Bug # 1116. CallerID number not hidden when RestrictCID is on, Fixed
[asterisk/asterisk.git] / channels / chan_sip.c
1 /*
2  * Asterisk -- A telephony toolkit for Linux.
3  *
4  * Implementation of Session Initiation Protocol
5  * 
6  * Copyright (C) 1999, Mark Spencer
7  *
8  * Mark Spencer <markster@linux-support.net>
9  *
10  * This program is free software, distributed under the terms of
11  * the GNU General Public License
12  */
13
14 #include <stdio.h>
15 #include <ctype.h>
16 #include <pthread.h>
17 #include <string.h>
18 #include <asterisk/lock.h>
19 #include <asterisk/channel.h>
20 #include <asterisk/channel_pvt.h>
21 #include <asterisk/config.h>
22 #include <asterisk/logger.h>
23 #include <asterisk/module.h>
24 #include <asterisk/pbx.h>
25 #include <asterisk/options.h>
26 #include <asterisk/lock.h>
27 #include <asterisk/sched.h>
28 #include <asterisk/io.h>
29 #include <asterisk/rtp.h>
30 #include <asterisk/acl.h>
31 #include <asterisk/callerid.h>
32 #include <asterisk/cli.h>
33 #include <asterisk/md5.h>
34 #include <asterisk/app.h>
35 #include <asterisk/musiconhold.h>
36 #include <asterisk/dsp.h>
37 #include <asterisk/parking.h>
38 #include <asterisk/acl.h>
39 #include <asterisk/srv.h>
40 #include <asterisk/astdb.h>
41 #include <asterisk/causes.h>
42 #include <sys/socket.h>
43 #include <sys/ioctl.h>
44 #include <net/if.h>
45 #include <errno.h>
46 #include <unistd.h>
47 #include <stdlib.h>
48 #include <fcntl.h>
49 #include <netdb.h>
50 #include <arpa/inet.h>
51 #include <pthread.h>
52 #include <signal.h>
53 #include <sys/signal.h>
54 #include <netinet/in_systm.h>
55 #include <netinet/ip.h>
56
57 #ifdef MYSQL_FRIENDS
58 #include <mysql/mysql.h>
59 #endif
60
61 #ifndef IPTOS_MINCOST
62 #define IPTOS_MINCOST 0x02
63 #endif
64
65 /* #define VOCAL_DATA_HACK */
66
67 #define SIPDUMPER
68 #define DEFAULT_DEFAULT_EXPIRY  120
69 #define DEFAULT_MAX_EXPIRY      3600
70 #define EXPIRY_GUARD_SECS       15
71
72 #define CALLERID_UNKNOWN        "Unknown"
73
74 #define SIP_DTMF_RFC2833        (1 << 0)
75 #define SIP_DTMF_INBAND         (1 << 1)
76 #define SIP_DTMF_INFO           (1 << 2)
77
78 static int max_expiry = DEFAULT_MAX_EXPIRY;
79 static int default_expiry = DEFAULT_DEFAULT_EXPIRY;
80
81 #define DEFAULT_MAXMS           2000            /* Must be faster than 2 seconds by default */
82 #define DEFAULT_FREQ_OK         60 * 1000               /* How often to check for the host to be up */
83 #define DEFAULT_FREQ_NOTOK      10 * 1000               /* How often to check, if the host is down... */
84
85 #define DEFAULT_RETRANS         1000                    /* How frequently to retransmit */
86 #define MAX_RETRANS                     5                               /* Try only 5 times for retransmissions */
87
88 #ifdef MYSQL_FRIENDS
89 static ast_mutex_t mysqllock = AST_MUTEX_INITIALIZER;
90 static MYSQL *mysql;
91 static char mydbuser[80];
92 static char mydbpass[80];
93 static char mydbhost[80];
94 static char mydbname[80];
95 #endif
96
97 static char *desc = "Session Initiation Protocol (SIP)";
98 static char *type = "SIP";
99 static char *tdesc = "Session Initiation Protocol (SIP)";
100 static char *config = "sip.conf";
101
102 #define DEFAULT_SIP_PORT        5060    /* From RFC 2543 */
103 #define SIP_MAX_PACKET  1500            /* Also from RFC 2543, should sub headers tho */
104
105 #define ALLOWED_METHODS "INVITE, ACK, CANCEL, OPTIONS, BYE, REFER"
106
107 static char context[AST_MAX_EXTENSION] = "default";
108
109 static char language[MAX_LANGUAGE] = "";
110
111 static char callerid[AST_MAX_EXTENSION] = "asterisk";
112
113 static char fromdomain[AST_MAX_EXTENSION] = "";
114
115 static char notifymime[AST_MAX_EXTENSION] = "application/simple-message-summary";
116
117 static int srvlookup = 0;
118
119 static int pedanticsipchecking = 0;
120
121 static int autocreatepeer = 0;
122
123 static int usecnt =0;
124 static ast_mutex_t usecnt_lock = AST_MUTEX_INITIALIZER;
125
126 /* Protect the interface list (of sip_pvt's) */
127 static ast_mutex_t iflock = AST_MUTEX_INITIALIZER;
128
129 /* Protect the monitoring thread, so only one process can kill or start it, and not
130    when it's doing something critical. */
131 static ast_mutex_t netlock = AST_MUTEX_INITIALIZER;
132
133 static ast_mutex_t monlock = AST_MUTEX_INITIALIZER;
134
135 /* This is the thread for the monitor which checks for input on the channels
136    which are not currently in use.  */
137 static pthread_t monitor_thread = AST_PTHREADT_NULL;
138
139 static int restart_monitor(void);
140
141 /* Codecs that we support by default: */
142 static int capability = AST_FORMAT_ULAW | AST_FORMAT_ALAW | AST_FORMAT_GSM | AST_FORMAT_H263;
143 static int noncodeccapability = AST_RTP_DTMF;
144
145 static char ourhost[256];
146 static struct in_addr __ourip;
147 static int ourport;
148
149 static int sipdebug = 0;
150
151 static int tos = 0;
152
153 static int videosupport = 0;
154
155 static int globaldtmfmode = SIP_DTMF_RFC2833;
156
157 /* Expire slowly */
158 static int expiry = 900;
159
160 static struct sched_context *sched;
161 static struct io_context *io;
162 /* The private structures of the  sip channels are linked for
163    selecting outgoing channels */
164    
165 #define SIP_MAX_HEADERS         64
166 #define SIP_MAX_LINES           64
167
168 #define DEC_IN_USE      0
169 #define INC_IN_USE      1
170 #define DEC_OUT_USE     2
171 #define INC_OUT_USE     3
172
173 static struct sip_codec_pref {
174         int codec;
175         struct sip_codec_pref *next;
176 } *prefs;
177
178 struct sip_request {
179   char *rlPart1; /* SIP Method Name or "SIP/2.0" protocol version */
180   char *rlPart2; /* The Request URI or Response Status */
181         int len;
182         int headers;                                    /* SIP Headers */
183         char *header[SIP_MAX_HEADERS];
184         int lines;                                              /* SDP Content */
185         char *line[SIP_MAX_LINES];
186         char data[SIP_MAX_PACKET];
187 };
188
189 struct sip_pkt;
190
191 struct sip_route {
192         struct sip_route *next;
193         char hop[0];
194 };
195
196 static struct sip_pvt {
197         ast_mutex_t lock;                               /* Channel private lock */
198         char callid[80];                                        /* Global CallID */
199         char randdata[80];      /* Random data */
200         unsigned int ocseq;                                     /* Current outgoing seqno */
201         unsigned int icseq;                                     /* Current incoming seqno */
202         unsigned int callgroup;
203         unsigned int pickupgroup;
204         int lastinvite;                                         /* Last Cseq of invite */
205         int alreadygone;                                        /* Whether or not we've already been destroyed by or peer */
206         int needdestroy;                                        /* if we need to be destroyed */
207         int capability;                                         /* Special capability */
208         int jointcapability;                            /* Supported capability at both ends */
209         int noncodeccapability;
210         int outgoing;                                           /* Outgoing or incoming call? */
211         int authtries;                                          /* Times we've tried to authenticate */
212         int insecure;                                           /* Don't check source port/ip */
213         int expiry;                                             /* How long we take to expire */
214         int branch;                                                     /* One random number */
215         int canreinvite;                                        /* Do we support reinvite */
216         int ringing;                                            /* Have sent 180 ringing */
217         int progress;                                           /* Have sent 183 message progress */
218         int tag;                                                        /* Another random number */
219         int nat;                                                        /* Whether to try to support NAT */
220         int sessionid;                                          /* SDP Session ID */
221         int sessionversion;                                     /* SDP Session Version */
222         struct sockaddr_in sa;                          /* Our peer */
223         struct sockaddr_in redirip;                     /* Where our RTP should be going if not to us */
224         struct sockaddr_in vredirip;            /* Where our Video RTP should be going if not to us */
225         struct sockaddr_in recv;                        /* Received as */
226         struct in_addr ourip;                           /* Our IP */
227         struct ast_channel *owner;                      /* Who owns us */
228         char exten[AST_MAX_EXTENSION];          /* Extention where to start */
229         char refer_to[AST_MAX_EXTENSION];       /* Place to store REFER-TO extension */
230         char referred_by[AST_MAX_EXTENSION];/* Place to store REFERRED-BY extension */
231         char refer_contact[AST_MAX_EXTENSION];/* Place to store Contact info from a REFER extension */
232         struct sip_pvt *refer_call;                     /* Call we are referring */
233         struct sip_route *route;                        /* Head of linked list of routing steps (fm Record-Route) */
234         char remote_party_id[256];
235         char from[256];
236         char context[AST_MAX_EXTENSION];
237         char fromdomain[AST_MAX_EXTENSION];     /* Domain to show in the from field */
