dtls_srtp_stop_timeout_timer(instance, rtp, 1);
ao2_lock(instance);
- if (rtp->rtcp->dtls.ssl && (rtp->rtcp->dtls.ssl != ssl)) {
- SSL_free(rtp->rtcp->dtls.ssl);
+ if (rtp->rtcp->dtls.ssl) {
+ if (rtp->rtcp->dtls.ssl != ssl) {
+ SSL_free(rtp->rtcp->dtls.ssl);
+ }
rtp->rtcp->dtls.ssl = NULL;
}
}
* to activating RTP. It is not until RTP is activated that timers start for RTCP
* transmission
*/
- if (rtp->rtcp->s > -1) {
+ if (rtp->rtcp->s > -1 && rtp->rtcp->s != rtp->s) {
close(rtp->rtcp->s);
}
rtp->rtcp->s = rtp->s;
ast_rtp_instance_get_remote_address(instance, &addr);
ast_sockaddr_copy(&rtp->rtcp->them, &addr);
#ifdef HAVE_OPENSSL_SRTP
- if (rtp->rtcp->dtls.ssl) {
+ if (rtp->rtcp->dtls.ssl && rtp->rtcp->dtls.ssl != rtp->dtls.ssl) {
SSL_free(rtp->rtcp->dtls.ssl);
}
rtp->rtcp->dtls.ssl = rtp->dtls.ssl;
}
ast_debug(1, "Setup RTCP on RTP instance '%p'\n", instance);
- return;
} else {
if (rtp->rtcp) {
if (rtp->rtcp->schedid > -1) {
close(rtp->rtcp->s);
}
#ifdef HAVE_OPENSSL_SRTP
+ ao2_unlock(instance);
+ dtls_srtp_stop_timeout_timer(instance, rtp, 1);
+ ao2_lock(instance);
+
if (rtp->rtcp->dtls.ssl && rtp->rtcp->dtls.ssl != rtp->dtls.ssl) {
SSL_free(rtp->rtcp->dtls.ssl);
}
ast_free(rtp->rtcp);
rtp->rtcp = NULL;
}
- return;
}
}
-
- return;
}
/*! \pre instance is locked */