mirror of
https://github.com/asterisk/asterisk.git
synced 2025-09-29 18:19:30 +00:00
Wed Mar 5 07:00:00 CET 2003
git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@632 65c4cc65-6c06-0410-ace0-fbb531ad65f3
This commit is contained in:
@@ -145,7 +145,9 @@ static struct sip_pvt {
|
||||
int canreinvite; /* Do we support reinvite */
|
||||
int progress; /* Have sent 183 message progress */
|
||||
int tag; /* Another random number */
|
||||
int nat; /* Whether to try to support NAT */
|
||||
struct sockaddr_in sa; /* Our peer */
|
||||
struct sockaddr_in recv; /* Received as */
|
||||
struct in_addr ourip; /* Our IP */
|
||||
struct ast_channel *owner; /* Who owns us */
|
||||
char exten[AST_MAX_EXTENSION]; /* Extention where to start */
|
||||
@@ -193,6 +195,7 @@ struct sip_user {
|
||||
char callerid[80];
|
||||
char methods[80];
|
||||
char accountcode[80];
|
||||
int nat;
|
||||
int hascallerid;
|
||||
int amaflags;
|
||||
int insecure;
|
||||
@@ -215,6 +218,7 @@ struct sip_peer {
|
||||
int expirey;
|
||||
int capability;
|
||||
int insecure;
|
||||
int nat;
|
||||
int canreinvite;
|
||||
struct sockaddr_in addr;
|
||||
struct in_addr mask;
|
||||
@@ -290,7 +294,10 @@ static int do_proxy_auth(struct sip_pvt *p, struct sip_request *req);
|
||||
static int __sip_xmit(struct sip_pvt *p, char *data, int len)
|
||||
{
|
||||
int res;
|
||||
res=sendto(sipsock, data, len, 0, (struct sockaddr *)&p->sa, sizeof(struct sockaddr_in));
|
||||
if (p->nat)
|
||||
res=sendto(sipsock, data, len, 0, (struct sockaddr *)&p->recv, sizeof(struct sockaddr_in));
|
||||
else
|
||||
res=sendto(sipsock, data, len, 0, (struct sockaddr *)&p->sa, sizeof(struct sockaddr_in));
|
||||
if (res != len) {
|
||||
ast_log(LOG_WARNING, "sip_xmit of %p (len %d) to %s returned %d: %s\n", data, len, inet_ntoa(p->sa.sin_addr), res, strerror(errno));
|
||||
}
|
||||
@@ -300,8 +307,12 @@ static int __sip_xmit(struct sip_pvt *p, char *data, int len)
|
||||
static int send_response(struct sip_pvt *p, struct sip_request *req)
|
||||
{
|
||||
int res;
|
||||
if (sipdebug)
|
||||
ast_verbose("Transmitting:\n%s\n to %s:%d\n", req->data, inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
|
||||
if (sipdebug) {
|
||||
if (p->nat)
|
||||
ast_verbose("Transmitting (NAT):\n%s\n to %s:%d\n", req->data, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
|
||||
else
|
||||
ast_verbose("Transmitting (no NAT):\n%s\n to %s:%d\n", req->data, inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
|
||||
}
|
||||
res = __sip_xmit(p, req->data, req->len);
|
||||
if (res > 0)
|
||||
res = 0;
|
||||
@@ -311,8 +322,12 @@ static int send_response(struct sip_pvt *p, struct sip_request *req)
|
||||
static int send_request(struct sip_pvt *p, struct sip_request *req)
|
||||
{
|
||||
int res;
|
||||
if (sipdebug)
|
||||
ast_verbose("XXX Need to handle Retransmitting XXX:\n%s to %s:%d\n", req->data, inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
|
||||
if (sipdebug) {
|
||||
if (p->nat)
|
||||
ast_verbose("XXX Need to handle Retransmitting XXX:\n%s (NAT) to %s:%d\n", req->data, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
|
||||
else
|
||||
ast_verbose("XXX Need to handle Retransmitting XXX:\n%s (no NAT) to %s:%d\n", req->data, inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
|
||||
}
|
||||
res = __sip_xmit(p, req->data, req->len);
|
||||
return res;
|
||||
}
|
||||
@@ -378,6 +393,7 @@ static int create_addr(struct sip_pvt *r, char *peer)
|
||||
r->sa.sin_addr = p->defaddr.sin_addr;
|
||||
r->sa.sin_port = p->defaddr.sin_port;
|
||||
}
|
||||
memcpy(&r->recv, &r->sa, sizeof(r->recv));
|
||||
break;
|
||||
}
|
||||
}
|
||||
@@ -389,6 +405,7 @@ static int create_addr(struct sip_pvt *r, char *peer)
|
||||
if (hp) {
|
||||