238         char fromuser[AST_MAX_EXTENSION];       /* Domain to show in the user field */
239         char tohost[AST_MAX_EXTENSION];         /* Host we should put in the "to" field */
240         char language[MAX_LANGUAGE];
241         char rdnis[256];                                /* Referring DNIS */
242         char theirtag[256];                             /* Their tag */
243         char username[256];
244         char peername[256];
245         char uri[256];                                  /* Original requested URI */
246         char peersecret[256];
247         char peermd5secret[256];
248         char callerid[256];                                     /* Caller*ID */
249         int restrictcid;                        /* hide presentation from remote user */
250         char via[256];
251         char accountcode[20];                           /* Account code */
252         char our_contact[256];                          /* Our contact header */
253         char realm[256];                                /* Authorization realm */
254         char nonce[256];                                /* Authorization nonce */
255         char domain[256];                               /* Authorization nonce */
256         char lastmsg[256];                              /* Last Message sent/received */
257         int amaflags;                                           /* AMA Flags */
258         int pendinginvite;                                      /* Any pending invite */
259         int pendingbye;                                         /* Need to send bye after we ack? */
260         int gotrefer;                                           /* Got a refer? */
261         struct sip_request initreq;                     /* Initial request */
262         
263         int maxtime;                                            /* Max time for first response */
264         int initid;                                                     /* Auto-congest ID if appropriate */
265         int autokillid;                                         /* Auto-kill ID */
266
267         int subscribed;
268         int stateid;
269         int dialogver;
270         
271         int dtmfmode;
272         struct ast_dsp *vad;
273         
274         struct sip_peer *peerpoke;                      /* If this calls is to poke a peer, which one */
275         struct sip_registry *registry;                  /* If this is a REGISTER call, to which registry */
276         struct ast_rtp *rtp;                            /* RTP Session */
277         struct ast_rtp *vrtp;                           /* Video RTP session */
278         struct sip_pkt *packets;                        /* Packets scheduled for re-transmission */
279         struct sip_pvt *next;
280 } *iflist = NULL;
281
282 struct sip_pkt {
283         struct sip_pkt *next;                           /* Next packet */
284         int retrans;                                            /* Retransmission number */
285         int seqno;                                                      /* Sequence number */
286         int resp;                                                       /* non-zero if this is a response packet (e.g. 200 OK) */
287         struct sip_pvt *owner;                          /* Owner call */
288         int retransid;                                          /* Retransmission ID */
289         int packetlen;                                          /* Length of packet */
290         char data[0];
291 };      
292
293 struct sip_user {
294         /* Users who can access various contexts */
295         char name[80];
296         char secret[80];
297         char md5secret[80];
298         char context[80];
299         char callerid[80];
300         char methods[80];
301         char accountcode[20];
302         char language[MAX_LANGUAGE];
303         unsigned int callgroup;
304         unsigned int pickupgroup;
305         int nat;
306         int hascallerid;
307         int amaflags;
308         int insecure;
309         int canreinvite;
310         int capability;
311         int dtmfmode;
312         int inUse;
313         int incominglimit;
314         int outUse;
315         int outgoinglimit;
316         int restrictcid;
317         struct ast_ha *ha;
318         struct sip_user *next;
319 };
320
321 struct sip_peer {
322         char name[80];
323         char secret[80];
324         char md5secret[80];
325         char context[80];               /* JK02: peers need context too to allow parking etc */
326         char methods[80];
327         char username[80];
328         char tohost[80];
329         char fromuser[80];
330         char fromdomain[80];
331         char mailbox[AST_MAX_EXTENSION];
332         int lastmsgssent;
333         time_t  lastmsgcheck;
334         int dynamic;
335         int expire;
336         int expiry;
337         int capability;
338         int insecure;
339         int nat;
340         int canreinvite;
341         unsigned int callgroup;
342         unsigned int pickupgroup;
343         int dtmfmode;
344         struct sockaddr_in addr;
345         struct in_addr mask;
346
347         /* Qualification */
348         struct sip_pvt *call;           /* Call pointer */
349         int pokeexpire;                         /* When to expire poke */
350         int lastms;                                     /* How long last response took (in ms), or -1 for no response */
351         int maxms;                                      /* Max ms we will accept for the host to be up, 0 to not monitor */
352         struct timeval ps;                      /* Ping send time */
353         
354         struct sockaddr_in defaddr;
355         struct ast_ha *ha;
356         int delme;
357         int selfdestruct;
358         int lastmsg;
359         int temponly;
360         struct sip_peer *next;
361 };
362
363 static ast_mutex_t sip_reload_lock = AST_MUTEX_INITIALIZER;
364 static int sip_reloading = 0;
365
366 #define REG_STATE_UNREGISTERED 0
367 #define REG_STATE_REGSENT          1
368 #define REG_STATE_AUTHSENT         2
369 #define REG_STATE_REGISTERED   3
370 #define REG_STATE_REJECTED         4
371 #define REG_STATE_TIMEOUT          5
372 #define REG_STATE_NOAUTH           6
373
374 struct sip_registry {
375         struct sockaddr_in addr;                /* Who we connect to for registration purposes */
376         char username[80];                              /* Who we are registering as */
377         char authuser[80];                              /* Who we *authenticate* as */
378         char hostname[80];
379         char secret[80];                        /* Password or key name in []'s */      
380         char md5secret[80];
381         char contact[80];                       /* Contact extension */
382         char random[80];
383         int expire;                                     /* Sched ID of expiration */
384         int timeout;                                    /* sched id of sip_reg_timeout */
385         int refresh;                                    /* How often to refresh */
386         struct sip_pvt *call;                           /* create a sip_pvt structure for each outbound "registration call" in progress */
387         int regstate;
388         int callid_valid;               /* 0 means we haven't chosen callid for this registry yet. */
389         char callid[80];                /* Global CallID for this registry */
390         unsigned int ocseq;             /* Sequence number we got to for REGISTERs for this registry */
391         struct sockaddr_in us;                  /* Who the server thinks we are */
392         struct sip_registry *next;
393 };
394
395 static struct ast_user_list {
396         struct sip_user *users;
397         ast_mutex_t lock;
398 } userl = { NULL, AST_MUTEX_INITIALIZER };
399
400 static struct ast_peer_list {
401         struct sip_peer *peers;
402         ast_mutex_t lock;
403 } peerl = { NULL, AST_MUTEX_INITIALIZER };
404
405 static struct ast_register_list {
406         struct sip_registry *registrations;
407         ast_mutex_t lock;
408         int recheck;
409 } regl = { NULL, AST_MUTEX_INITIALIZER };
410
411
412 #define REINVITE_INVITE         1
413 #define REINVITE_UPDATE         2
414
415 static int __sip_do_register(struct sip_registry *r);
416
417 static int sipsock  = -1;
418 static int globalnat = 0;
419 static int globalcanreinvite = REINVITE_INVITE;
420
421
422 static struct sockaddr_in bindaddr;
423 static struct sockaddr_in localnet;
424 static struct sockaddr_in localmask;
425 static struct sockaddr_in externip;
426
427 static struct ast_frame  *sip_read(struct ast_channel *ast);
428 static int transmit_response(struct sip_pvt *p, char *msg, struct sip_request *req);
429 static int transmit_response_with_sdp(struct sip_pvt *p, char *msg, struct sip_request *req, int retrans);
430 static int transmit_response_with_auth(struct sip_pvt *p, char *msg, struct sip_request *req, char *rand, int reliable);
431 static int transmit_request(struct sip_pvt *p, char *msg, int inc, int reliable);
432 static int transmit_request_with_auth(struct sip_pvt *p, char *msg, int inc, int reliable);
433 static int transmit_invite(struct sip_pvt *p, char *msg, int sendsdp, char *auth, char *authheader, char *vxml_url,char *distinctive_ring, int init);
434 static int transmit_reinvite_with_sdp(struct sip_pvt *p, struct ast_rtp *rtp, struct ast_rtp *vrtp);
435 static int transmit_info_with_digit(struct sip_pvt *p, char digit);
436 static int transmit_message_with_text(struct sip_pvt *p, char *text);
437 static int transmit_refer(struct sip_pvt *p, char *dest);
438 static struct sip_peer *temp_peer(char *name);
439 static int do_proxy_auth(struct sip_pvt *p, struct sip_request *req, char *header, char *respheader, char *msg, int init);
440 // static char *getsipuri(char *header);
441 static void free_old_route(struct sip_route *route);
442 static int build_reply_digest(struct sip_pvt *p, char *orig_header, char *digest, int digest_len);
443 static int find_user(struct sip_pvt *fup, int event);
444 static void prune_peers(void);
445 static int sip_do_reload(void);
446
447 static int __sip_xmit(struct sip_pvt *p, char *data, int len)
448 {
449         int res;
450         if (p->nat)
451             res=sendto(sipsock, data, len, 0, (struct sockaddr *)&p->recv, sizeof(struct sockaddr_in));
452         else
453             res=sendto(sipsock, data, len, 0, (struct sockaddr *)&p->sa, sizeof(struct sockaddr_in));
454         if (res != len) {
455                 ast_log(LOG_WARNING, "sip_xmit of %p (len %d) to %s returned %d: %s\n", data, len, inet_ntoa(p->sa.sin_addr), res, strerror(errno));
456         }
457         return res;
458 }
459
460 static void sip_destroy(struct sip_pvt *p);
461
462 static int ast_sip_ouraddrfor(struct in_addr *them, struct in_addr *us)
463 {
464         /*
465           check to see if them is contained in our localnet/mask,
466           if not, use our externip for us, otherwise use the 
467           real internal address in bindaddr
468          */
469         if (localnet.sin_addr.s_addr && externip.sin_addr.s_addr &&
470             ((htonl(them->s_addr) & htonl(localnet.sin_addr.s_addr)) != htonl(localnet.sin_addr.s_addr)))
471                 memcpy(us, &externip.sin_addr, sizeof(struct in_addr));
472         else if (bindaddr.sin_addr.s_addr)
473                 memcpy(us, &bindaddr.sin_addr, sizeof(struct in_addr));
474         else
475                 return ast_ouraddrfor(them, us);
476         return 0;
477 }
478
479 static int retrans_pkt(void *data)
480 {
481         struct sip_pkt *pkt=data;
482         int res = 0;
483         ast_mutex_lock(&pkt->owner->lock);
484         if (pkt->retrans < MAX_RETRANS) {
485                 pkt->retrans++;
486                 if (sipdebug) {
487                         if (pkt->owner->nat)
488                                 ast_verbose("Retransmitting #%d (NAT):\n%s\n to %s:%d\n", pkt->retrans, pkt->data, inet_ntoa(pkt->owner->recv.sin_addr), ntohs(pkt->owner->recv.sin_port));
489                         else
490                                 ast_verbose("Retransmitting #%d (no NAT):\n%s\n to %s:%d\n", pkt->retrans, pkt->data, inet_ntoa(pkt->owner->sa.sin_addr), ntohs(pkt->owner->sa.sin_port));
491                 }
492                 __sip_xmit(pkt->owner, pkt->data, pkt->packetlen);
493                 res = 1;
494         } else {
495                 ast_log(LOG_WARNING, "Maximum retries exceeded on call %s for seqno %d (%s)\n", pkt->owner->callid, pkt->seqno, pkt->resp ? "Response" : "Request");
496                 pkt->retransid = -1;
497                 while(pkt->owner->owner && ast_mutex_trylock(&pkt->owner->owner->lock)) {
498                         ast_mutex_unlock(&pkt->owner->lock);
499                         usleep(1);
500                         ast_mutex_lock(&pkt->owner->lock);
501                 }
502                 if (pkt->owner->owner) {
503                         /* XXX Potential deadlocK?? XXX */
504                         ast_queue_hangup(pkt->owner->owner, 0);
505                         ast_mutex_unlock(&pkt->owner->owner->lock);
506                 } else {
507                         /* If no owner, destroy now */
508                         pkt->owner->needdestroy = 1;
509                 }
510         }
511         if (pkt)
512                 ast_mutex_unlock(&pkt->owner->lock);
513         return res;
514 }
515
516 static int __sip_reliable_xmit(struct sip_pvt *p, int seqno, int resp, char *data, int len)
517 {
518         struct sip_pkt *pkt;
519         pkt = malloc(sizeof(struct sip_pkt) + len);
520         if (!pkt)
521                 return -1;
522         memset(pkt, 0, sizeof(struct sip_pkt));
523         memcpy(pkt->data, data, len);
524         pkt->packetlen = len;
525         pkt->next = p->packets;
526         pkt->owner = p;
527         pkt->seqno = seqno;
528         pkt->resp = resp;
529         /* Schedule retransmission */
530         pkt->retransid = ast_sched_add(sched, DEFAULT_RETRANS, retrans_pkt, pkt);
531         pkt->next = p->packets;
532         p->packets = pkt;
533         __sip_xmit(pkt->owner, pkt->data, pkt->packetlen);
534         if (!strncasecmp(pkt->data, "INVITE", 6)) {
535                 /* Note this is a pending invite */
536                 p->pendinginvite = seqno;
537         }
538         return 0;
539 }
540
541 static int __sip_autodestruct(void *data)
542 {
543         struct sip_pvt *p = data;
544         p->autokillid = -1;
545         ast_log(LOG_DEBUG, "Auto destroying call '%s'\n", p->callid);
546         if (p->owner) {
547                 ast_log(LOG_WARNING, "Autodestruct on call '%s' with owner in place\n", p->callid);
548                 ast_queue_hangup(p->owner, 0);
549         } else {
550                 sip_destroy(p);
551         }
552         return 0;
553 }
554
555 static int sip_scheddestroy(struct sip_pvt *p, int ms)
556 {
557         if (p->autokillid > -1)
558                 ast_sched_del(sched, p->autokillid);
559         p->autokillid = ast_sched_add(sched, ms, __sip_autodestruct, p);
560         return 0;
561 }
562
563 static int sip_cancel_destroy(struct sip_pvt *p)
564 {
565         if (p->autokillid > -1)
566                 ast_sched_del(sched, p->autokillid);
567         p->autokillid = -1;
568         return 0;
569 }
570
571 static int __sip_ack(struct sip_pvt *p, int seqno, int resp)
572 {
573         struct sip_pkt *cur, *prev = NULL;
574         int res = -1;
575         int resetinvite = 0;
576         cur = p->packets;
577         while(cur) {
578                 if ((cur->seqno == seqno) && (cur->resp == resp)) {
579                         if (!resp && (seqno == p->pendinginvite)) {
580                                 ast_log(LOG_DEBUG, "Acked pending invite %d\n", p->pendinginvite);
581                                 p->pendinginvite = 0;
582                                 resetinvite = 1;
583                         }
584                         /* this is our baby */
585                         if (prev)
586                                 prev->next = cur->next;
587                         else
588                                 p->packets = cur->next;
589                         if (cur->retransid > -1)
590                                 ast_sched_del(sched, cur->retransid);
591                         free(cur);
592                         res = 0;
593                         break;
594                 }
595                 prev = cur;
596                 cur = cur->next;
597         }
598         ast_log(LOG_DEBUG, "Stopping retransmission on '%s' of %s %d: %s\n", p->callid, resp ? "Response" : "Request", seqno, res ? "Not Found" : "Found");
599         return res;
600 }
601
602 static int __sip_semi_ack(struct sip_pvt *p, int seqno, int resp)
603 {
604         struct sip_pkt *cur;
605         int res = -1;
606         cur = p->packets;
607         while(cur) {
608                 if ((cur->seqno == seqno) && (cur->resp == resp)) {
609                         /* this is our baby */
610                         if (cur->retransid > -1)
611                                 ast_sched_del(sched, cur->retransid);
612                         cur->retransid = -1;
613                         res = 0;
614                         break;
615                 }
616                 cur = cur->next;
617         }
618         ast_log(LOG_DEBUG, "(Provisional) Stopping retransmission (but retaining packet) on '%s' %s %d: %s\n", p->callid, resp ? "Response" : "Request", seqno, res ? "Not Found" : "Found");
619         return res;
620 }
621
622 static int send_response(struct sip_pvt *p, struct sip_request *req, int reliable, int seqno)
623 {
624         int res;
625         if (sipdebug) {
626                 if (p->nat)
627                         ast_verbose("%sTransmitting (NAT):\n%s\n to %s:%d\n", reliable ? "Reliably " : "", req->data, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
628                 else
629                         ast_verbose("%sTransmitting (no NAT):\n%s\n to %s:%d\n", reliable ? "Reliably " : "", req->data, inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
630         }
631         if (reliable)
632                 res = __sip_reliable_xmit(p, seqno, 1, req->data, req->len);
633         else
634                 res = __sip_xmit(p, req->data, req->len);
635         if (res > 0)
636                 res = 0;
637         return res;
638 }
639
640 static int send_request(struct sip_pvt *p, struct sip_request *req, int reliable, int seqno)
641 {
642         int res;
643         if (sipdebug) {
644                 if (p->nat)
645                         ast_verbose("%sTransmitting:\n%s (NAT) to %s:%d\n", reliable ? "Reliably " : "", req->data, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
646                 else
647                         ast_verbose("%sTransmitting:\n%s (no NAT) to %s:%d\n", reliable ? "Reliably " : "", req->data, inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
648         }
649         if (reliable)
650                 res = __sip_reliable_xmit(p, seqno, 0, req->data, req->len);
651         else
652                 res = __sip_xmit(p, req->data, req->len);
653         return res;
654 }
655
656 static char *ditch_braces(char *tmp)
657 {
658         char *c = tmp;
659         char *n;
660         if ((n = strchr(tmp, '<')) ) {
661                 c = n + 1;
662                 while(*c && *c != '>') c++;
