Skip to content
Snippets Groups Projects
  1. Aug 08, 2015
    • David M. Lee's avatar
      Replace htobe64 with htonll · 06b464ab
      David M. Lee authored
      We don't have a compatability function to fill in a missing htobe64; but
      we already have one for the identical htonll.
      
      Change-Id: Ic0a95db1c5b0041e14e6b127432fb533b97e4cac
      06b464ab
  2. Aug 05, 2015
    • Joshua Colp's avatar
      res_rtp_asterisk: Don't leak temporary key when enabling PFS. · c7a1dca4
      Joshua Colp authored
      A change recently went in which enabled perfect forward secrecy for
      DTLS in res_rtp_asterisk. This was accomplished two different ways
      depending on the availability of a feature in OpenSSL. The fallback
      method created a temporary instance of a key but did not free it.
      This change fixes that.
      
      ASTERISK-25265
      
      Change-Id: Iadc031b67a91410bbefb17ffb4218d615d051396
      c7a1dca4
  3. Aug 03, 2015
    • Mark Duncan's avatar
      res/res_rtp_asterisk: Add ECDH support · 2d2e7419
      Mark Duncan authored
      This will add ECDH support to Asterisk. It will
      detect auto ECDH support in OpenSSL
      (1.0.2b and above) during ./configure. If this is
      available, it will use it,
      otherwise it will fall back to prime256v1 (this
      behavior is consistent with
      other projects such as Apache and nginx).
      
      This fixes WebRTC being broken in Firefox 38+ due
      to Firefox now only supporting
      ciphers with perfect forward secrecy.
      
      ASTERISK-25265 #close
      
      Change-Id: I8c13b33a2a79c0bde2e69e4ba6afa5ab9351465b
      2d2e7419
  4. Jul 29, 2015
    • Mark Michelson's avatar
      res_http_websocket: Properly encode 64 bit payload · f2089dce
      Mark Michelson authored
      A test agent was continuously failing all ARI tests when run against
      Asterisk 13. As it turns out, the reason for this is that on those test
      runs, for some reason we decided to use the super extended 64 bit
      payload length for websocket text frames instead of the extended 16 bit
      payload length. For 64-bit payloads, the expected byte order over the
      network is
      
      7, 6, 5, 4, 3, 2, 1, 0
      
      However, we were sending the payload as
      
      3, 2, 1, 0, 7, 6, 5, 4
      
      This meant that we were saying to expect an absolutely MASSIVE payload
      to arrive. Since we did not follow through on this expected payload
      size, the client would sit patiently waiting for the rest of the payload
      to arrive until the test would time out.
      
      With this change, we use the htobe64() function instead of htonl() so
      that a 64-bit byte-swap is performed instead of a 32 bit byte-swap.
      
      Change-Id: Ibcd8552392845fbcdd017a8c8c1043b7fe35964a
      f2089dce
  5. Jul 19, 2015
  6. Jul 08, 2015
  7. Jul 06, 2015
    • Joshua Colp's avatar
      res_rtp_asterisk: Prevent simultaneous access to DTLS SSL context. · 1ad82732
      Joshua Colp authored
      This change moves logic for setting up the DTLS SSL contexts to
      when the SDP is done being processed instead of when ICE negotiation
      completes. It also stops handshakes from being initiated when we
      are acting as a server.
      
      Manipulating the SSL context when ICE negotiation has completed
      is problematic as the SSL context is not protected and if acting
      as a client the remote side may have started DTLS negotiation
      already.
      
      The retransmission timeout timer code has also been split up
      and simplified some. Both RTP and RTCP now have their own timers
      and the points at which the timer is stopped and started is now
      more specific. When a packet is sent the timer is started. When
      a response is received but before it is processed the timer is
      stopped. This provides a guarantee that the timeout is not
      occurring while the response is processed.
      
      ASTERISK-22805 #close
      ASTERISK-24550 #close
      ASTERISK-24651 #close
      ASTERISK-24832 #close
      ASTERISK-25103 #close
      ASTERISK-25127 #close
      
      Change-Id: Ib75ea2546f29d6efc3d2d37c58df6986c7bd9b91
      1ad82732
  8. Jul 02, 2015
    • Walter Doekes's avatar
      res_timing: Don't close FD 0 when out of open files. · b090a8d4
      Walter Doekes authored
      This fixes so a failure to get a timer file descriptor does not cascade
      to closing FD 0.
      
