diff options
author | Matthew Jordan <mjordan@digium.com> | 2012-02-24 15:10:35 +0000 |
---|---|---|
committer | Matthew Jordan <mjordan@digium.com> | 2012-02-24 15:10:35 +0000 |
commit | 670797e5da08808716ce1eafc9fc2b9bec8f1d58 (patch) | |
tree | ecf457e27a685df76cbf894337c030c7d0bd3380 /channels/sip | |
parent | ebaf59a656ef94e19332c08e0d0562b8cbe59f65 (diff) |
Allow SRTP policies to be reloaded
Currently, when using res_srtp, once the SRTP policy has been added to the
current session the policy is locked into place. Any attempt to replace an
existing policy, which would be needed if the remote endpoint negotiated a new
cryptographic key, is instead rejected in res_srtp. This happens in particular
in transfer scenarios, where the endpoint that Asterisk is communicating with
changes but uses the same RTP session.
This patch modifies res_srtp to allow remote and local policies to be reloaded
in the underlying SRTP library. From the perspective of users of the SRTP API,
the only change is that the adding of remote and local policies are now added
in a single method call, whereas they previously were added separately. This
was changed to account for the differences in handling remote and local
policies in libsrtp.
Review: https://reviewboard.asterisk.org/r/1741/
(closes issue ASTERISK-19253)
Reported by: Thomas Arimont
Tested by: Thomas Arimont
Patches:
srtp_renew_keys_2012_02_22.diff uploaded by Matt Jordan (license 6283)
(with some small modifications for this check-in)
........
Merged revisions 356604 from http://svn.asterisk.org/svn/asterisk/branches/1.8
........
Merged revisions 356605 from http://svn.asterisk.org/svn/asterisk/branches/10
git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@356606 65c4cc65-6c06-0410-ace0-fbb531ad65f3
Diffstat (limited to 'channels/sip')
-rw-r--r-- | channels/sip/sdp_crypto.c | 14 |
1 files changed, 3 insertions, 11 deletions
diff --git a/channels/sip/sdp_crypto.c b/channels/sip/sdp_crypto.c index bf3b2cd20..85adf83eb 100644 --- a/channels/sip/sdp_crypto.c +++ b/channels/sip/sdp_crypto.c @@ -162,15 +162,9 @@ static int sdp_crypto_activate(struct sdp_crypto *p, int suite_val, unsigned cha goto err; } - /* FIXME MIKMA */ - /* ^^^ I wish I knew what needed fixing... */ - if (ast_rtp_instance_add_srtp_policy(rtp, local_policy)) { - ast_log(LOG_WARNING, "Could not set local SRTP policy\n"); - goto err; - } - - if (ast_rtp_instance_add_srtp_policy(rtp, remote_policy)) { - ast_log(LOG_WARNING, "Could not set remote SRTP policy\n"); + /* Add the SRTP policies */ + if (ast_rtp_instance_add_srtp_policy(rtp, remote_policy, local_policy)) { + ast_log(LOG_WARNING, "Could not set SRTP policies\n"); goto err; } @@ -279,10 +273,8 @@ int sdp_crypto_process(struct sdp_crypto *p, const char *attr, struct ast_rtp_in ast_log(LOG_ERROR, "Could not allocate memory for a_crypto\n"); return -1; } - snprintf(p->a_crypto, attr_len + 10, "a=crypto:%s %s inline:%s\r\n", tag, suite, p->local_key64); } - return 0; } |