* qatar/master: vp5: Fix illegal read. vp6: Fix illegal read. tls: Use TLSv1_client_method for OpenSSL Merged-by: Michael Niedermayer <michaelni@gmx.at>tags/n0.9
@@ -185,7 +185,8 @@ static void vp5_parse_coeff(VP56Context *s) | |||||
model1 = model->coeff_dccv[pt]; | model1 = model->coeff_dccv[pt]; | ||||
model2 = model->coeff_dcct[pt][ctx]; | model2 = model->coeff_dcct[pt][ctx]; | ||||
for (coeff_idx=0; coeff_idx<64; ) { | |||||
coeff_idx = 0; | |||||
for (;;) { | |||||
if (vp56_rac_get_prob(c, model2[0])) { | if (vp56_rac_get_prob(c, model2[0])) { | ||||
if (vp56_rac_get_prob(c, model2[2])) { | if (vp56_rac_get_prob(c, model2[2])) { | ||||
if (vp56_rac_get_prob(c, model2[3])) { | if (vp56_rac_get_prob(c, model2[3])) { | ||||
@@ -222,8 +223,11 @@ static void vp5_parse_coeff(VP56Context *s) | |||||
ct = 0; | ct = 0; | ||||
s->coeff_ctx[vp56_b6to4[b]][coeff_idx] = 0; | s->coeff_ctx[vp56_b6to4[b]][coeff_idx] = 0; | ||||
} | } | ||||
coeff_idx++; | |||||
if (coeff_idx >= 64) | |||||
break; | |||||
cg = vp5_coeff_groups[++coeff_idx]; | |||||
cg = vp5_coeff_groups[coeff_idx]; | |||||
ctx = s->coeff_ctx[vp56_b6to4[b]][coeff_idx]; | ctx = s->coeff_ctx[vp56_b6to4[b]][coeff_idx]; | ||||
model1 = model->coeff_ract[pt][ct][cg]; | model1 = model->coeff_ract[pt][ct][cg]; | ||||
model2 = cg > 2 ? model1 : model->coeff_acct[pt][ct][cg][ctx]; | model2 = cg > 2 ? model1 : model->coeff_acct[pt][ct][cg][ctx]; | ||||
@@ -442,7 +442,8 @@ static void vp6_parse_coeff(VP56Context *s) | |||||
model1 = model->coeff_dccv[pt]; | model1 = model->coeff_dccv[pt]; | ||||
model2 = model->coeff_dcct[pt][ctx]; | model2 = model->coeff_dcct[pt][ctx]; | ||||
for (coeff_idx=0; coeff_idx<64; ) { | |||||
coeff_idx = 0; | |||||
for (;;) { | |||||
if ((coeff_idx>1 && ct==0) || vp56_rac_get_prob(c, model2[0])) { | if ((coeff_idx>1 && ct==0) || vp56_rac_get_prob(c, model2[0])) { | ||||
/* parse a coeff */ | /* parse a coeff */ | ||||
if (vp56_rac_get_prob(c, model2[2])) { | if (vp56_rac_get_prob(c, model2[2])) { | ||||
@@ -483,8 +484,10 @@ static void vp6_parse_coeff(VP56Context *s) | |||||
run += vp56_rac_get_prob(c, model3[i+8]) << i; | run += vp56_rac_get_prob(c, model3[i+8]) << i; | ||||
} | } | ||||
} | } | ||||
cg = vp6_coeff_groups[coeff_idx+=run]; | |||||
coeff_idx += run; | |||||
if (coeff_idx >= 64) | |||||
break; | |||||
cg = vp6_coeff_groups[coeff_idx]; | |||||
model1 = model2 = model->coeff_ract[pt][ct][cg]; | model1 = model2 = model->coeff_ract[pt][ct][cg]; | ||||
} | } | ||||
@@ -147,7 +147,7 @@ static int tls_open(URLContext *h, const char *uri, int flags) | |||||
goto fail; | goto fail; | ||||
} | } | ||||
#elif CONFIG_OPENSSL | #elif CONFIG_OPENSSL | ||||
c->ctx = SSL_CTX_new(SSLv3_client_method()); | |||||
c->ctx = SSL_CTX_new(TLSv1_client_method()); | |||||
if (!c->ctx) { | if (!c->ctx) { | ||||
av_log(h, AV_LOG_ERROR, "%s\n", ERR_error_string(ERR_get_error(), NULL)); | av_log(h, AV_LOG_ERROR, "%s\n", ERR_error_string(ERR_get_error(), NULL)); | ||||
ret = AVERROR(EIO); | ret = AVERROR(EIO); | ||||