Creates a preliminary log tag with the call-id whenever possible.
Changes log level of underlying NG messages to DEBUG.
Does a pretty-printed dump of NG responses.
Closes#73
Squashed commit of the following:
commit cca40e8e31
Author: Richard Fuchs <rfuchs@sipwise.com>
Date: Thu Feb 12 10:17:51 2015 -0500
support per-payload-type stats in kernel module
commit dcc0dc0002
Author: Richard Fuchs <rfuchs@sipwise.com>
Date: Wed Feb 11 12:14:44 2015 -0500
count unknown rtp type as error
commit 941bde0df5
Author: Richard Fuchs <rfuchs@sipwise.com>
Date: Wed Feb 11 12:01:55 2015 -0500
use the list of rtp formats from the m= line
This avoids dynamically altering the rtpstats hash table and makes
keeping packet stats lock free.
commit 9150fed671
Author: Richard Fuchs <rfuchs@sipwise.com>
Date: Fri Feb 6 15:06:04 2015 -0500
fix and simplify rtpmap hash table
commit 1f73741cbf
Author: Richard Fuchs <rfuchs@sipwise.com>
Date: Fri Feb 6 13:56:07 2015 -0500
MT#9935 understand, learn, remember and report RTP payload types (codecs)
commit b0d690837c
Author: Richard Fuchs <rfuchs@sipwise.com>
Date: Thu Nov 20 13:36:25 2014 -0500
parse a=rtpmap attribute
random(), and mutilations of the output of the same, are not suitable
for generating cryptographic keys. Use RAND_bytes() from openssl.
We can do this without seeding during daemon initialization because:
- rtpengine in Linux-specific.
- openssl seeds transparently when /dev/urandom is present.
From RAND_seed(3):
On systems that provide "/dev/urandom", the randomness device is used
to seed the PRNG transparently. However, on all other systems, the
application is responsible for seeding the PRNG by calling RAND_add(),
RAND_egd(3) or RAND_load_file(3).