags) ...@@ -147,7 +147,7 @@ static int tls_open(URLContext *h, const char *uri, int flags)
goto fail; goto fail;
} }
#elif CONFIG_OPENSSL #elif CONFIG_OPENSSL
c->ctx = SSL_CTX_new(SSLv3_client_method()); c->ctx = SSL_CTX_new(TLSv1_client_method());
if (!c->ctx) { if (!c->ctx) {
av_log(h, AV_LOG_ERROR, "%s\n", ERR_error_string(ERR_get_error(), NULL)); av_log(h, AV_LOG_ERROR, "%s\n", ERR_error_string(ERR_get_error(), NULL));
ret = AVERROR(EIO); ret = AVERROR(EIO);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment