]> git.ipfire.org Git - thirdparty/asterisk.git/commitdiff
Don't leak SIP username information
authorTerry Wilson <twilson@digium.com>
Tue, 28 Jun 2011 20:03:19 +0000 (20:03 +0000)
committerTerry Wilson <twilson@digium.com>
Tue, 28 Jun 2011 20:03:19 +0000 (20:03 +0000)
git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/1.4@325275 65c4cc65-6c06-0410-ace0-fbb531ad65f3

channels/chan_sip.c

index f5413ce79698a75bf005709c959d1caae48a3eed..563f375490185928e493c1a3c535966f5e351526 100644 (file)
@@ -9793,14 +9793,14 @@ static void transmit_fake_auth_response(struct sip_pvt *p, int sipmethod, struct
        if (ast_test_flag(req, SIP_PKT_IGNORE) && !ast_strlen_zero(p->randdata) && ast_strlen_zero(authtoken)) {
                /* This is a retransmitted invite/register/etc, don't reconstruct authentication
                 * information */
-               transmit_response_with_auth(p, response, req, p->randdata, 0, respheader, 0);
+               transmit_response_with_auth(p, response, req, p->randdata, reliable, respheader, 0);
                /* Schedule auto destroy in 32 seconds (according to RFC 3261) */
                sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);
                return;
        } else if (ast_strlen_zero(p->randdata) || ast_strlen_zero(authtoken)) {
                /* We have no auth, so issue challenge and request authentication */
                set_nonce_randdata(p, 1);
-               transmit_response_with_auth(p, response, req, p->randdata, 0, respheader, 0);
+               transmit_response_with_auth(p, response, req, p->randdata, reliable, respheader, 0);
                /* Schedule auto destroy in 32 seconds */
                sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);
                return;