Skip to content

Commit

Permalink
Mark NULL and AES256CM SRTP ciphers as supported
Browse files Browse the repository at this point in the history
DTLS server checks this list during handshake. Without this change new
NULL and AES256CM SRTP ciphers were ignored.
  • Loading branch information
sirzooro authored and Sean-Der committed Jul 20, 2024
1 parent bc3159a commit 6178064
Showing 1 changed file with 4 additions and 0 deletions.
4 changes: 4 additions & 0 deletions pkg/protocol/extension/srtp_protection_profile.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,10 @@ func srtpProtectionProfiles() map[SRTPProtectionProfile]bool {
return map[SRTPProtectionProfile]bool{
SRTP_AES128_CM_HMAC_SHA1_80: true,
SRTP_AES128_CM_HMAC_SHA1_32: true,
SRTP_AES256_CM_SHA1_80: true,
SRTP_AES256_CM_SHA1_32: true,
SRTP_NULL_HMAC_SHA1_80: true,
SRTP_NULL_HMAC_SHA1_32: true,
SRTP_AEAD_AES_128_GCM: true,
SRTP_AEAD_AES_256_GCM: true,
}
Expand Down

0 comments on commit 6178064

Please sign in to comment.