      On error, both res_timing_kqueue and res_timing_timerfd would call the
      destructor before setting the file handle. The file handle had been
      initialized to 0, causing FD 0 to be closed. This in turn, resulted in
      floods of "CLI>" messages and an unusable terminal.
      
      ASTERISK-19277 #close
      Reported by: Barry Chern
      
      Change-Id: I147d7e33726c6e5a2751928d56561494f5800350
      b090a8d4
  9. Jun 28, 2015
    • Matt Jordan's avatar
      Makefile: Remove coverage files on 'make clean' · 9b74dcb6
      Matt Jordan authored
      This patch updates a variety of Makefiles in Asterisk's build system to
      remove .gcda and .gcno files when 'make clean' is executed. These files
      are generated when '--enable-coverage' is passed to the Asterisk
      configure script.
      
      Change-Id: Ib70b41eea2ee2908885bff02e80faf9f40c84602
      9b74dcb6
  10. May 13, 2015
  11. May 08, 2015
    • Sean Bright's avatar
      res_rtp_asterisk: Issue ERROR if res_srtp is not found. · 151c3316
      Sean Bright authored
      While trying to get WebRTC working with chan_pjsip, I was running
      into the following error:
      
          Attempted to set an invalid DTLS-SRTP configuration on RTP
          instance...
      
      Josh helpfully pointed out that res_srtp.so might not be loaded, and
      sure enough, it wasn't. This patch adds a ERROR indiciating as much
      to hopefully help others having a similar problem.
      
      Change-Id: I13aa477b47b299876728a21b130998a0ea6cd19f
      151c3316
  12. May 04, 2015
    • Martin Tomec's avatar
      res_odbc: Use negative connection cache for all connections · 7c32cb27
      Martin Tomec authored
      Apply the negative connection cache setting to all connections,
      even those that are not pooled. This ensures that the connection
      will not be re-established before the negative connection cache
      time is met.
      
      ASTERISK-22708 #close
      
      Change-Id: I431cc2e8584ab0b6908b3523d0a0e18c9a527271
      7c32cb27
  13. Apr 29, 2015
    • Kevin Harwell's avatar
      res_fax: allow 2400 transmission rate according to v.27ter standard · f6091525
      Kevin Harwell authored
      A previous set of patches (see: ASTERISK-22790 & ASTERISK-23231) made it so
      a v.27 modem was not allowed to have a minimum transmission rate of 2400 bits
      per second. This reverts all or some of those patches since according to the
      v.27ter standard a rate of 2400 bits per second is also supported.
      
      One of the original patches also added 9600 bits per second support for v.27.
      This patch also removes that since v.27ter only supports 2400/4800 bits per
      second.
      
      Also, since Asterisk specifically supports v.27ter the enum was renamed to
      better reflect this.
      
      ASTERISK-24955 #close
      Reported by: Matt Jordan
      
      Change-Id: I4b9dfb6bf7eff08463ab47ee1a74224f27cae733
      f6091525
  14. Apr 28, 2015
    • Steve Davies's avatar
      res_rtp_asterisk: Resolve 2 discrete memory leaks in DTLS · a9b25f03
      Steve Davies authored
      ao2 ref leak in res_rtp_asterisk.c when a DTLS policy is created.
      The resources are linked into a table, but the original alloc refs
      are never released. ast_strdup leak in rtp_engine.c. If
      ast_rtp_dtls_cfg_copy() is called twice on the same destination struct,
      a pointer to an alloc'd string is overwritten before the string is free'd.
      
      ASTERISK-25022
      Reported by: one47
      
      Change-Id: I62a8ceb8679709f6c3769136dc6aa9a68202ff9b
      a9b25f03
  15. Apr 24, 2015
    • Matt Jordan's avatar
      Clang: Fix some more tautological-compare warnings. · 3bb1e967
      Matt Jordan authored
      clang can warn about a so called tautological-compare, when it finds
      comparisons which are logically always true, and are therefore deemed
      unnecessary.
      
      Example:
      unsigned int x = 4;
      if (x > 0) // x is always going to be bigger than 0
      
      Enum Case:
      Each enumeration is its own type. Enums are an integer type but they do not
      have to be *signed*. C leaves it up to the compiler as an implementation
      option what to consider the integer type of a particular enumeration is.
      Gcc treats an enum without negative values as an int while clang treats this
      enum as an unsigned int.
      
      rmudgett & mmichelson:
      cast the enum to (unsigned int) in assert. The cast does have an effect.
      For gcc, which seems to treat all enums as int, the cast to unsigned int
      will eliminate the possibility of negative values being allowed. For
      clang, which seems to treat enums without any negative members as
      unsigned int, the cast will have no effect. If for some reason in the
      future a negative value is ever added to the enum the assert will still
      catch the negative value.
      
