From 78f9811fda2164f074852c028a3a364d3785ff66 Mon Sep 17 00:00:00 2001 From: Lasse Bang Mikkelsen Date: Thu, 19 Jan 2023 17:05:21 +0100 Subject: [PATCH] Avoid randomizing SDP session version at zero Zero is a valid version for new sessions (mentioned in RFC 2327) and still used by some SIP implementations. --- daemon/sdp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/daemon/sdp.c b/daemon/sdp.c index c77e6db95..47cdad54a 100644 --- a/daemon/sdp.c +++ b/daemon/sdp.c @@ -2715,7 +2715,7 @@ int sdp_replace(struct sdp_chopper *chop, GQueue *sessions, struct call_monologu session->origin.version_output_pos = chop->output->len; if (!monologue->sdp_version) { monologue->sdp_version = session->origin.version_num; - if (monologue->sdp_version == 0 || monologue->sdp_version == ULLONG_MAX) + if (monologue->sdp_version == ULLONG_MAX) monologue->sdp_version = (unsigned int)ssl_random(); }