663                 if (*c != '>') {
664                         ast_log(LOG_WARNING, "No closing brace in '%s'\n", tmp);
665                 } else {
666                         *c = '\0';
667                 }
668                 return n+1;
669         }
670         return c;
671 }
672
673 static int sip_sendtext(struct ast_channel *ast, char *text)
674 {
675         struct sip_pvt *p = ast->pvt->pvt;
676         if (sipdebug) 
677                 ast_verbose("Sending text %s on %s\n", text, ast->name);
678         if (!p)
679                 return -1;
680         if (!text || !strlen(text))
681                 return 0;
682         if (sipdebug)
683                 ast_verbose("Really sending text %s on %s\n", text, ast->name);
684         transmit_message_with_text(p, text);
685         return 0;       
686 }
687
688 #ifdef MYSQL_FRIENDS
689
690 static void mysql_update_peer(char *peer, struct sockaddr_in *sin, char *username, int expiry)
691 {
692         if (mysql && (strlen(peer) < 128)) {
693                 char query[512];
694                 char *name;
695                 char *uname;
696                 time_t nowtime;
697                 name = alloca(strlen(peer) * 2 + 1);
698                 uname = alloca(strlen(username) * 2 + 1);
699                 time(&nowtime);
700                 mysql_real_escape_string(mysql, name, peer, strlen(peer));
701                 mysql_real_escape_string(mysql, uname, username, strlen(username));
702                 snprintf(query, sizeof(query), "UPDATE sipfriends SET ipaddr=\"%s\", port=\"%d\", regseconds=\"%ld\", username=\"%s\" WHERE name=\"%s\"", 
703                         inet_ntoa(sin->sin_addr), ntohs(sin->sin_port), nowtime + expiry, uname, name);
704                 ast_mutex_lock(&mysqllock);
705                 if (mysql_real_query(mysql, query, strlen(query))) 
706                         ast_log(LOG_WARNING, "Unable to update database\n");
707                         
708                 ast_mutex_unlock(&mysqllock);
709         }
710 }
711
712 static struct sip_peer *mysql_peer(char *peer, struct sockaddr_in *sin)
713 {
714         struct sip_peer *p;
715         int success = 0;
716         
717         p = malloc(sizeof(struct sip_peer));
718         memset(p, 0, sizeof(struct sip_peer));
719         if (mysql && (!peer || (strlen(peer) < 128))) {
720                 char query[512];
721                 char *name = NULL;
722                 int numfields, x;
723                 int port;
724                 time_t regseconds, nowtime;
725                 MYSQL_RES *result;
726                 MYSQL_FIELD *fields;
727                 MYSQL_ROW rowval;
728                 if (peer) {
729                         name = alloca(strlen(peer) * 2 + 1);
730                         mysql_real_escape_string(mysql, name, peer, strlen(peer));
731                 }
732                 if (sin)
733                         snprintf(query, sizeof(query), "SELECT * FROM sipfriends WHERE ipaddr=\"%s\" AND port=\"%d\"", inet_ntoa(sin->sin_addr), ntohs(sin->sin_port));
734                 else
735                         snprintf(query, sizeof(query), "SELECT * FROM sipfriends WHERE name=\"%s\"", name);
736                 ast_mutex_lock(&mysqllock);
737                 mysql_query(mysql, query);
738                 if ((result = mysql_store_result(mysql))) {
739                         if ((rowval = mysql_fetch_row(result))) {
740                                 numfields = mysql_num_fields(result);
741                                 fields = mysql_fetch_fields(result);
742                                 success = 1;
743                                 for (x=0;x<numfields;x++) {
744                                         if (rowval[x]) {
745                                                 if (!strcasecmp(fields[x].name, "secret")) {
746                                                         strncpy(p->secret, rowval[x], sizeof(p->secret));
747                                                 } else if (!strcasecmp(fields[x].name, "name")) {
748                                                         strncpy(p->name, rowval[x], sizeof(p->name) - 1);
749                                                 } else if (!strcasecmp(fields[x].name, "context")) {
750                                                         strncpy(p->context, rowval[x], sizeof(p->context) - 1);
751                                                 } else if (!strcasecmp(fields[x].name, "username")) {
752                                                         strncpy(p->username, rowval[x], sizeof(p->username) - 1);
753                                                 } else if (!strcasecmp(fields[x].name, "ipaddr")) {
754                                                         inet_aton(rowval[x], &p->addr.sin_addr);
755                                                 } else if (!strcasecmp(fields[x].name, "port")) {
756                                                         if (sscanf(rowval[x], "%i", &port) != 1)
757                                                                 port = 0;
758                                                         p->addr.sin_port = htons(port);
759                                                 } else if (!strcasecmp(fields[x].name, "regseconds")) {
760                                                         if (sscanf(rowval[x], "%li", &regseconds) != 1)
761                                                                 regseconds = 0;
762                                                 }
763                                         }
764                                 }
765                                 time(&nowtime);
766                                 if (nowtime > regseconds) 
767                                         memset(&p->addr, 0, sizeof(p->addr));
768                         }
769                         mysql_free_result(result);
770                         result = NULL;
771                 }
772                 ast_mutex_unlock(&mysqllock);
773         }
774         if (!success) {
775                 free(p);
776                 p = NULL;
777         } else {
778                 p->dynamic = 1;
779                 p->capability = capability;
780                 p->nat = globalnat;
781                 p->dtmfmode = globaldtmfmode;
782                 p->insecure = 1;
783                 p->expire = -1;
784                 p->temponly = 1;
785                 
786         }
787         return p;
788 }
789 #endif /* MYSQL_FRIENDS */
790
791 static int create_addr(struct sip_pvt *r, char *peer)
792 {
793         struct hostent *hp;
794         struct sip_peer *p;
795         int found=0;
796         char *port;
797         int portno;
798         char host[256], *hostn;
799
800         r->sa.sin_family = AF_INET;
801         ast_mutex_lock(&peerl.lock);
802         p = peerl.peers;
803         while(p) {
804                 if (!strcasecmp(p->name, peer)) 
805                         break;
806                 p = p->next;
807         }
808 #ifdef MYSQL_FRIENDS
809         if (!p)
810                 p = mysql_peer(peer, NULL);
811 #endif          
812
813         if (p) {
814                         found++;
815                         r->capability = p->capability;
816                         r->nat = p->nat;
817                         if (r->rtp) {
818                                 ast_log(LOG_DEBUG, "Setting NAT on RTP to %d\n", r->nat);
819                                 ast_rtp_setnat(r->rtp, r->nat);
820                         }
821                         if (r->vrtp) {
822                                 ast_log(LOG_DEBUG, "Setting NAT on VRTP to %d\n", r->nat);
823                                 ast_rtp_setnat(r->vrtp, r->nat);
824                         }
825                         strncpy(r->peername, p->username, sizeof(r->peername)-1);
826                         strncpy(r->peersecret, p->secret, sizeof(r->peersecret)-1);
827                         strncpy(r->peermd5secret, p->md5secret, sizeof(r->peermd5secret)-1);
828                         strncpy(r->username, p->username, sizeof(r->username)-1);
829                         strncpy(r->tohost, p->tohost, sizeof(r->tohost)-1);
830                         if (!strlen(r->tohost)) {
831                                 if (p->addr.sin_addr.s_addr)
832                                         snprintf(r->tohost, sizeof(r->tohost), inet_ntoa(p->addr.sin_addr));
833                                 else
834                                         snprintf(r->tohost, sizeof(r->tohost), inet_ntoa(p->defaddr.sin_addr));
835                         }
836                         if (strlen(p->fromdomain))
837                                 strncpy(r->fromdomain, p->fromdomain, sizeof(r->fromdomain)-1);
838                         if (strlen(p->fromuser))
839                                 strncpy(r->fromuser, p->fromuser, sizeof(r->fromuser)-1);
840                         r->insecure = p->insecure;
841                         r->canreinvite = p->canreinvite;
842                         r->maxtime = p->maxms;
843                         r->callgroup = p->callgroup;
844                         r->pickupgroup = p->pickupgroup;
845                         if (p->dtmfmode) {
846                                 r->dtmfmode = p->dtmfmode;
847                                 if (r->dtmfmode & SIP_DTMF_RFC2833)
848                                         r->noncodeccapability |= AST_RTP_DTMF;
849                                 else
850                                         r->noncodeccapability &= ~AST_RTP_DTMF;
851                         }
852                         strncpy(r->context, p->context,sizeof(r->context)-1);