      ASTERISK-24917
      
      Change-Id: Ief23ef68916192b9b72dabe702b543ecfeca0b62
      3bb1e967
  16. Apr 14, 2015
    • George Joseph's avatar
      .gitignore updates for 11 · b44aeb69
      George Joseph authored
      Added bootstrap products
      Added channels/h323/Makefile
      Added res/pjproject
      
      Change-Id: I6b3bc56bf7bdaee0554f36fc2ce3a77e9eaf8aa3
      b44aeb69
  17. Apr 12, 2015
    • George Joseph's avatar
      Add .gitignore and .gitreview files · 7079f53a
      George Joseph authored
      Add the .gitignore and .gitreview files to the asterisk repo.
      
      NB:  You can add local ignores to the .git/info/exclude file
      without having to do a commit.
      
      Common ignore patterns are in the top-level .gitignore file.
      Subdirectory-specific ignore patterns are in their own .gitignore
      files.
      
      Change-Id: I2b7513fc9acf5d432cf9587c25faa9786af14abf
      Tested-by: George Joseph
      7079f53a
  18. Mar 30, 2015
  19. Mar 28, 2015
  20. Mar 25, 2015
  21. Mar 10, 2015
    • Matthew Jordan's avatar
      res/res_config_odbc: Fix improper escaping of backslashes with MySQL · 96400077
      Matthew Jordan authored
      When escaping backslashes with MySQL, the proper way to escape the characters
      in a LIKE clause is to escape the '\' four times, i.e., '\\\\'. To quote the
      MySQL manual:
      
      "Because MySQL uses C escape syntax in strings (for example, “\n” to represent
      a newline character), you must double any “\” that you use in LIKE strings.
      For example, to search for “\n”, specify it as “\\n”. To search for “\”,
      specify it as “\\\\”; this is because the backslashes are stripped once by the
      parser and again when the pattern match is made, leaving a single backslash to
      be matched against."
      
      ASTERISK-24808 #close
      Reported by: Javier Acosta
      patches:
        res_config_odbc.diff uploaded by Javier Acosta (License 6690)
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@432720 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      96400077
  22. Feb 25, 2015
    • David M. Lee's avatar
      Increase WebSocket frame size and improve large read handling · 551b35e8
      David M. Lee authored
      Some WebSocket applications, like [chan_respoke][], require a larger
      frame size than the default 8k; this patch bumps the default to 16k.
      This patch also fixes some problems exacerbated by large frames.
      
      The sanity counter was decremented on every fread attempt in
      ws_safe_read(), regardless of whether data was read from the socket or
      not. For large frames, this could result in loss of sanity prior to
      reading the entire frame. (16k frame / 1448 bytes per segment = 12
      segments).
      
      This patch changes the sanity counter so that it only decrements when
      fread() doesn't read any bytes. This more closely matches the original
      intention of ws_safe_read(), given that the error message is
      "Websocket seems unresponsive".
      
      This patch also properly logs EOF conditions, so disconnects are no
      longer confused with unresponsive connections.
      
       [chan_respoke]: https://github.com/respoke/chan_respoke
      
      Review: https://reviewboard.asterisk.org/r/4431/
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@432236 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      551b35e8
  23. Feb 11, 2015
  24. Feb 09, 2015
  25. Jan 29, 2015
    • Joshua Colp's avatar
      res_rtp_asterisk: Fix DTLS when used with OpenSSL 1.0.1k · 9fe65883
      Joshua Colp authored
      A recent security fix for OpenSSL broke DTLS negotiation for many
      applications. This was caused by read ahead not being enabled when it
      should be. While a commit has gone into OpenSSL to force read ahead
      on for DTLS it may take some time for a release to be made and the
      change to be present in distributions (if at all). As enabling read
      ahead is a simple one line change this commit does that and fixes
      the issue.
      
