if (!(packet[0] || packet[1] || packet[2] || packet[3]) && len >= 8) {
packet += 4;
- len -= 4;
switch_log_printf(SWITCH_CHANNEL_SESSION_LOG(rtp_session->session), SWITCH_LOG_WARNING, "DTMF payload offset by 4 bytes.\n");
}
}
}
#ifdef DEBUG_2833
+ if (!(packet[0] || packet[1] || packet[2] || packet[3]) && len >= 8) {
+ len -= 4;
+ }
switch_log_printf(SWITCH_CHANNEL_LOG, SWITCH_LOG_ERROR, "packet[%d]: %02x %02x %02x %02x\n", (int) len, (unsigned char) packet[0], (unsigned char) packet[1], (unsigned char) packet[2], (unsigned char) packet[3]);
#endif
cur_nack[n] = 0;
}
rtp_session->prev_nacks_inflight = n;
- nack_ttl = 0;
}
if (rtp_session->fir_count) {
if (rtp_session->flags[SWITCH_RTP_FLAG_NACK] && stat == srtp_err_status_replay_fail) {
/* false alarm nack */
switch_log_printf(SWITCH_CHANNEL_SESSION_LOG(rtp_session->session), SWITCH_LOG_DEBUG1, "REPLAY ERR, FALSE NACK\n");
- stat = 0;
sbytes = 0;
*bytes = 0;
if (rtp_session->stats.rtcp.pkt_count) {
WRITE_INC(rtp_session);
if (process_encryption) {
- process_encryption = SWITCH_FALSE;
#ifdef ENABLE_SRTP
if (rtp_session->flags[SWITCH_RTP_FLAG_SECURE_SEND]) {