853                         if ((p->addr.sin_addr.s_addr || p->defaddr.sin_addr.s_addr) &&
854                                 (!p->maxms || ((p->lastms > 0)  && (p->lastms <= p->maxms)))) {
855                                 if (p->addr.sin_addr.s_addr) {
856                                         r->sa.sin_addr = p->addr.sin_addr;
857                                         r->sa.sin_port = p->addr.sin_port;
858                                 } else {
859                                         r->sa.sin_addr = p->defaddr.sin_addr;
860                                         r->sa.sin_port = p->defaddr.sin_port;
861                                 }
862                                 memcpy(&r->recv, &r->sa, sizeof(r->recv));
863                         } else {
864                                 if (p->temponly)
865                                         free(p);
866                                 p = NULL;
867                         }
868         }
869         ast_mutex_unlock(&peerl.lock);
870         if (!p && !found) {
871                 if ((port=strchr(peer, ':'))) {
872                         *port='\0';
873                         port++;
874                 }
875                 hostn = peer;
876                 if (port)
877                         portno = atoi(port);
878                 else
879                         portno = DEFAULT_SIP_PORT;
880                 if (srvlookup) {
881                         char service[256];
882                         int tportno;
883                         int ret;
884                         snprintf(service, sizeof(service), "_sip._udp.%s", peer);
885                         ret = ast_get_srv(NULL, host, sizeof(host), &tportno, service);
886                         if (ret > 0) {
887                                 hostn = host;
888                                 portno = tportno;
889                         }
890                 }
891                 hp = gethostbyname(hostn);
892                 if (hp) {
893                         strncpy(r->tohost, peer, sizeof(r->tohost) - 1);
894                         memcpy(&r->sa.sin_addr, hp->h_addr, sizeof(r->sa.sin_addr));
895                         r->sa.sin_port = htons(portno);
896                         memcpy(&r->recv, &r->sa, sizeof(r->recv));
897                         return 0;
898                 } else {
899                         ast_log(LOG_WARNING, "No such host: %s\n", peer);
900                         return -1;
901                 }
902         } else if (!p)
903                 return -1;
904         else {
905                 if (p->temponly)
906                         free(p);
907                 return 0;
908         }
909 }
910
911 static int auto_congest(void *nothing)
912 {
913         struct sip_pvt *p = nothing;
914         ast_mutex_lock(&p->lock);
915         p->initid = -1;
916         if (p->owner) {
917                 if (!ast_mutex_trylock(&p->owner->lock)) {
918                         ast_log(LOG_NOTICE, "Auto-congesting %s\n", p->owner->name);
919                         ast_queue_control(p->owner, AST_CONTROL_CONGESTION, 0);
920                         ast_mutex_unlock(&p->owner->lock);
921                 }
922         }
923         ast_mutex_unlock(&p->lock);
924         return 0;
925 }
926
927 static void sip_prefs_free(void)
928 {
929         struct sip_codec_pref *cur, *next;
930         cur = prefs;
931         while(cur) {
932                 next = cur->next;
933                 free(cur);
934                 cur = next;
935         }
936         prefs = NULL;
937 }
938
939 static void sip_pref_remove(int format)
940 {
941         struct sip_codec_pref *cur, *prev=NULL;
942         cur = prefs;
943         while(cur) {
944                 if (cur->codec == format) {
945                         if (prev)
946                                 prev->next = cur->next;
947                         else
948                                 prefs = cur->next;
949                         free(cur);
950                         return;
951                 }
952                 prev = cur;
953                 cur = cur->next;
954         }
955 }
956
957 static int sip_pref_append(int format)
958 {
959         struct sip_codec_pref *cur, *tmp;
960         sip_pref_remove(format);
961         tmp = (struct sip_codec_pref *)malloc(sizeof(struct sip_codec_pref));
962         if (!tmp)
963                 return -1;
964         memset(tmp, 0, sizeof(struct sip_codec_pref));
965         tmp->codec = format;
966         if (prefs) {
967                 cur = prefs;
968                 while(cur->next)
969                         cur = cur->next;
970                 cur->next = tmp;
971         } else
972                 prefs = tmp;
973         return 0;
974 }
975
976 static int sip_codec_choose(int formats)
977 {
978         struct sip_codec_pref *cur;
979         formats &= (AST_FORMAT_MAX_AUDIO - 1);
980         cur = prefs;
981         while(cur) {
982                 if (formats & cur->codec)
983                         return cur->codec;
984                 cur = cur->next;
985         }
986         return ast_best_codec(formats);
987 }
988
989 static int sip_call(struct ast_channel *ast, char *dest, int timeout)
990 {
991         int res;
992         struct sip_pvt *p;
993         char *vxml_url = NULL;
994         char *distinctive_ring = NULL;
995         struct varshead *headp;
996         struct ast_var_t *current;
997         
998         p = ast->pvt->pvt;
999         if ((ast->_state != AST_STATE_DOWN) && (ast->_state != AST_STATE_RESERVED)) {
1000                 ast_log(LOG_WARNING, "sip_call called on %s, neither down nor reserved\n", ast->name);
1001                 return -1;
1002         }
1003         /* Check whether there is vxml_url, distinctive ring variables */
1004
1005         headp=&ast->varshead;
1006         AST_LIST_TRAVERSE(headp,current,entries) {
1007                 /* Check whether there is a VXML_URL variable */
1008                 if (strcasecmp(ast_var_name(current),"VXML_URL")==0)
1009                 {
1010                         vxml_url = ast_var_value(current);
1011                         break;
1012                 }
1013                 /* Check whether there is a ALERT_INFO variable */
1014                 if (strcasecmp(ast_var_name(current),"ALERT_INFO")==0)
1015                 {
1016                         distinctive_ring = ast_var_value(current);
1017                         break;
1018                 }
1019         }
1020         
1021         res = 0;
1022         p->outgoing = 1;
1023         ast_log(LOG_DEBUG, "Outgoing Call for %s\n", p->username);
1024         res = find_user(p,INC_OUT_USE);
1025         if ( res != -1 ) {
1026                 p->restrictcid = ast->restrictcid;
1027                 p->jointcapability = p->capability;
1028                 transmit_invite(p, "INVITE", 1, NULL, NULL, vxml_url,distinctive_ring, 1);
1029                 if (p->maxtime) {
1030                         /* Initialize auto-congest time */
1031                         p->initid = ast_sched_add(sched, p->maxtime * 4, auto_congest, p);
1032                 }
1033         }
1034         return res;
1035 }
1036
1037 static void __sip_destroy(struct sip_pvt *p, int lockowner)
1038 {
1039         struct sip_pvt *cur, *prev = NULL;
1040         struct sip_pkt *cp;
1041         if (sipdebug)
1042                 ast_log(LOG_DEBUG, "Destroying call '%s'\n", p->callid);
1043         if (p->stateid > -1)
1044                 ast_extension_state_del(p->stateid, NULL);
1045         if (p->initid > -1)
1046                 ast_sched_del(sched, p->initid);
1047         if (p->autokillid > -1)
1048                 ast_sched_del(sched, p->autokillid);
1049
1050         if (p->rtp) {
1051                 ast_rtp_destroy(p->rtp);
1052         }
1053         if (p->vrtp) {
1054                 ast_rtp_destroy(p->vrtp);
1055         }
1056         if (p->route) {
1057                 free_old_route(p->route);
1058                 p->route = NULL;
1059         }
1060         if (p->registry) {
1061                 /* Carefully unlink from registry */
1062                 struct sip_registry *reg;
1063                 ast_mutex_lock(&regl.lock);
1064                 reg = regl.registrations;
1065                 while(reg) {
1066                         if ((reg == p->registry) && (p->registry->call == p))
1067                                 p->registry->call=NULL;
1068                         reg = reg->next;
1069                 }
1070                 ast_mutex_unlock(&regl.lock);
1071         }
1072         /* Unlink us from the owner if we have one */
1073         if (p->owner) {
1074                 if (lockowner)
1075                         ast_mutex_lock(&p->owner->lock);
1076                 ast_log(LOG_DEBUG, "Detaching from %s\n", p->owner->name);
1077                 p->owner->pvt->pvt = NULL;
1078                 if (lockowner)
1079                         ast_mutex_unlock(&p->owner->lock);
1080         }
1081         cur = iflist;
1082         while(cur) {
1083                 if (cur == p) {
1084                         if (prev)
1085                                 prev->next = cur->next;
1086                         else
1087                                 iflist = cur->next;
1088                         break;
1089                 }
1090                 prev = cur;
1091                 cur = cur->next;
1092         }
1093         if (!cur) {
1094                 ast_log(LOG_WARNING, "%p is not in list?!?! \n", cur);
1095         } else {
1096                 if (p->initid > -1)
1097                         ast_sched_del(sched, p->initid);
1098                 while((cp = p->packets)) {
1099                         p->packets = p->packets->next;
