From 48e76cc261c359aa3f14e32471d43993202faf29 Mon Sep 17 00:00:00 2001 From: sirzooro Date: Sat, 20 Jul 2024 11:57:35 +0200 Subject: [PATCH] Mark NULL and AES256CM SRTP ciphers as supported DTLS server checks this list during handshake. Without this change new NULL and AES256CM SRTP ciphers were ignored. --- pkg/protocol/extension/srtp_protection_profile.go | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/pkg/protocol/extension/srtp_protection_profile.go b/pkg/protocol/extension/srtp_protection_profile.go index 131ae532..75a8c2ee 100644 --- a/pkg/protocol/extension/srtp_protection_profile.go +++ b/pkg/protocol/extension/srtp_protection_profile.go @@ -22,6 +22,10 @@ func srtpProtectionProfiles() map[SRTPProtectionProfile]bool { return map[SRTPProtectionProfile]bool{ SRTP_AES128_CM_HMAC_SHA1_80: true, SRTP_AES128_CM_HMAC_SHA1_32: true, + SRTP_AES256_CM_SHA1_80: true, + SRTP_AES256_CM_SHA1_32: true, + SRTP_NULL_HMAC_SHA1_80: true, + SRTP_NULL_HMAC_SHA1_32: true, SRTP_AEAD_AES_128_GCM: true, SRTP_AEAD_AES_256_GCM: true, }