The branch, master has been updated
       via  85b5d4adf29da25318c3597e4e7c8d66ef5adb32 (commit)
      from  3c7315c3456c4a55caf368594ee5f923b223bf8d (commit)


- Log -----------------------------------------------------------------
commit 85b5d4adf29da25318c3597e4e7c8d66ef5adb32
Author:     Jack Lau <[email protected]>
AuthorDate: Sat Aug 16 19:31:33 2025 +0800
Commit:     stevenliu <[email protected]>
CommitDate: Fri Sep 5 04:31:07 2025 +0000

    avformat/tls_gnutls: cleanup the pointer name
    
    Pure cleanup, no functional changes
    Unify local pointer names to `TLSContext *c` and `TLSShared *s` to
    reduce confusion from inconsistent names (e.g. p, s, c)
    
    Signed-off-by: Jack Lau <[email protected]>

diff --git a/libavformat/tls_gnutls.c b/libavformat/tls_gnutls.c
index df251ad79c..e894765d7c 100644
--- a/libavformat/tls_gnutls.c
+++ b/libavformat/tls_gnutls.c
@@ -149,66 +149,66 @@ static ssize_t gnutls_url_push(gnutls_transport_ptr_t 
transport,
 
 static int tls_open(URLContext *h, const char *uri, int flags, AVDictionary 
**options)
 {
-    TLSContext *p = h->priv_data;
-    TLSShared *c = &p->tls_shared;
+    TLSContext *c = h->priv_data;
+    TLSShared *s = &c->tls_shared;
     int ret;
 
     ff_gnutls_init();
 
-    if ((ret = ff_tls_open_underlying(c, h, uri, options)) < 0)
+    if ((ret = ff_tls_open_underlying(s, h, uri, options)) < 0)
         goto fail;
 
-    gnutls_init(&p->session, c->listen ? GNUTLS_SERVER : GNUTLS_CLIENT);
-    if (!c->listen && !c->numerichost)
-        gnutls_server_name_set(p->session, GNUTLS_NAME_DNS, c->host, 
strlen(c->host));
-    gnutls_certificate_allocate_credentials(&p->cred);
-    if (c->ca_file) {
-        ret = gnutls_certificate_set_x509_trust_file(p->cred, c->ca_file, 
GNUTLS_X509_FMT_PEM);
+    gnutls_init(&c->session, s->listen ? GNUTLS_SERVER : GNUTLS_CLIENT);
+    if (!s->listen && !s->numerichost)
+        gnutls_server_name_set(c->session, GNUTLS_NAME_DNS, s->host, 
strlen(s->host));
+    gnutls_certificate_allocate_credentials(&c->cred);
+    if (s->ca_file) {
+        ret = gnutls_certificate_set_x509_trust_file(c->cred, s->ca_file, 
GNUTLS_X509_FMT_PEM);
         if (ret < 0)
             av_log(h, AV_LOG_ERROR, "%s\n", gnutls_strerror(ret));
     }
 #if GNUTLS_VERSION_NUMBER >= 0x030020
     else
-        gnutls_certificate_set_x509_system_trust(p->cred);
+        gnutls_certificate_set_x509_system_trust(c->cred);
 #endif
-    gnutls_certificate_set_verify_flags(p->cred, c->verify ?
+    gnutls_certificate_set_verify_flags(c->cred, s->verify ?
                                         GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT : 
0);
-    if (c->cert_file && c->key_file) {
-        ret = gnutls_certificate_set_x509_key_file(p->cred,
-                                                   c->cert_file, c->key_file,
+    if (s->cert_file && s->key_file) {
+        ret = gnutls_certificate_set_x509_key_file(c->cred,
+                                                   s->cert_file, s->key_file,
                                                    GNUTLS_X509_FMT_PEM);
         if (ret < 0) {
             av_log(h, AV_LOG_ERROR,
                    "Unable to set cert/key files %s and %s: %s\n",
-                   c->cert_file, c->key_file, gnutls_strerror(ret));
+                   s->cert_file, s->key_file, gnutls_strerror(ret));
             ret = AVERROR(EIO);
             goto fail;
         }
-    } else if (c->cert_file || c->key_file)
+    } else if (s->cert_file || s->key_file)
         av_log(h, AV_LOG_ERROR, "cert and key required\n");
-    gnutls_credentials_set(p->session, GNUTLS_CRD_CERTIFICATE, p->cred);
-    gnutls_transport_set_pull_function(p->session, gnutls_url_pull);
-    gnutls_transport_set_push_function(p->session, gnutls_url_push);
-    gnutls_transport_set_ptr(p->session, p);
-    gnutls_set_default_priority(p->session);
+    gnutls_credentials_set(c->session, GNUTLS_CRD_CERTIFICATE, c->cred);
+    gnutls_transport_set_pull_function(c->session, gnutls_url_pull);
+    gnutls_transport_set_push_function(c->session, gnutls_url_push);
+    gnutls_transport_set_ptr(c->session, c);
+    gnutls_set_default_priority(c->session);
     do {
         if (ff_check_interrupt(&h->interrupt_callback)) {
             ret = AVERROR_EXIT;
             goto fail;
         }
 
-        ret = gnutls_handshake(p->session);
+        ret = gnutls_handshake(c->session);
         if (gnutls_error_is_fatal(ret)) {
             ret = print_tls_error(h, ret);
             goto fail;
         }
     } while (ret);
-    p->need_shutdown = 1;
-    if (c->verify) {
+    c->need_shutdown = 1;
+    if (s->verify) {
         unsigned int status, cert_list_size;
         gnutls_x509_crt_t cert;
         const gnutls_datum_t *cert_list;
-        if ((ret = gnutls_certificate_verify_peers2(p->session, &status)) < 0) 
{
+        if ((ret = gnutls_certificate_verify_peers2(c->session, &status)) < 0) 
{
             av_log(h, AV_LOG_ERROR, "Unable to verify peer certificate: %s\n",
                                     gnutls_strerror(ret));
             ret = AVERROR(EIO);
@@ -219,19 +219,19 @@ static int tls_open(URLContext *h, const char *uri, int 
flags, AVDictionary **op
             ret = AVERROR(EIO);
             goto fail;
         }
-        if (gnutls_certificate_type_get(p->session) != GNUTLS_CRT_X509) {
+        if (gnutls_certificate_type_get(c->session) != GNUTLS_CRT_X509) {
             av_log(h, AV_LOG_ERROR, "Unsupported certificate type\n");
             ret = AVERROR(EIO);
             goto fail;
         }
         gnutls_x509_crt_init(&cert);
-        cert_list = gnutls_certificate_get_peers(p->session, &cert_list_size);
+        cert_list = gnutls_certificate_get_peers(c->session, &cert_list_size);
         gnutls_x509_crt_import(cert, cert_list, GNUTLS_X509_FMT_DER);
-        ret = gnutls_x509_crt_check_hostname(cert, c->host);
+        ret = gnutls_x509_crt_check_hostname(cert, s->host);
         gnutls_x509_crt_deinit(cert);
         if (!ret) {
             av_log(h, AV_LOG_ERROR,
-                   "The certificate's owner does not match hostname %s\n", 
c->host);
+                   "The certificate's owner does not match hostname %s\n", 
s->host);
             ret = AVERROR(EIO);
             goto fail;
         }

-----------------------------------------------------------------------

Summary of changes:
 libavformat/tls_gnutls.c | 58 ++++++++++++++++++++++++------------------------
 1 file changed, 29 insertions(+), 29 deletions(-)


hooks/post-receive
-- 

_______________________________________________
ffmpeg-cvslog mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to