      ASTERISK-24711 #close
      Reported by: Jared Biel
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@431384 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      9fe65883
  26. Jan 23, 2015
  27. Jan 09, 2015
  28. Dec 19, 2014
  29. Dec 18, 2014
  30. Dec 17, 2014
    • Walter Doekes's avatar
      Fix printf problems with high ascii characters after r413586 (1.8). · 822abf9e
      Walter Doekes authored
      In r413586 (1.8) various casts were added to silence gcc 4.10 warnings.
      Those fixes included things like:
      
          -out += sprintf(out, "%%%02X", (unsigned char) *ptr);
          +out += sprintf(out, "%%%02X", (unsigned) *ptr);
      
      That works for low ascii characters, but for the high range that yields
      e.g. FFFFFFC3 when C3 is expected.
      
      This changeset:
      - fixes those casts to use the 'hh' unsigned char modifier instead
      - consistently uses %02x instead of %2.2x (or other non-standard usage)
      - adds a few 'h' modifiers in various places
      - fixes a 'replcaes' typo
      - dev/urandon typo (in 13+ patch)
      
      Review: https://reviewboard.asterisk.org/r/4263/
      
      ASTERISK-24619 #close
      Reported by: Stefan27 (on IRC)
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@429673 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      822abf9e
  31. Dec 12, 2014
    • Matthew Jordan's avatar
      res/res_agi: Make Verbose message for 'stream file' match other playbacks · 94c6c279
      Matthew Jordan authored
      The Verbose message displayed when a file is played back via 'stream file'
      was formatted differently than other playbacks:
      * It didn't include the channel name
      * It didn't include the channel language
      It does, however, include the playback offset as well as any escape digits.
      That information was kept; however, this patch updates the formatting to more
      closely match the Verbose messages displayed when a file is played back by
      'control stream file', Playback, ControlPlayback, or any other file playback
      operation.
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@429517 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      94c6c279
  32. Dec 10, 2014
  33. Dec 06, 2014
    • Matthew Jordan's avatar
      res/res_monitor: Reset in/out sample counts on Monitor start · 1a934e00
      Matthew Jordan authored
      When repeatedly starting/stopping a Monitor on a channel, the accumulated
      in/out sample counts are never reset to 0. This can cause inadvertent jumps
      in the recordings, as the code in the channel core will determine incorrectly
      that a jump in the recorded file position should occur. Setting the sample
      counts to 0 simply reflects the initial state a Monitor should be in when it
      is started, as this is the initial count that would be on the channels at that
      time.
      
      ASTERISK-24573 #close
      Reported by: Nuno Borges
      patches:
        24573.patch uploaded by Nuno Borges (License 6116)
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@429031 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      1a934e00
  34. Nov 19, 2014
  35. Oct 28, 2014
  36. Oct 27, 2014
  37. Oct 20, 2014
    • Matthew Jordan's avatar
      AST-2014-011: Fix POODLE security issues · 8c96fa29
      Matthew Jordan authored
      There are two aspects to the vulnerability:
      (1) res_jabber/res_xmpp use SSLv3 only. This patch updates the module to use
          TLSv1+. At this time, it does not refactor res_jabber/res_xmpp to use the
          TCP/TLS core, which should be done as an improvement at a latter date.
      (2) The TCP/TLS core, when tlsclientmethod/sslclientmethod is left unspecified,
          will default to the OpenSSL SSLv23_method. This method allows for all
          encryption methods, including SSLv2/SSLv3. A MITM can exploit this by
          forcing a fallback to SSLv3, which leaves the server vulnerable to POODLE.
          This patch adds WARNINGS if a user uses SSLv2/SSLv3 in their configuration,
          and explicitly disables SSLv2/SSLv3 if using SSLv23_method.
      
      For TLS clients, Asterisk will default to TLSv1+ and WARN if SSLv2 or SSLv3 is
      explicitly chosen. For TLS servers, Asterisk will no longer support SSLv2 or
      SSLv3.
      
      Much thanks to abelbeck for reporting the vulnerability and providing a patch
      for the res_jabber/res_xmpp modules.
      
      Review: https://reviewboard.asterisk.org/r/4096/
      
      ASTERISK-24425 #close
      Reported by: abelbeck
      Tested by: abelbeck, opsmonitor, gtjoseph
      patches:
        asterisk-1.8-jabber-tls.patch uploaded by abelbeck (License 5903)
        asterisk-11-jabber-xmpp-tls.patch uploaded by abelbeck (License 5903)
        AST-2014-011-1.8.diff uploaded by mjordan (License 6283)
        AST-2014-011-11.diff uploaded by mjordan (License 6283)
      
      
      git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/11@425986 65c4cc65-6c06-0410-ace0-fbb531ad65f3
      8c96fa29
  38. Oct 16, 2014
Loading