]> git.ipfire.org Git - thirdparty/asterisk.git/commitdiff
During OPTIONS authentication, the authpeer does not need to be returned for any...
authorDavid Vossel <dvossel@digium.com>
Fri, 3 Sep 2010 18:03:23 +0000 (18:03 +0000)
committerDavid Vossel <dvossel@digium.com>
Fri, 3 Sep 2010 18:03:23 +0000 (18:03 +0000)
git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/1.8@284952 65c4cc65-6c06-0410-ace0-fbb531ad65f3

channels/chan_sip.c

index 08a803a635fd28917b601752ceb72c057c487b84..5f6ce761651f79eb8b01951c7fbd216d3d531494 100644 (file)
@@ -20471,7 +20471,6 @@ static int handle_request_notify(struct sip_pvt *p, struct sip_request *req, str
 static int handle_request_options(struct sip_pvt *p, struct sip_request *req, struct ast_sockaddr *addr, const char *e)
 {
        int res;
-       struct sip_peer *authpeer = NULL;       /* Matching Peer */
 
        if (p->lastinvite) {
                /* if this is a request in an active dialog, just confirm that the dialog exists. */
@@ -20483,7 +20482,7 @@ static int handle_request_options(struct sip_pvt *p, struct sip_request *req, st
                /* Do authentication if this OPTIONS request began the dialog */
                copy_request(&p->initreq, req);
                set_pvt_allowed_methods(p, req);
-               res = check_user_full(p, req, SIP_OPTIONS, e, XMIT_UNRELIABLE, addr, &authpeer);
+               res = check_user(p, req, SIP_OPTIONS, e, XMIT_UNRELIABLE, addr);
                if (res == AUTH_CHALLENGE_SENT) {
                        sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);
                        return 0;