memcpy(&r->sa.sin_addr, hp->h_addr, sizeof(r->sa.sin_addr));
|
||||
r->sa.sin_port = htons(DEFAULT_SIP_PORT);
|
||||
memcpy(&r->recv, &r->sa, sizeof(r->recv));
|
||||
return 0;
|
||||
} else {
|
||||
ast_log(LOG_WARNING, "No such host: %s\n", peer);
|
||||
@@ -1451,6 +1468,7 @@ static int copy_header(struct sip_request *req, struct sip_request *orig, char *
|
||||
return -1;
|
||||
}
|
||||
|
||||
#if 0
|
||||
static int copy_all_header(struct sip_request *req, struct sip_request *orig, char *field)
|
||||
{
|
||||
char *tmp;
|
||||
@@ -1471,6 +1489,36 @@ static int copy_all_header(struct sip_request *req, struct sip_request *orig, ch
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
static int copy_via_headers(struct sip_pvt *p, struct sip_request *req, struct sip_request *orig, char *field)
|
||||
{
|
||||
char *tmp;
|
||||
int start = 0;
|
||||
int copied = 0;
|
||||
char new[256];
|
||||
for (;;) {
|
||||
tmp = __get_header(orig, field, &start);
|
||||
if (strlen(tmp)) {
|
||||
if (!copied) {
|
||||
if (ntohs(p->recv.sin_port) != DEFAULT_SIP_PORT)
|
||||
snprintf(new, sizeof(new), "%s;received=%s:%d", tmp, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
|
||||
else
|
||||
snprintf(new, sizeof(new), "%s;received=%s", tmp, inet_ntoa(p->recv.sin_addr));
|
||||
add_header(req, field, new);
|
||||
} else {
|
||||
/* Add what we're responding to */
|
||||
add_header(req, field, tmp);
|
||||
}
|
||||
copied++;
|
||||
} else
|
||||
break;
|
||||
}
|
||||
if (!copied) {
|
||||
ast_log(LOG_NOTICE, "No field '%s' present to copy\n", field);
|
||||
return -1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int init_resp(struct sip_request *req, char *resp, struct sip_request *orig)
|
||||
{
|
||||
@@ -1511,7 +1559,7 @@ static int respprep(struct sip_request *resp, struct sip_pvt *p, char *msg, stru
|
||||
char newto[256] = "", *ot;
|
||||
memset(resp, 0, sizeof(*resp));
|
||||
init_resp(resp, msg, req);
|
||||
copy_all_header(resp, req, "Via");
|
||||
copy_via_headers(p, resp, req, "Via");
|
||||
copy_header(resp, req, "From");
|
||||
ot = get_header(req, "To");
|
||||
if (!strstr(ot, "tag=")) {
|
||||
@@ -2035,6 +2083,16 @@ static int parse_contact(struct sip_pvt *pvt, struct sip_peer *p, struct sip_req
|
||||
if (n)
|
||||
*n = '\0';
|
||||
}
|
||||
if (!strcasecmp(c, "*")) {
|
||||
/* This means remove all registrations and return OK */
|
||||
memset(&p->addr, 0, sizeof(p->addr));
|
||||
if (p->expire > -1)
|
||||
ast_sched_del(sched, p->expire);
|
||||
p->expire = -1;
|
||||
if (option_verbose > 2)
|
||||
ast_verbose(VERBOSE_PREFIX_3 "Unegistered SIP '%s'\n", p->username);
|
||||
return 0;
|
||||
}
|
||||
/* Make sure it's a SIP URL */
|
||||
if (strncasecmp(c, "sip:", 4)) {
|
||||
ast_log(LOG_NOTICE, "'%s' is not a valid SIP contact (missing sip:) trying to use anyway\n", c);
|
||||
@@ -2108,7 +2166,7 @@ static int check_auth(struct sip_pvt *p, struct sip_request *req, char *randdata
|
||||
/* Always OK if no secret */
|
||||
if (!strlen(secret))
|
||||
return 0;
|
||||
if (!strlen(randdata)) {
|
||||
if (!strlen(randdata) || !strlen(get_header(req, "Proxy-Authorization"))) {
|
||||
snprintf(randdata, randlen, "%08x", rand());
|
||||
transmit_response_with_auth(p, "407 Proxy Authentication Required", req, randdata);
|
||||
res = 1;
|
||||
@@ -2215,6 +2273,8 @@ static int register_verify(struct sip_pvt *p, struct sockaddr_in *sin, struct si
|
||||
peer = peerl.peers;
|
||||
while(peer) {
|
||||
if (!strcasecmp(peer->name, name) && peer->dynamic) {
|
||||
p->nat = peer->nat;
|
||||
transmit_response(p, "100 Trying", req);
|
||||
if (!(res = check_auth(p, req, p->randdata, sizeof(p->randdata), peer->name, peer->secret, "REGISTER", uri))) {
|
||||
if (parse_contact(p, peer, req)) {
|
||||
