Skip to content
Snippets Groups Projects
  1. Oct 04, 2017
  2. Sep 28, 2017
  3. Sep 27, 2017
  4. Sep 26, 2017
    • George Joseph's avatar
      pjsip_message_filter: Fix regression causing bad contact address · 61ea8722
      George Joseph authored
      The "res_pjsip:  Filter out non SIP(S) requests" commit moved the
      filtering of messages to pjproject's PJSIP_MOD_PRIORITY_TRANSPORT_LAYER
      in order to filter out incoming bad uri schemes as early as possible.
      Since the change affected outgoing messages as well and the TRANSPORT
      layer is the last to be run on outgoing messages, we were overwriting
      the setting of external_signaling_address (which is set earlier by
      res_pjsip_nat) with an internal address.
      
      * pjsip_message_filter now registers itself as a pjproject module
      twice.  Once in the TSX layer for the outgoing messages (as it was
      originally), then a second time in the TRANSPORT layer for the
      incoming messages to catch the invalid uri schemes.
      
      ASTERISK-27295
      Reported by: Sean Bright
      
      Change-Id: I2c90190c43370f8a9d1c4693a19fd65840689c8c
      61ea8722
    • Richard Mudgett's avatar
      res_rtp_asterisk.c: Fix bridge_p2p_rtp_write() reentrancy potential. · 9d65057c
      Richard Mudgett authored
      The bridge_p2p_rtp_write() has potential reentrancy problems.
      
      * Accessing the bridged RTP members must be done with the instance1 lock
      held.  The DTMF and asymmetric codec checks must be split to be done with
      the correct RTP instance struct locked.  i.e., They must be done when
      working on the appropriate side of the point to point bridge.
      
      * Forcing the RTP mark bit was referencing the wrong side of the point to
      point bridge.  The set mark bit is used everywhere else to set the mark
      bit when sending not receiving.
      
      The patches for ASTERISK_26745 and ASTERISK_27158 did not take into
      account that not everything carried by RTP uses a codec.  The telephony
      DTMF events are not exchanged with a codec.  As a result when
      RFC2833/RFC4733 sent digits you would crash if "core set debug 1" is
      enabled, the DTMF digits would always get passed to the core even though
      the local native RTP bridge is active, and the DTMF digits would go out
      using the wrong SSRC id.
      
      * Add protection for non-format payload types like DTMF when updating the
      lastrxformat and lasttxformat.  Also protect against non-format payload
      types when checking for asymmetric codecs.
      
      ASTERISK-27292
      
      Change-Id: I6344ab7de21e26f84503c4d1fca1a41579364186
      9d65057c
    • Sean Bright's avatar
      res_rtp_asterisk: Trim trailing byte off of SDES packet · c9e972a2
      Sean Bright authored
      This could have been fixed by subtracting 1 from the final value of
      'len' but the way the packet was being constructed was confusing so I
      took the opportunity to (I think) make it more clear.
      
      We were sending 1 extra byte at the end of the SDES RTCP packet which
      caused Chrome to complain (in its debug log):
      
          Too little data (1 byte) remaining in buffer to parse
          RTCP header (4 bytes).
      
      We now send the correct number of bytes.
      
      Change-Id: I9dcf087cdaf97da0374ae0acb7d379746a71e81b
      c9e972a2
    • Joshua Colp's avatar
    • Joshua Colp's avatar
    • Joshua Colp's avatar
  5. Sep 25, 2017
  6. Sep 23, 2017
    • Sean Bright's avatar
      app_stream_echo: Don't echo declined streams · 0fad11f2
      Sean Bright authored
      Discovered while experimenting with Cyber Mega Phone 2K Ultimate Dynamic
      Edition after accepting the audio request but declining the video one.
      
      Change-Id: Iaa86d41fccfbc1b559a30ccf740d78a3b5f8a98c
      0fad11f2
  7. Sep 22, 2017
  8. Sep 21, 2017
Loading