Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[JSR309 Driver] Request identifier overflow. #34

Open
GoogleCodeExporter opened this issue Feb 27, 2016 · 0 comments
Open

[JSR309 Driver] Request identifier overflow. #34

GoogleCodeExporter opened this issue Feb 27, 2016 · 0 comments

Comments

@GoogleCodeExporter
Copy link

1. Bugs exist in 
org.mobicents.javax.media.mscontrol.mediagroup.MediaGroupImpl#nextRequestID
2. Constructor of jain.protocol.ip.mgcp.message.parms.RequestIdentifier is 
expecting unsigned hexadecimal string.
3. Exception thrown when 
org.mobicents.javax.media.mscontrol.MediaSessionImpl#getUniqueReqID reaches 
80000000, 
 java.lang.IllegalArgumentException: Request identifier must contain between 1 and 32 hexadecimal digits!

Code to quick test:
    public static void main(String args[]){
        int reqId = 0;
        while(true){
            try {
                new RequestIdentifier(Integer.toString(++reqId));
            } catch (IllegalArgumentException ex){
                ex.printStackTrace();
                break;
            }
        }
    }

What is the expected output? What do you see instead?
org.mobicents.javax.media.mscontrol.mediagroup.MediaGroupImpl#nextRequestID 
should not throw exception when integer overflow. 


What version of the product are you using? On what operating system?


Please provide any additional information below.

Original issue reported on code.google.com by waileong...@gmail.com on 28 May 2014 at 1:39

Attachments:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant