- 04 4月, 2014 1 次提交
-
-
由 Anthony Minessale 提交于
-
- 03 4月, 2014 2 次提交
-
-
由 Anthony Minessale 提交于
This commit also reverts 2 previous attempts to fix this very rare race issue spanning back to 2009 62ce8538 Patch from MOC 3a85348c FS-2302 mutex added around switch_xml_toxml() The real problem was switch_xml_toxml_buf() was actually temporarily modifying the xml structure being searialized to make it appaer to be a root structure then serializing it and restoring the pointers. This caused a non-threadsafe operation when some other thread was scanning the same xml structure. This patch removes the modification and instead passes a new arg to switch_xml_toxml_r indicating to treat the structure as if it were a root structure. This bug has been present since the induction of xml into FS. Conflicts: src/switch_xml.c
-
由 Brian West 提交于
-
- 02 4月, 2014 1 次提交
-
-
由 Anthony Minessale 提交于
-
- 31 3月, 2014 3 次提交
-
-
由 Anthony Minessale 提交于
-
由 Anthony Minessale 提交于
-
由 Anthony Minessale 提交于
-
- 26 3月, 2014 2 次提交
-
-
由 Raymond Chandler 提交于
-
由 Ico 提交于
ESL-88 --resolve Signed-off-by:
Travis Cross <tc@traviscross.com>
-
- 19 3月, 2014 1 次提交
-
-
由 Seven Du 提交于
-
- 18 3月, 2014 1 次提交
-
-
由 Chris Rienzo 提交于
-
- 17 3月, 2014 3 次提交
-
-
由 Ken Rice 提交于
-
由 Anthony Minessale 提交于
-
由 Anthony Minessale 提交于
-
- 16 3月, 2014 1 次提交
-
-
由 Travis Cross 提交于
If an attacker can cause a device to make an authenticated request to a service via TLS while including a payload of the attacker's choice in that request, and if TLS compression is enabled, the attacker can uncover the plaintext authentication information by making a series of guesses and observing changes in the length of the ciphertext. This is CVE-2012-4929. FS-6360 --resolve Thanks-to: Brian West <brian@freeswitch.org>
-
- 14 3月, 2014 8 次提交
-
-
由 Chris Rienzo 提交于
-
由 Chris Rienzo 提交于
mod_rayo: add new config pause-when-offline - will pause inbound calling if there are no online clients to handle calls. This is useful if you want FS to respond 503 to options ping when there are no online rayo clients. Default behavior is to disable this param.
-
由 Chris Rienzo 提交于
-
由 Chris Rienzo 提交于
-
由 Anthony Minessale 提交于
Conflicts: src/mod/endpoints/mod_sofia/sofia.c
-
由 Anthony Minessale 提交于
-
由 Anthony Minessale 提交于
-
由 Anthony Minessale 提交于
FS-6287 --resolve When a broken registrar sends a 401 unauth then replies with a subsequent 401 unauth without the stale=true attribute, sofia tries to invalidate the auth handle and get stuck in a state where it cannot recover until the reg handle is destroyed. In this case, the provider in question has a bug on thier end when the nonce count rolls from nc=000000ff to nc=00000100 they start sending several consecitive 401 rather than a 401 with stale=true or a 403. This change will allow it to reset properly and try again with nc=00000001 on the next try.
-
- 13 3月, 2014 2 次提交
-
-
由 Chris Rienzo 提交于
-
由 Chris Rienzo 提交于
-
- 12 3月, 2014 1 次提交
-
-
由 Brian West 提交于
-
- 11 3月, 2014 2 次提交
-
-
由 Anthony Minessale 提交于
Conflicts: libs/sofia-sip/.update
-
由 Chris Rienzo 提交于
-
- 10 3月, 2014 6 次提交
-
-
由 Chris Rienzo 提交于
-
由 Simon Wunderlich 提交于
Cisco 7925G seem to work only with the correct conference_id2 and rtptimeout set, so add protocol 11 definition fields and set conference_id2 correctly. Signed-off-by:
Simon Wunderlich <sw@simonwunderlich.de> Signed-off-by:
Nathan Neulinger <nneul@neulinger.org>
-
由 Simon Wunderlich 提交于
Cisco 7925g send access status message with just 8 byte of payload data. Since we don't interpret the unknown 3rd field anyway, remove it. This will prevent the first register to fail. Signed-off-by:
Simon Wunderlich <sw@simonwunderlich.de> Signed-off-by:
Nathan Neulinger <nneul@neulinger.org>
-
由 Simon Wunderlich 提交于
WiFi phones like the 7925g may take longer than just one second to acknowledge the open receive message. Increase the timeout to 5 seconds. Signed-off-by:
Simon Wunderlich <sw@simonwunderlich.de> Signed-off-by:
Nathan Neulinger <nneul@neulinger.org>
-
由 Chris Rienzo 提交于
-
由 Anthony Minessale 提交于
-
- 09 3月, 2014 3 次提交
-
-
由 Brian West 提交于
warning: passing argument 1 of 'SSL_CIPHER_description' discards qualifiers from pointer target type
-
由 Chris Rienzo 提交于
-
由 Chris Rienzo 提交于
-
- 07 3月, 2014 1 次提交
-
-
由 Anthony Minessale 提交于
Conflicts: src/mod/endpoints/mod_sofia/sofia.c
-
- 06 3月, 2014 2 次提交
-
-
由 Travis Cross 提交于
-
由 Travis Cross 提交于
If the input started with 'sip:sips:' it would have been incorrectly parsed.
-