Commit Graph

26333 Commits

Author SHA1 Message Date
Brian West f7be96396b add missing flags after refactor 2014-03-06 10:49:43 -06:00
Travis Cross 2fdaa1c0e8 Fix use of out of scope declaration 2014-03-06 08:45:23 +00:00
Travis Cross 7cde2adcb7 Fix minor edge case in switch_split_user_domain
If the input started with 'sip:sips:' it would have been incorrectly
parsed.
2014-03-06 06:03:27 +00:00
Brian West ea313038f2 React to all suites in the defaults and set true to accept the strongest offer received 2014-03-05 21:34:05 -06:00
Brian West 8807e8fa02 Spacing 2014-03-05 21:21:59 -06:00
Brian West 8450641332 THIS JUST IN rtp_secure_media_suites option 2014-03-05 21:21:05 -06:00
Anthony Minessale 656cb2ac03 add optional rtp_secure_media_suites variable clobbered by rtp_secure_media with mandatory|optional:<suites> 2014-03-06 08:17:22 +05:00
Brian West 9611390244 spacing 2014-03-05 21:16:26 -06:00
Brian West 1f0966336a default if not set is 2014-03-05 21:08:39 -06:00
Brian West 4420bf4b91 Documentation for recent SRTP changes 2014-03-05 21:04:42 -06:00
Anthony Minessale 1d733235a5 remove unused stuff from last commit 2014-03-06 07:41:39 +05:00
Anthony Minessale e5b291514c FS-5755
rtp_secure_media=mandatory
rtp_secure_media=optional
rtp_secure_media=mandatory:AES_CM_256_HMAC_SHA1_80,AES_CM_256_HMAC_SHA1_32
rtp_secure_media=optional:AES_CM_256_HMAC_SHA1_80
rtp_secure_media=forbidden

true implies mandatory
false implies forbidden
not set implies optional

rtp_secure_media_inbound or rtp_secure_media_outbound take precedence and are treated the same way based on leg direction
2014-03-06 07:34:47 +05:00
Ken Rice eba0cb5f0f FS-6286 --resolve Thanks to Tom Parrott 2014-03-05 17:56:04 -06:00
Anthony Minessale d3121d930e switch_false currently returns false on NULL 2014-03-05 17:36:35 -06:00
Travis Cross 1990d10057 Reword the websocket TLS cipher list
This generates an identical list of cipher suites, but this commit
restates the cipher spec to be more similar to the way we state it
elsewhere.
2014-03-05 21:37:30 +00:00
Travis Cross 6a3dcc9e0f Drop null-auth suites from our default TLS cipher list
Previously we disallowed anonymous Diffie-Hellman, but there are other
kinds of null-authentication TLS suites.  In particular, disallowing
AECDH is important now that we support elliptic-curve Diffie-Hellman.
2014-03-05 21:37:30 +00:00
Anthony Minessale 4cf14bce50 FS-5814 2014-03-06 00:31:10 +05:00
Anthony Minessale fe2a4bfa53 FS-5814 2014-03-05 13:12:02 -06:00
Anthony Minessale 5dbdbda0e7 force sofia rebuild 2014-03-06 00:03:20 +05:00
Anthony Minessale 7cb91467e0 FS-5814 --resolve 2014-03-06 00:02:40 +05:00
Anthony Minessale 066de4b378 Port commit from gitorious copy of sofia-sip our code now differs but this issue would still be a concern for OS X
commit ee51fa4e2993ab71339e29691aec8b924c810c53
Author: Frode Isaksen <frode.isaksen@bewan.com>
Date:   Thu Aug 18 16:40:58 2011 +0300

    su: fix su_time() on 64-bit OS X

        The field tv_sec in struct timeval is 64bits instead of 32bits as in
	    su_time_t, so you cannot cast su_time_t to struct timeval.
2014-03-05 10:25:39 -06:00
Brian West 6ed4ad7e20 Pass down into esl the LDFLAGS, fixes finding libncurses on NetBSD too. 2014-03-05 06:21:53 -06:00
Brian West 039f28d136 We do not use the cpp lib so why compile it. 2014-03-05 06:19:43 -06:00
Brian West 49fe796dab These options aren't valid for apr-util configure
configure: WARNING: unrecognized options: --disable-shared, --with-pic
2014-03-05 06:18:40 -06:00
Brian West 783a4083ed configure: error: could not detect a 64-bit integer type
NetBSD dagonet.omniscient.local 6.1.3 NetBSD 6.1.3 (GENERIC_HZ) #1: Sat Mar 1 19:18:46 EST 2014 met@dagonet.omniscient.local:/data/netbsd/obj/usr/src/sys/arch/i386/compile/GENERIC_HZ i386

Failure due to test programs have "Shared object "libXXX.so.X" not found"

Adding -Wl,-rpath,/usr/pkg/lib to LDFLAGS for NetBSD
2014-03-05 05:15:32 -06:00
Travis Cross 74775d4397 Revert conference "tool" misfeature
This was added as part of a mass copyright header update in commit
6e7d5d089.  That's obviously not the right way to add features, so
we're reverting this.

If this feature is actually desired, it should be added in its own
commit, properly described in the commit message, and documented.

(The commit added a "tool" flag that could be applied to a conference
participant to mess with that person by disrupting his or her audio.)

