Index: pc/srtptransport.cc |
diff --git a/pc/srtptransport.cc b/pc/srtptransport.cc |
index 64889c65f69be77c77049615d76a3c73204953e8..f3b5309e37c0c56faefb81740b96cfcde6dae61e 100644 |
--- a/pc/srtptransport.cc |
+++ b/pc/srtptransport.cc |
@@ -174,42 +174,25 @@ |
int recv_cs, |
const uint8_t* recv_key, |
int recv_key_len) { |
- // If parameters are being set for the first time, we should create new SRTP |
- // sessions and call "SetSend/SetRecv". Otherwise we should call |
- // "UpdateSend"/"UpdateRecv" on the existing sessions, which will internally |
- // call "srtp_update". |
- bool new_sessions = false; |
- if (!send_session_) { |
- RTC_DCHECK(!recv_session_); |
- CreateSrtpSessions(); |
- new_sessions = true; |
- } |
- |
+ CreateSrtpSessions(); |
send_session_->SetEncryptedHeaderExtensionIds( |
send_encrypted_header_extension_ids_); |
if (external_auth_enabled_) { |
send_session_->EnableExternalAuth(); |
} |
- bool ret = new_sessions |
- ? send_session_->SetSend(send_cs, send_key, send_key_len) |
- : send_session_->UpdateSend(send_cs, send_key, send_key_len); |
- if (!ret) { |
+ if (!send_session_->SetSend(send_cs, send_key, send_key_len)) { |
ResetParams(); |
return false; |
} |
recv_session_->SetEncryptedHeaderExtensionIds( |
recv_encrypted_header_extension_ids_); |
- ret = new_sessions |
- ? recv_session_->SetRecv(recv_cs, recv_key, recv_key_len) |
- : recv_session_->UpdateRecv(recv_cs, recv_key, recv_key_len); |
- if (!ret) { |
+ if (!recv_session_->SetRecv(recv_cs, recv_key, recv_key_len)) { |
ResetParams(); |
return false; |
} |
- LOG(LS_INFO) << "SRTP " << (new_sessions ? "updated" : "activated") |
- << " with negotiated parameters:" |
+ LOG(LS_INFO) << "SRTP activated with negotiated parameters:" |
<< " send cipher_suite " << send_cs << " recv cipher_suite " |
<< recv_cs; |
return true; |