1100                         if (cp->retransid > -1)
1101                                 ast_sched_del(sched, cp->retransid);
1102                         free(cp);
1103                 }
1104                 free(p);
1105         }
1106 }
1107
1108 static int find_user(struct sip_pvt *fup, int event)
1109 {
1110         char name[256] = "";
1111         struct sip_user *u;
1112         strncpy(name, fup->username, sizeof(name) - 1);
1113         ast_mutex_lock(&userl.lock);
1114         u = userl.users;
1115         while(u) {
1116                 if (!strcasecmp(u->name, name)) {
1117                         break;
1118                 }
1119                 u = u->next;
1120         }
1121         if (!u) {
1122                 ast_log(LOG_DEBUG, "%s is not a local user\n", name);
1123                 ast_mutex_unlock(&userl.lock);
1124                 return 0;
1125         }
1126         switch(event) {
1127                 /* incoming and outgoing affects the inUse counter */
1128                 case DEC_OUT_USE:
1129                 case DEC_IN_USE:
1130                         if ( u->inUse > 0 ) {
1131                                 u->inUse--;
1132                         } else {
1133                                 u->inUse = 0;
1134                         }
1135                         break;
1136                 case INC_IN_USE:
1137                 case INC_OUT_USE:
1138                         if (u->incominglimit > 0 ) {
1139                                 if (u->inUse >= u->incominglimit) {
1140                                         ast_log(LOG_ERROR, "Call from user '%s' rejected due to usage limit of %d\n", u->name, u->incominglimit);
1141                                         ast_mutex_unlock(&userl.lock);
1142                                         /* inc inUse as well */
1143                                         if ( event == INC_OUT_USE ) {
1144                                                 u->inUse++;
1145                                         }
1146                                         return -1; 
1147                                 }
1148                         }
1149                         u->inUse++;
1150                         ast_log(LOG_DEBUG, "Call from user '%s' is %d out of %d\n", u->name, u->inUse, u->incominglimit);
1151                         break;
1152                 /* we don't use these anymore
1153                 case DEC_OUT_USE:
1154                         if ( u->outUse > 0 ) {
1155                                 u->outUse--;
1156                         } else {
1157                                 u->outUse = 0;
1158                         }
1159                         break;
1160                 case INC_OUT_USE:
1161                         if ( u->outgoinglimit > 0 ) {
1162                                 if ( u->outUse >= u->outgoinglimit ) {
1163                                         ast_log(LOG_ERROR, "Outgoing call from user '%s' rejected due to usage limit of %d\n", u->name, u->outgoinglimit);
1164                                         ast_mutex_unlock(&userl.lock);
1165                                         return -1;
1166                                 }
1167                         }
1168                         u->outUse++;
1169                         break;
1170                 */
1171                 default:
1172                         ast_log(LOG_ERROR, "find_user(%s,%d) called with no event!\n",u->name,event);
1173         }
1174         ast_mutex_unlock(&userl.lock);
1175         return 0;
1176 }
1177
1178 static void sip_destroy(struct sip_pvt *p)
1179 {
1180         ast_mutex_lock(&iflock);
1181         __sip_destroy(p, 1);
1182         ast_mutex_unlock(&iflock);
1183 }
1184
1185 static int transmit_response_reliable(struct sip_pvt *p, char *msg, struct sip_request *req);
1186
1187 static int hangup_sip2cause(int cause)
1188 {
1189         switch(cause)
1190         {
1191                 case 486:
1192                         return AST_CAUSE_BUSY;
1193                 default:
1194                         return AST_CAUSE_NORMAL;
1195         }
1196         /* Never reached */
1197         return 0;
1198 }
1199
1200 static char *hangup_cause2sip(int cause)
1201 {
1202         switch(cause)
1203         {
1204                 case AST_CAUSE_BUSY:
1205                         return "486 Busy";
1206                 default:
1207                         return NULL;
1208         }
1209         /* Never reached */
1210         return 0;
1211 }
1212
1213 static int sip_hangup(struct ast_channel *ast)
1214 {
1215         struct sip_pvt *p = ast->pvt->pvt;
1216         int needcancel = 0;
1217         int needdestroy = 0;
1218         if (option_debug)
1219                 ast_log(LOG_DEBUG, "sip_hangup(%s)\n", ast->name);
1220         if (!ast->pvt->pvt) {
1221                 ast_log(LOG_DEBUG, "Asked to hangup channel not connected\n");
1222                 return 0;
1223         }
1224         ast_mutex_lock(&p->lock);
1225         if ( p->outgoing ) {
1226                 ast_log(LOG_DEBUG, "find_user(%s) - decrement outUse counter\n", p->username);
1227                 find_user(p, DEC_OUT_USE);
1228         } else {
1229                 ast_log(LOG_DEBUG, "find_user(%s) - decrement inUse counter\n", p->username);
1230                 find_user(p, DEC_IN_USE);
1231         }
1232         /* Determine how to disconnect */
1233         if (p->owner != ast) {
1234                 ast_log(LOG_WARNING, "Huh?  We aren't the owner?\n");
1235                 ast_mutex_unlock(&p->lock);
1236                 return 0;
1237         }
1238         if (!ast || (ast->_state != AST_STATE_UP))
1239                 needcancel = 1;
1240         /* Disconnect */
1241         p = ast->pvt->pvt;
1242         if (p->vad) {
1243             ast_dsp_free(p->vad);
1244         }
1245         p->owner = NULL;
1246         ast->pvt->pvt = NULL;
1247
1248         ast_mutex_lock(&usecnt_lock);
1249         usecnt--;
1250         ast_mutex_unlock(&usecnt_lock);
1251         ast_update_use_count();
1252
1253         needdestroy = 1;
1254         /* Start the process if it's not already started */
1255         if (!p->alreadygone && strlen(p->initreq.data)) {
1256                 if (needcancel) {
1257                         if (p->outgoing) {
1258                                 transmit_request_with_auth(p, "CANCEL", p->ocseq, 1);
1259                                 /* Actually don't destroy us yet, wait for the 487 on our original 
1260                                    INVITE, but do set an autodestruct just in case. */
1261                                 needdestroy = 0;
1262                                 sip_scheddestroy(p, 15000);
1263                                 if ( p->initid != -1 ) {
1264                                         /* channel still up - reverse dec of inUse counter
1265                                            only if the channel is not auto-congested */
1266                                         if ( p->outgoing ) {
1267                                                 find_user(p, INC_OUT_USE);
1268                                         }
1269                                         else {
1270                                                 find_user(p, INC_IN_USE);
1271                                         }
1272                                 }
1273                         } else {
1274                                 char *res;
1275                                 if (ast->hangupcause && ((res = hangup_cause2sip(ast->hangupcause)))) {
1276                                         transmit_response_reliable(p, res, &p->initreq);
1277                                 } else 
1278                                         transmit_response_reliable(p, "403 Forbidden", &p->initreq);
1279                         }
1280                 } else {
1281                         if (!p->pendinginvite) {
1282                                 /* Send a hangup */
1283                                 transmit_request_with_auth(p, "BYE", 0, 1);
1284                         } else {
1285                                 /* Note we will need a BYE when this all settles out
1286                                    but we can't send one while we have "INVITE" outstanding. */
1287                                 p->pendingbye = 1;
1288                         }
1289                 }
1290         }
1291         p->needdestroy = needdestroy;
1292         ast_mutex_unlock(&p->lock);
1293         return 0;
1294 }
1295
1296 static int sip_answer(struct ast_channel *ast)
1297 {
1298         int res = 0,fmt;
1299         char *codec;
1300         struct sip_pvt *p = ast->pvt->pvt;
1301
1302         
1303         if (ast->_state != AST_STATE_UP) {
1304         
1305         
1306         
1307                 codec=pbx_builtin_getvar_helper(p->owner,"SIP_CODEC");
1308                 if (codec) {
1309                         fmt=ast_getformatbyname(codec);
1310                         if (fmt) {
1311                                 ast_log(LOG_NOTICE, "Changing codec to '%s' for this call because of ${SIP_CODEC) variable\n",codec);
1312                                 p->jointcapability=fmt;
1313                         } else ast_log(LOG_NOTICE, "Ignoring ${SIP_CODEC} variable because of unrecognized/not configured codec (check allow/disallow in sip.conf): %s\n",codec);
1314                 }
1315
1316                 ast_setstate(ast, AST_STATE_UP);
1317                 if (option_debug)
1318                         ast_log(LOG_DEBUG, "sip_answer(%s)\n", ast->name);
1319                 res = transmit_response_with_sdp(p, "200 OK", &p->initreq, 1);
1320         }
