[test-results] [Bamboo] Asterisk Testing > Asterisk 1.8 Branch > #380 was SUCCESSFUL (with 360 tests). Change made by Matthew Jordan.

Bamboo bamboo at asterisk.org
Sun Sep 9 19:49:48 CDT 2012


-----------------------------------------------------------------------
Asterisk Testing > Asterisk 1.8 Branch > #380 was successful.
-----------------------------------------------------------------------
Code has been updated by Matthew Jordan.
All 2 jobs passed with 360 tests in total.

http://bamboo.asterisk.org/browse/TESTING-ASTERISK18BRANCH-380/


--------------
Code Changes
--------------
Matthew Jordan (372709):

>Only re-create an SRTP session when needed; respond with correct crypto policy
>
>In r356604, SRTP handling was fixed to accomodate multiple crypto keys in an
>SDP offer and the ability to re-create an SRTP session when the crypto keys
>changed.  In certain circumstances - most notably when a phone is put on
>hold after having been bridged for a significant amount of time - the act
>of re-creating the SRTP session causes problems for certain models of phones.
>The patch committed in r356604 always re-created the SRTP session regardless
>of whether or not the cryptographic keys changed.  Since this is technically
>not necessary, this patch modifies the behavior to only re-create the SRTP
>session if Asterisk detects that the remote key has changed.  This allows
>models of phones that do not handle the SRTP session changing to continue
>to work, while also providing the behavior needed for those phones that do
>re-negotiate cryptographic keys.
>
>In addition, in Asterisk 1.8 only, it was found that phones that offer
>AES_CM_128_HMAC_SHA1_32 will end up with no audio if the phone is the
>initiator of the call.  The phone will send an INVITE request specifying
>that AES_CM_128_HMAC_SHA1_32 be used for the cryptographic policy; Asterisk
>will set its policy to that value.  Unfortunately, when the call is Answered
>and a 200 OK is sent back to the UA, the policy sent in the response's SDP
>will be the hard coded value AES_CM_128_HMAC_SHA1_80.  This potentially
>results in Asterisk using the INVITE request's policy of
>AES_CM_128_HMAC_SHA1_32, while the phone uses Asterisk's response of
>AES_CM_128_HMAC_SHA1_80.  Hilarity ensues as both endpoints think the other
>is crazy.
>
>This patch fixes that by caching the policy from the request and responding
>with it.  Note that this is not a problem in Asterisk 10 and later, as the
>ability to configure the policy was added in that version.
>
>(issue ASTERISK-20194)
>Reported by: Nicolo Mazzon
>Tested by: Nicolo Mazzon
>
>Review: https://reviewboard.asterisk.org/r/2099
>
>



--------------
Tests
--------------
Fixed Tests (2)
   - AsteriskTestSuite: S/apps/voicemail/check voicemail forward
   - AsteriskTestSuite: S/cdr/console dial sip congestion

--
This message is automatically generated by Atlassian Bamboo
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.digium.com/pipermail/test-results/attachments/20120909/83031f05/attachment-0001.htm>


More information about the Test-results mailing list