[asterisk-bugs] [Asterisk 0015849]: Recent change to peer_iphash_cb breaks peer matching
Asterisk Bug Tracker
noreply at bugs.digium.com
Tue Sep 8 10:00:44 CDT 2009
A NOTE has been added to this issue.
======================================================================
https://issues.asterisk.org/view.php?id=15849
======================================================================
Reported By: Nick_Lewis
Assigned To: dvossel
======================================================================
Project: Asterisk
Issue ID: 15849
Category: Channels/chan_sip/Interoperability
Reproducibility: have not tried
Severity: major
Priority: normal
Status: feedback
Asterisk Version: SVN
Regression: No
SVN Branch (only for SVN checkouts, not tarball releases): trunk
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2009-09-08 04:05 CDT
Last Modified: 2009-09-08 10:00 CDT
======================================================================
Summary: Recent change to peer_iphash_cb breaks peer matching
Description:
A change has been made to the chan_sip.c function peer_iphash_cb to remove
hashing on the port number. It is not clear why this change was made but it
may be indirectly related to a tcp/tls matching issue. However the change
breaks udp peer matching.
======================================================================
----------------------------------------------------------------------
(0110313) Nick_Lewis (reporter) - 2009-09-08 10:00
https://issues.asterisk.org/view.php?id=15849#c110313
----------------------------------------------------------------------
>The hash function doesn't change matching directly.
Sorry, I was misunderstanding the implications of a duplicate hash. I will
study ao2_t_link/find until I understand it correctly. Please close this
issue
Issue History
Date Modified Username Field Change
======================================================================
2009-09-08 10:00 Nick_Lewis Note Added: 0110313
======================================================================
More information about the asterisk-bugs
mailing list