Skip to content

Commit

Permalink
Mark NULL and AES256CM SRTP ciphers as supported
Browse files Browse the repository at this point in the history
DTLS server checks this list during handshake. Without this change new
NULL and AES256CM SRTP ciphers were ignored.
  • Loading branch information
sirzooro committed Jul 20, 2024
1 parent 8cd9236 commit 48e76cc
Showing 1 changed file with 4 additions and 0 deletions.
4 changes: 4 additions & 0 deletions pkg/protocol/extension/srtp_protection_profile.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,10 @@ func srtpProtectionProfiles() map[SRTPProtectionProfile]bool {
return map[SRTPProtectionProfile]bool{
SRTP_AES128_CM_HMAC_SHA1_80: true,
SRTP_AES128_CM_HMAC_SHA1_32: true,
SRTP_AES256_CM_SHA1_80: true,
SRTP_AES256_CM_SHA1_32: true,
SRTP_NULL_HMAC_SHA1_80: true,
SRTP_NULL_HMAC_SHA1_32: true,
SRTP_AEAD_AES_128_GCM: true,
SRTP_AEAD_AES_256_GCM: true,
}
Expand Down

0 comments on commit 48e76cc

Please sign in to comment.