From 327ddd7a6e618c1f35d3b30c20e159e500631c52 Mon Sep 17 00:00:00 2001 From: Lasse Bang Mikkelsen Date: Thu, 19 Jan 2023 17:05:21 +0100 Subject: [PATCH] Avoid randomizing SDP session version at zero Zero is a valid version for new sessions (mentioned in RFC 2327) and still used by some SIP implementations. (cherry picked from commit 78f9811fda2164f074852c028a3a364d3785ff66) --- daemon/sdp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/daemon/sdp.c b/daemon/sdp.c index e5d22277a..fbd727a46 100644 --- a/daemon/sdp.c +++ b/daemon/sdp.c @@ -2488,7 +2488,7 @@ int sdp_replace(struct sdp_chopper *chop, GQueue *sessions, struct call_monologu session->origin.version_output_pos = chop->output->len; if (!monologue->sdp_version) { monologue->sdp_version = session->origin.version_num; - if (monologue->sdp_version == 0 || monologue->sdp_version == ULLONG_MAX) + if (monologue->sdp_version == ULLONG_MAX) monologue->sdp_version = (unsigned int)ssl_random(); }