> On Feb 4, 2022, at 10:58 PM, g.jaegy <g.ja...@imagine3d.fr> wrote: > > Upstream accidentally stepped on trying to use C99 VLAs; > fOutBuf->curPacketSize() is not a constant. > > // Hack: Because the MKI + authentication tag at the end of the packet > would > // overwrite any following (still to be sent) frame data, we can't > encrypt/tag > // the packet in place. Instead, we have to make a copy (on the stack) > of > // the packet, before encrypting/tagging/sending it: > u_int8_t packet[fOutBuf->curPacketSize() + SRTP_MKI_LENGTH + > SRTP_AUTH_TAG_LENGTH]; > memcpy(packet, fOutBuf->packet(), fOutBuf->curPacketSize()); > unsigned newPacketSize;
It seems that you’re using a C++ compiler that doesn’t handle variable-sized data being allocated on the stack. If you can’t upgrade your compiler, then you will be able to compile it by adding -DNO_OPENSSL=1 to your compile flags. (Of course, if you do this, then you won’t be able to handle connections over TLS, or SRTP.) Ross Finlayson Live Networks, Inc. http://www.live555.com/ _______________________________________________ live-devel mailing list live-devel@lists.live555.com http://lists.live555.com/mailman/listinfo/live-devel