diff --git a/channels/pjsip/dialplan_functions.c b/channels/pjsip/dialplan_functions.c index 8dd30a5..6c0e5c7 100644 --- a/channels/pjsip/dialplan_functions.c +++ b/channels/pjsip/dialplan_functions.c @@ -530,7 +530,13 @@ static int channel_read_rtp(struct ast_channel *chan, const char *type, const ch } else if (!strcmp(type, "direct")) { ast_copy_string(buf, ast_sockaddr_stringify(&media->direct_media_addr), buflen); } else if (!strcmp(type, "secure")) { - snprintf(buf, buflen, "%d", media->srtp ? 1 : 0); + if(media->srtp) { + struct ast_sdp_srtp *srtp = media->srtp; + int flag = ast_test_flag( srtp, AST_SRTP_CRYPTO_OFFER_OK); + snprintf(buf, buflen, "%d", flag ? 1 : 0); + } else { + snprintf(buf, buflen, "%d", 0); + } } else if (!strcmp(type, "hold")) { snprintf(buf, buflen, "%d", media->held ? 1 : 0); } else { diff --git a/main/sdp_srtp.c b/main/sdp_srtp.c index 2b83eee..1298570 100644 --- a/main/sdp_srtp.c +++ b/main/sdp_srtp.c @@ -350,7 +350,6 @@ int ast_sdp_crypto_process(struct ast_rtp_instance *rtp, struct ast_sdp_srtp *sr if (!memcmp(crypto->remote_key, remote_key, sizeof(crypto->remote_key))) { ast_debug(1, "SRTP remote key unchanged; maintaining current policy\n"); - ast_set_flag(srtp, AST_SRTP_CRYPTO_OFFER_OK); return 0; } memcpy(crypto->remote_key, remote_key, sizeof(crypto->remote_key));