fix regression in rtp stack trying to avoid broken clients who send the wrong payload type, we were eating the stun packets in jingle calls
This commit is contained in:
parent
17d5211280
commit
0bce777a4a
|
@ -2808,7 +2808,8 @@ static int rtp_common_read(switch_rtp_t *rtp_session, switch_payload_t *payload_
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (bytes && !switch_test_flag(rtp_session, SWITCH_RTP_FLAG_PROXY_MEDIA) && !switch_test_flag(rtp_session, SWITCH_RTP_FLAG_UDPTL) &&
|
if (bytes && rtp_session->recv_msg.header.version == 2 &&
|
||||||
|
!switch_test_flag(rtp_session, SWITCH_RTP_FLAG_PROXY_MEDIA) && !switch_test_flag(rtp_session, SWITCH_RTP_FLAG_UDPTL) &&
|
||||||
rtp_session->recv_msg.header.pt != 13 &&
|
rtp_session->recv_msg.header.pt != 13 &&
|
||||||
rtp_session->recv_msg.header.pt != rtp_session->recv_te &&
|
rtp_session->recv_msg.header.pt != rtp_session->recv_te &&
|
||||||
(!rtp_session->cng_pt || rtp_session->recv_msg.header.pt != rtp_session->cng_pt) &&
|
(!rtp_session->cng_pt || rtp_session->recv_msg.header.pt != rtp_session->cng_pt) &&
|
||||||
|
|
Loading…
Reference in New Issue