summaryrefslogtreecommitdiff
path: root/channels/sip
diff options
context:
space:
mode:
authorMatthew Jordan <mjordan@digium.com>2012-02-24 15:10:35 +0000
committerMatthew Jordan <mjordan@digium.com>2012-02-24 15:10:35 +0000
commit670797e5da08808716ce1eafc9fc2b9bec8f1d58 (patch)
treeecf457e27a685df76cbf894337c030c7d0bd3380 /channels/sip
parentebaf59a656ef94e19332c08e0d0562b8cbe59f65 (diff)
Allow SRTP policies to be reloaded
Currently, when using res_srtp, once the SRTP policy has been added to the current session the policy is locked into place. Any attempt to replace an existing policy, which would be needed if the remote endpoint negotiated a new cryptographic key, is instead rejected in res_srtp. This happens in particular in transfer scenarios, where the endpoint that Asterisk is communicating with changes but uses the same RTP session. This patch modifies res_srtp to allow remote and local policies to be reloaded in the underlying SRTP library. From the perspective of users of the SRTP API, the only change is that the adding of remote and local policies are now added in a single method call, whereas they previously were added separately. This was changed to account for the differences in handling remote and local policies in libsrtp. Review: https://reviewboard.asterisk.org/r/1741/ (closes issue ASTERISK-19253) Reported by: Thomas Arimont Tested by: Thomas Arimont Patches: srtp_renew_keys_2012_02_22.diff uploaded by Matt Jordan (license 6283) (with some small modifications for this check-in) ........ Merged revisions 356604 from http://svn.asterisk.org/svn/asterisk/branches/1.8 ........ Merged revisions 356605 from http://svn.asterisk.org/svn/asterisk/branches/10 git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@356606 65c4cc65-6c06-0410-ace0-fbb531ad65f3
Diffstat (limited to 'channels/sip')
-rw-r--r--channels/sip/sdp_crypto.c14
1 files changed, 3 insertions, 11 deletions
diff --git a/channels/sip/sdp_crypto.c b/channels/sip/sdp_crypto.c
index bf3b2cd20..85adf83eb 100644
--- a/channels/sip/sdp_crypto.c
+++ b/channels/sip/sdp_crypto.c
@@ -162,15 +162,9 @@ static int sdp_crypto_activate(struct sdp_crypto *p, int suite_val, unsigned cha
goto err;
}
- /* FIXME MIKMA */
- /* ^^^ I wish I knew what needed fixing... */
- if (ast_rtp_instance_add_srtp_policy(rtp, local_policy)) {
- ast_log(LOG_WARNING, "Could not set local SRTP policy\n");
- goto err;
- }
-
- if (ast_rtp_instance_add_srtp_policy(rtp, remote_policy)) {
- ast_log(LOG_WARNING, "Could not set remote SRTP policy\n");
+ /* Add the SRTP policies */
+ if (ast_rtp_instance_add_srtp_policy(rtp, remote_policy, local_policy)) {
+ ast_log(LOG_WARNING, "Could not set SRTP policies\n");
goto err;
}
@@ -279,10 +273,8 @@ int sdp_crypto_process(struct sdp_crypto *p, const char *attr, struct ast_rtp_in
ast_log(LOG_ERROR, "Could not allocate memory for a_crypto\n");
return -1;
}
-
snprintf(p->a_crypto, attr_len + 10, "a=crypto:%s %s inline:%s\r\n", tag, suite, p->local_key64);
}
-
return 0;
}