Skip to content

Commit

Permalink
Mark NULL and AES256CM SRTP ciphers as supported
Browse files Browse the repository at this point in the history
DTLS server checks this list during handshake. Without this change new
NULL and AES256CM SRTP ciphers were ignored.
  • Loading branch information
sirzooro committed Jul 20, 2024
1 parent bc3159a commit b843623
Showing 1 changed file with 4 additions and 0 deletions.
4 changes: 4 additions & 0 deletions pkg/protocol/extension/srtp_protection_profile.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,10 @@ func srtpProtectionProfiles() map[SRTPProtectionProfile]bool {
return map[SRTPProtectionProfile]bool{
SRTP_AES128_CM_HMAC_SHA1_80: true,
SRTP_AES128_CM_HMAC_SHA1_32: true,
SRTP_AES256_CM_SHA1_80: true,
SRTP_AES256_CM_SHA1_32: true,
SRTP_NULL_HMAC_SHA1_80: true,
SRTP_NULL_HMAC_SHA1_32: true,

Check warning on line 28 in pkg/protocol/extension/srtp_protection_profile.go

View check run for this annotation

Codecov / codecov/patch

pkg/protocol/extension/srtp_protection_profile.go#L25-L28

Added lines #L25 - L28 were not covered by tests
SRTP_AEAD_AES_128_GCM: true,
SRTP_AEAD_AES_256_GCM: true,
}
Expand Down

0 comments on commit b843623

Please sign in to comment.