1321         return res;
1322 }
1323
1324 static int sip_write(struct ast_channel *ast, struct ast_frame *frame)
1325 {
1326         struct sip_pvt *p = ast->pvt->pvt;
1327         int res = 0;
1328         if (frame->frametype == AST_FRAME_VOICE) {
1329                 if (!(frame->subclass & ast->nativeformats)) {
1330                         ast_log(LOG_WARNING, "Asked to transmit frame type %d, while native formats is %d (read/write = %d/%d)\n",
1331                                 frame->subclass, ast->nativeformats, ast->readformat, ast->writeformat);
1332                         return -1;
1333                 }
1334                 if (p) {
1335                         ast_mutex_lock(&p->lock);
1336                         if (p->rtp) {
1337                                 if ((ast->_state != AST_STATE_UP) && !p->progress && !p->outgoing) {
1338                                         transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, 0);
1339                                         p->progress = 1;
1340                                 }
1341                                 res =  ast_rtp_write(p->rtp, frame);
1342                         }
1343                         ast_mutex_unlock(&p->lock);
1344                 }
1345         } else if (frame->frametype == AST_FRAME_VIDEO) {
1346                 if (p) {
1347                         ast_mutex_lock(&p->lock);
1348                         if (p->vrtp) {
1349                                 if ((ast->_state != AST_STATE_UP) && !p->progress && !p->outgoing) {
1350                                         transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, 0);
1351                                         p->progress = 1;
1352                                 }
1353                                 res =  ast_rtp_write(p->vrtp, frame);
1354                         }
1355                         ast_mutex_unlock(&p->lock);
1356                 }
1357         } else if (frame->frametype == AST_FRAME_IMAGE) {
1358                 return 0;
1359         } else {
1360                 ast_log(LOG_WARNING, "Can't send %d type frames with SIP write\n", frame->frametype);
1361                 return 0;
1362         }
1363
1364         return res;
1365 }
1366
1367 static int sip_fixup(struct ast_channel *oldchan, struct ast_channel *newchan, int needlock)
1368 {
1369         struct sip_pvt *p = newchan->pvt->pvt;
1370         if (needlock)
1371                 ast_mutex_lock(&p->lock);
1372         if (p->owner != oldchan) {
1373                 ast_log(LOG_WARNING, "old channel wasn't %p but was %p\n", oldchan, p->owner);
1374                 if (needlock)
1375                         ast_mutex_unlock(&p->lock);
1376                 return -1;
1377         }
1378         p->owner = newchan;
1379         if (needlock)
1380                 ast_mutex_unlock(&p->lock);
1381         return 0;
1382 }
1383
1384 static int sip_senddigit(struct ast_channel *ast, char digit)
1385 {
1386         struct sip_pvt *p = ast->pvt->pvt;
1387         if (p && (p->dtmfmode & SIP_DTMF_INFO)) {
1388                 transmit_info_with_digit(p, digit);
1389         }
1390         if (p && p->rtp && (p->dtmfmode & SIP_DTMF_RFC2833)) {
1391                 ast_rtp_senddigit(p->rtp, digit);
1392         }
1393         /* If in-band DTMF is desired, send that */
1394         if (p->dtmfmode & SIP_DTMF_INBAND)
1395                 return -1;
1396         return 0;
1397 }
1398
1399 static int sip_transfer(struct ast_channel *ast, char *dest)
1400 {
1401         struct sip_pvt *p = ast->pvt->pvt;
1402         int res;
1403         res = transmit_refer(p, dest);
1404         return res;
1405 }
1406
1407 static int sip_indicate(struct ast_channel *ast, int condition)
1408 {
1409         struct sip_pvt *p = ast->pvt->pvt;
1410         switch(condition) {
1411         case AST_CONTROL_RINGING:
1412                 if (ast->_state == AST_STATE_RING) {
1413                         if (!p->progress && !p->ringing) {
1414                                 transmit_response(p, "180 Ringing", &p->initreq);
1415                                 p->ringing = 1;
1416                                 break;
1417                         } else {
1418                                 /* Oops, we've sent progress tones.  Let Asterisk do it instead */
1419                         }
1420                 }
1421                 return -1;
1422         case AST_CONTROL_BUSY:
1423                 if (ast->_state != AST_STATE_UP) {
1424                         transmit_response(p, "486 Busy Here", &p->initreq);
1425                         p->alreadygone = 1;
1426                         ast_softhangup_nolock(ast, AST_SOFTHANGUP_DEV);
1427                         break;
1428                 }
1429                 return -1;
1430         case AST_CONTROL_CONGESTION:
1431                 if (ast->_state != AST_STATE_UP) {
1432                         transmit_response(p, "503 Service Unavailable", &p->initreq);
1433                         p->alreadygone = 1;
1434                         ast_softhangup_nolock(ast, AST_SOFTHANGUP_DEV);
1435                         break;
1436                 }
1437                 return -1;
1438         case AST_CONTROL_PROGRESS:
1439                 if ((ast->_state != AST_STATE_UP) && !p->progress && !p->outgoing) {
1440                         transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, 0);
1441                         p->progress = 1;
1442                         break;
1443                 }
1444                 return -1;
1445         case -1:
1446                 return -1;
1447         default:
1448                 ast_log(LOG_WARNING, "Don't know how to indicate condition %d\n", condition);
1449                 return -1;
1450         }
1451         return 0;
1452 }
1453
1454
1455
1456 static struct ast_channel *sip_new(struct sip_pvt *i, int state, char *title)
1457 {
1458         struct ast_channel *tmp;
1459         int fmt;
1460         tmp = ast_channel_alloc(1);
1461         if (tmp) {
1462                 /* Select our native format based on codec preference until we receive
1463                    something from another device to the contrary. */
1464                 if (i->jointcapability)
1465                         tmp->nativeformats = sip_codec_choose(i->jointcapability);
1466                 else if (i->capability)
1467                         tmp->nativeformats = sip_codec_choose(i->capability);
1468                 else
1469                         tmp->nativeformats = sip_codec_choose(capability);
1470                 fmt = ast_best_codec(tmp->nativeformats);
1471                 if (title)
1472                         snprintf(tmp->name, sizeof(tmp->name), "SIP/%s-%04x", title, rand() & 0xffff);
1473                 else
1474                         if (strchr(i->fromdomain,':'))
1475                         {
1476                                 snprintf(tmp->name, sizeof(tmp->name), "SIP/%s-%08x", strchr(i->fromdomain,':')+1, (int)(i));
1477                         }
1478                         else
1479                         {
1480                                 snprintf(tmp->name, sizeof(tmp->name), "SIP/%s-%08x", i->fromdomain, (int)(i));
1481                         }
1482                 tmp->type = type;
1483                 if (i->dtmfmode & SIP_DTMF_INBAND) {
1484                     i->vad = ast_dsp_new();
1485                     ast_dsp_set_features(i->vad, DSP_FEATURE_DTMF_DETECT);
1486                 }
1487                 tmp->fds[0] = ast_rtp_fd(i->rtp);
1488                 tmp->fds[1] = ast_rtcp_fd(i->rtp);
1489                 if (i->vrtp) {
1490                         tmp->fds[2] = ast_rtp_fd(i->vrtp);
1491                         tmp->fds[3] = ast_rtcp_fd(i->vrtp);
1492                 }
1493                 ast_setstate(tmp, state);
1494                 if (state == AST_STATE_RING)
1495                         tmp->rings = 1;
1496                 tmp->adsicpe = AST_ADSI_UNAVAILABLE;
1497                 tmp->writeformat = fmt;
1498                 tmp->pvt->rawwriteformat = fmt;
1499                 tmp->readformat = fmt;
1500                 tmp->pvt->rawreadformat = fmt;
1501                 tmp->pvt->pvt = i;
1502                 tmp->pvt->send_text = sip_sendtext;
1503                 tmp->pvt->call = sip_call;
1504                 tmp->pvt->hangup = sip_hangup;
1505                 tmp->pvt->answer = sip_answer;
1506                 tmp->pvt->read = sip_read;
1507                 tmp->pvt->write = sip_write;
1508                 tmp->pvt->write_video = sip_write;
1509                 tmp->pvt->indicate = sip_indicate;
1510                 tmp->pvt->transfer = sip_transfer;
1511                 tmp->pvt->fixup = sip_fixup;
1512                 tmp->pvt->send_digit = sip_senddigit;
1513
1514                 tmp->pvt->bridge = ast_rtp_bridge;
1515
1516                 tmp->callgroup = i->callgroup;
1517                 tmp->pickupgroup = i->pickupgroup;
1518                 tmp->restrictcid = i->restrictcid;
1519                 if (strlen(i->accountcode))
1520                         strncpy(tmp->accountcode, i->accountcode, sizeof(tmp->accountcode)-1);
1521                 if (i->amaflags)
1522                         tmp->amaflags = i->amaflags;
1523                 if (strlen(i->language))
1524                         strncpy(tmp->language, i->language, sizeof(tmp->language)-1);
1525                 i->owner = tmp;
1526                 ast_mutex_lock(&usecnt_lock);
1527                 usecnt++;
1528                 ast_mutex_unlock(&usecnt_lock);
1529                 strncpy(tmp->context, i->context, sizeof(tmp->context)-1);
1530                 strncpy(tmp->exten, i->exten, sizeof(tmp->exten)-1);