This partially reverts commit 6e7d5d0897.

This feature earlier tried to sneak in under the guise of a whitespace
cleanup in commit a000749e70 which
Anthony reverted at commit a24f9aa8bc.

Let's not play these games.
2014-03-05 03:29:10 +00:00
Chris Rienzo 286d2aef29 FS-6304 mod_rayo- fix race condition on outbound calls 2014-03-04 22:12:43 -05:00
Giovanni Maruzzelli 4d8866a7cf gsmopen: added driver_usb_dongle directory, for building a working and stable 'option' modem serial driver for 2.6.32 kernels (eg: Proxmox, OpenVZ) 2014-03-05 02:06:03 +01:00
Anthony Minessale 6ae038add3 FS-5755 84c0680153 is wrong. It made optional enforce crypto. 2014-03-04 19:07:54 -06:00
William King fd38a255f8 FS-6167 --resolve 2014-03-04 13:41:34 -08:00
William King 3d461d7cde FS-1327 --resolve 2014-03-04 13:09:51 -08:00
William King 138224d816 FS-6303 --resolve 2014-03-04 12:30:14 -08:00
Marc Olivier Chouinard 84c0680153 FS-5755 Fix regression if rtp_secure_media=false, it will force encryption. 2014-03-04 09:42:17 -05:00
Travis Cross 411a76020a Improve channel variable name to srtp_allow_idle_gaps
This was momentarily called force_send_silence_when_idle, but that was
non-obvious as you had to set that value to true to be able to not
send silence when idle.  This name describes the purpose much better.
2014-03-04 01:51:04 +00:00
Travis Cross 680bc46768 Avoid repeating ourselves in generating silence
We were handling the "send silence but not comfort noise" case in both
silence_stream_file_read and switch_generate_sln_silence.  This
changes the former to rely on the latter.
2014-03-04 00:16:43 +00:00
Travis Cross 5a7ea956b9 Add force_send_silence_when_idle channel variable
If set to true, this prevents us from overriding the value of
send_silence_when_idle.  When that is unset or set to zero and SRTP is
engaged, we typically override the value because many devices can't
handle gaps in the SRTP stream.

This variable is mostly for testing whether particular devices can
handle this behavior.  Use at your own risk.
2014-03-04 00:09:02 +00:00
Chris Rienzo e650939b25 FS-6296 --resolve mod_rayo: fixed crash on <prompt> bad request 2014-03-03 19:01:28 -05:00
Travis Cross 20da552564 Preserve value of send_silence_when_idle if possible
In commit 55d01d3def we set
send_silence_when_idle to -1 rather than 400 when SRTP is engaged.
But this left no way to enable white noise silence when desired.

When SRTP is engaged we can't simply not send RTP because it breaks
too many devices.  So we need to prevent send_silence_when_idle from
being unset or being set to zero.  This change allows it to be set to
other values so as to feed white noise rather than all zeros into the
codec.
2014-03-03 23:43:29 +00:00
Travis Cross 11ca1a2b2e Fix handling of send_silence_when_idle==0 in switch_ivr_sleep
When the channel variable send_silence_when_idle was set to zero,
switch_ivr_sleep was calling SWITCH_IVR_VERIFY_SILENCE_DIVISOR on it
anyway, causing it to be set to 400.  The only way to get the behavior
of not sending silence when idle was to unset the variable completely.

This corrects the behavior such that setting the value to zero has the
same effect as leaving it unset.
2014-03-03 23:21:58 +00:00
Michael Jerris 3dd36873b5 silence autoconf warnings 2014-03-03 13:10:59 -05:00
Anthony Minessale 6ef3f7bde7 add timeout <seconds> to mod_curl api call 2014-03-03 22:58:45 +05:00
Michael Jerris 07399e213f fix missing type definitions 2014-03-03 08:26:54 -05:00
Michael Jerris ae216daf02 fix warning abount comment inside comment 2014-03-03 08:26:54 -05:00
Travis Cross ecd6dfc612 Output newline after json output in mod_json_cdr
In UNIX, text files by definition end with a newline.
2014-03-03 01:13:39 +00:00
Travis Cross 95e4163ab7 Handle too-short write(3)s in mod_json_cdr
write(3) can write fewer bytes than was requested for any number of
reasons.  The correct behavior is to retry unless there is an error.

If there is an error, try to unlink the file; no sense in leaving
corrupted data laying around.
2014-03-03 01:12:15 +00:00
Travis Cross b04bbc6ca5 Fix FHS default modulesdir define
The default value of libdir is (unexpanded) '${exec_prefix}/lib'.  In
the non-FHS path this is fine because it only ends up in a variable
where it will be expanded later.  By using this to define modulesdir
we let it slip into a define where it made no sense.
2014-03-02 23:55:06 +00:00
Travis Cross ab35096833 Fix FHS default sysconfdir 2014-03-02 23:03:13 +00:00
Travis Cross 75a00bd954 Fix memory leak in mod_json_cdr 2014-03-02 22:02:07 +00:00
Brian West a7bf6f8dc1 Reverting FS-6292, pending more details from an end user thats working on this 2014-03-02 11:23:07 -06:00
Travis Cross 164d6a7bf5 Optimize switch_split_user_domain a bit
This avoids searching the string repeatedly with strchr.
2014-03-02 09:43:14 +00:00