ast_log(LOG_WARNING, "Failed to parse contact info\n");
|
||||
@@ -2412,10 +2472,14 @@ static int check_via(struct sip_pvt *p, struct sip_request *req)
|
||||
}
|
||||
memset(&p->sa, 0, sizeof(p->sa));
|
||||
p->sa.sin_family = AF_INET;
|
||||
p->sa.sin_port = htons(pt ? atoi(pt) : DEFAULT_SIP_PORT);
|
||||
memcpy(&p->sa.sin_addr, hp->h_addr, sizeof(p->sa.sin_addr));
|
||||
if (sipdebug)
|
||||
ast_verbose("Sending to %s : %d\n", inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
|
||||
p->sa.sin_port = htons(pt ? atoi(pt) : DEFAULT_SIP_PORT);
|
||||
if (sipdebug) {
|
||||
if (p->nat)
|
||||
ast_verbose("Sending to %s : %d (NAT)\n", inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
|
||||
else
|
||||
ast_verbose("Sending to %s : %d (non-NAT)\n", inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
@@ -2450,6 +2514,7 @@ static int check_user(struct sip_pvt *p, struct sip_request *req, char *cmd, cha
|
||||
user = userl.users;
|
||||
while(user) {
|
||||
if (!strcasecmp(user->name, of)) {
|
||||
p->nat = user->nat;
|
||||
if (!(res = check_auth(p, req, p->randdata, sizeof(p->randdata), user->name, user->secret, cmd, uri))) {
|
||||
strncpy(p->context, user->context, sizeof(p->context) - 1);
|
||||
if (strlen(user->callerid) && strlen(p->callerid))
|
||||
@@ -3331,7 +3396,6 @@ static int handle_request(struct sip_pvt *p, struct sip_request *req, struct soc
|
||||
ast_verbose("Using latest request as basis request\n");
|
||||
copy_request(&p->initreq, req);
|
||||
check_via(p, req);
|
||||
transmit_response(p, "100 Trying", req);
|
||||
if ((res = register_verify(p, sin, req, e)) < 0)
|
||||
ast_log(LOG_NOTICE, "Registration from '%s' failed for '%s'\n", get_header(req, "To"), inet_ntoa(sin->sin_addr));
|
||||
if (res < 1) {
|
||||
@@ -3390,6 +3454,7 @@ static int sipsock_read(int *id, int fd, short events, void *ignore)
|
||||
ast_pthread_mutex_lock(&netlock);
|
||||
p = find_call(&req, &sin);
|
||||
if (p) {
|
||||
memcpy(&p->recv, &sin, sizeof(p->recv));
|
||||
handle_request(p, &req, &sin);
|
||||
}
|
||||
ast_pthread_mutex_unlock(&netlock);
|
||||
@@ -3573,6 +3638,7 @@ static int sip_poke_peer(struct sip_peer *peer)
|
||||
return -1;
|
||||
}
|
||||
memcpy(&p->sa, &peer->addr, sizeof(p->sa));
|
||||
memcpy(&p->recv, &peer->addr, sizeof(p->sa));
|
||||
|
||||
/* Recalculate our side, and recalculate Call ID */
|
||||
memcpy(&p->ourip, myaddrfor(&p->sa.sin_addr), sizeof(p->ourip));
|
||||
@@ -3674,6 +3740,8 @@ static struct sip_user *build_user(char *name, struct ast_variable *v)
|
||||
strncpy(user->secret, v->value, sizeof(user->secret)-1);
|
||||
} else if (!strcasecmp(v->name, "canreinvite")) {
|
||||
user->canreinvite = ast_true(v->value);
|
||||
} else if (!strcasecmp(v->name, "nat")) {
|
||||
user->nat = ast_true(v->value);
|
||||
} else if (!strcasecmp(v->name, "callerid")) {
|
||||
strncpy(user->callerid, v->value, sizeof(user->callerid)-1);
|
||||
user->hascallerid=1;
|
||||
@@ -3750,6 +3818,8 @@ static struct sip_peer *build_peer(char *name, struct ast_variable *v)
|
||||
strncpy(peer->methods, v->value, sizeof(peer->methods)-1);
|
||||
else if (!strcasecmp(v->name, "canreinvite"))
|
||||
peer->canreinvite = ast_true(v->value);
|
||||
else if (!strcasecmp(v->name, "nat"))
|
||||
peer->nat = ast_true(v->value);
|
||||
else if (!strcasecmp(v->name, "context"))
|
||||
strncpy(peer->context, v->value, sizeof(peer->context)-1);
|
||||
else if (!strcasecmp(v->name, "host")) {
|
||||
@@ -3833,7 +3903,7 @@ static struct sip_peer *build_peer(char *name, struct ast_variable *v)
|
||||
return peer;
|
||||
}
|
||||
|
||||
static int reload_config()
|
||||
static int reload_config(void)
|
||||
{
|
||||
struct ast_config *cfg;
|
||||
struct ast_variable *v;
|
||||
|
Reference in New Issue
Block a user