1531                 if (strlen(i->callerid))
1532                         tmp->callerid = strdup(i->callerid);
1533                 if (strlen(i->rdnis))
1534                         tmp->rdnis = strdup(i->rdnis);
1535                 tmp->priority = 1;
1536                 if (strlen(i->domain)) {
1537                         pbx_builtin_setvar_helper(tmp, "SIPDOMAIN", i->domain);
1538                 }
1539                                                 
1540                 if (state != AST_STATE_DOWN) {
1541                         if (ast_pbx_start(tmp)) {
1542                                 ast_log(LOG_WARNING, "Unable to start PBX on %s\n", tmp->name);
1543                                 ast_hangup(tmp);
1544                                 tmp = NULL;
1545                         }
1546                 }
1547         } else
1548                 ast_log(LOG_WARNING, "Unable to allocate channel structure\n");
1549         return tmp;
1550 }
1551
1552 static struct cfalias {
1553         char *fullname;
1554         char *shortname;
1555 } aliases[] = {
1556         { "Content-Type", "c" },
1557         { "Content-Encoding", "e" },
1558         { "From", "f" },
1559         { "Call-ID", "i" },
1560         { "Contact", "m" },
1561         { "Content-Length", "l" },
1562         { "Subject", "s" },
1563         { "To", "t" },
1564         { "Via", "v" },
1565 };
1566
1567 static char* get_sdp_by_line(char* line, char *name, int nameLen) {
1568   if (strncasecmp(line, name, nameLen) == 0 && line[nameLen] == '=') {
1569     char* r = line + nameLen + 1;
1570     while (*r && (*r < 33)) ++r;
1571     return r;
1572   }
1573
1574   return "";
1575 }
1576
1577 static char *get_sdp(struct sip_request *req, char *name) {
1578   int x;
1579   int len = strlen(name);
1580   char *r;
1581
1582   for (x=0; x<req->lines; x++) {
1583     r = get_sdp_by_line(req->line[x], name, len);
1584     if (r[0] != '\0') return r;
1585   }
1586   return "";
1587 }
1588
1589 static void sdpLineNum_iterator_init(int* iterator) {
1590   *iterator = 0;
1591 }
1592
1593 static char* get_sdp_iterate(int* iterator,
1594                              struct sip_request *req, char *name) {
1595   int len = strlen(name);
1596   char *r;
1597   while (*iterator < req->lines) {
1598     r = get_sdp_by_line(req->line[(*iterator)++], name, len);
1599     if (r[0] != '\0') return r;
1600   }
1601   return "";
1602 }
1603
1604 static char *__get_header(struct sip_request *req, char *name, int *start)
1605 {
1606         int x;
1607         int len = strlen(name);
1608         char *r;
1609         for (x=*start;x<req->headers;x++) {
1610                 if (!strncasecmp(req->header[x], name, len) && 
1611                                 (req->header[x][len] == ':')) {
1612                                         r = req->header[x] + len + 1;
1613                                         while(*r && (*r < 33))
1614                                                         r++;
1615                                         *start = x+1;
1616                                         return r;
1617                 }
1618         }
1619         /* Try aliases */
1620         for (x=0;x<sizeof(aliases) / sizeof(aliases[0]); x++) 
1621                 if (!strcasecmp(aliases[x].fullname, name))
1622                         return __get_header(req, aliases[x].shortname, start);
1623
1624         /* Don't return NULL, so get_header is always a valid pointer */
1625         return "";
1626 }
1627
1628 static char *get_header(struct sip_request *req, char *name)
1629 {
1630         int start = 0;
1631         return __get_header(req, name, &start);
1632 }
1633
1634 static struct ast_frame *sip_rtp_read(struct ast_channel *ast, struct sip_pvt *p)
1635 {
1636         /* Retrieve audio/etc from channel.  Assumes p->lock is already held. */
1637         struct ast_frame *f;
1638         static struct ast_frame null_frame = { AST_FRAME_NULL, };
1639         switch(ast->fdno) {
1640         case 0:
1641                 f = ast_rtp_read(p->rtp);
1642                 break;
1643         case 1:
1644                 f = ast_rtcp_read(p->rtp);
1645                 break;
1646         case 2:
1647                 f = ast_rtp_read(p->vrtp);
1648                 break;
1649         case 3:
1650                 f = ast_rtcp_read(p->vrtp);
1651                 break;
1652         default:
1653                 f = &null_frame;
1654         }
1655         /* Don't send RFC2833 if we're not supposed to */
1656         if (f && (f->frametype == AST_FRAME_DTMF) && !(p->dtmfmode & SIP_DTMF_RFC2833))
1657                 return &null_frame;
1658         if (p->owner) {
1659                 /* We already hold the channel lock */
1660                 if (f->frametype == AST_FRAME_VOICE) {
1661                         if (f->subclass != p->owner->nativeformats) {
1662                                 ast_log(LOG_DEBUG, "Oooh, format changed to %d\n", f->subclass);
1663                                 p->owner->nativeformats = f->subclass;
1664                                 ast_set_read_format(p->owner, p->owner->readformat);
1665                                 ast_set_write_format(p->owner, p->owner->writeformat);
1666                         }
1667             if (p->dtmfmode & SIP_DTMF_INBAND) {
1668                    f = ast_dsp_process(p->owner,p->vad,f,0);
1669             }
1670                 }
1671         }
1672         return f;
1673 }
1674
1675 static struct ast_frame *sip_read(struct ast_channel *ast)
1676 {
1677         struct ast_frame *fr;
1678         struct sip_pvt *p = ast->pvt->pvt;
1679         ast_mutex_lock(&p->lock);
1680         fr = sip_rtp_read(ast, p);
1681         ast_mutex_unlock(&p->lock);
1682         return fr;
1683 }
1684
1685 static void build_callid(char *callid, int len, struct in_addr ourip)
1686 {
1687         int res;
1688         int val;
1689         int x;
1690         for (x=0;x<4;x++) {
1691                 val = rand();
1692                 res = snprintf(callid, len, "%08x", val);
1693                 len -= res;
1694                 callid += res;
1695         }
1696         /* It's not important that we really use our right IP here... */
1697         snprintf(callid, len, "@%s", inet_ntoa(ourip));
1698 }
1699
1700 static struct sip_pvt *sip_alloc(char *callid, struct sockaddr_in *sin, int useglobalnat)
1701 {
1702         struct sip_pvt *p;
1703
1704         p = malloc(sizeof(struct sip_pvt));
1705         if (!p)
1706                 return NULL;
1707         /* Keep track of stuff */
1708         memset(p, 0, sizeof(struct sip_pvt));
1709         p->initid = -1;
1710         p->autokillid = -1;
1711         p->stateid = -1;
1712         p->rtp = ast_rtp_new(sched, io, 1, 0);
1713         if (videosupport)
1714                 p->vrtp = ast_rtp_new(sched, io, 1, 0);
1715         p->branch = rand();     
1716         p->tag = rand();
1717         
1718         /* Start with 101 instead of 1 */
1719         p->ocseq = 101;
1720         if (!p->rtp) {
1721                 ast_log(LOG_WARNING, "Unable to create RTP session: %s\n", strerror(errno));
1722                 free(p);
1723                 return NULL;
1724         }
1725         ast_rtp_settos(p->rtp, tos);
1726         if (p->vrtp)
1727                 ast_rtp_settos(p->vrtp, tos);
1728         if (useglobalnat && sin) {
1729                 /* Setup NAT structure according to global settings if we have an address */
1730                 p->nat = globalnat;
1731                 memcpy(&p->recv, sin, sizeof(p->recv));
1732                 ast_rtp_setnat(p->rtp, p->nat);
1733                 if (p->vrtp)
1734                         ast_rtp_setnat(p->vrtp, p->nat);
1735         }
1736         ast_mutex_init(&p->lock);
1737
1738         if (sin) {
1739                 memcpy(&p->sa, sin, sizeof(p->sa));
1740                 if (ast_sip_ouraddrfor(&p->sa.sin_addr,&p->ourip))
1741                         memcpy(&p->ourip, &__ourip, sizeof(p->ourip));
1742         } else {
1743                 memcpy(&p->ourip, &__ourip, sizeof(p->ourip));
1744         }
1745         /* z9hG4bK is a magic cookie.  See RFC 3261 section 8.1.1.7 */
1746         snprintf(p->via, sizeof(p->via), "SIP/2.0/UDP %s:%d;branch=z9hG4bK%08x", inet_ntoa(p->ourip), ourport, p->branch);
1747         if (!callid)
1748                 build_callid(p->callid, sizeof(p->callid), p->ourip);
1749         else
1750                 strncpy(p->callid, callid, sizeof(p->callid) - 1);
1751         /* Assume reinvite OK and via INVITE */
1752         p->canreinvite = globalcanreinvite;
1753         p->dtmfmode = globaldtmfmode;
1754         p->capability = capability;
1755         if (p->dtmfmode & SIP_DTMF_RFC2833)
1756                 p->noncodeccapability |= AST_RTP_DTMF;
1757         strncpy(p->context, context, sizeof(p->context) - 1);
1758         strncpy(p->fromdomain, fromdomain, sizeof(p->fromdomain) - 1);
1759         /* Add to list */
1760         ast_mutex_lock(&iflock);
1761         p->next = iflist;
1762         iflist = p;
1763         ast_mutex_unlock(&iflock);
1764         if (option_debug)
1765                 ast_log(LOG_DEBUG, "Allocating new SIP call for %s\n", callid);
1766         return p;
1767 }
1768
1769 static struct sip_pvt *find_call(struct sip_request *req, struct sockaddr_in *sin)
1770 {
1771         struct sip_pvt *p;
1772         char *callid;
1773         char tmp[256] = "";
1774         char *cmd;
1775         char *tag = "", *c;
1776         int themisfrom;
1777         callid = get_header(req, "Call-ID");
1778
1779         if (pedanticsipchecking) {
1780                 /* In principle Call-ID's uniquely identify a call, however some vendors
1781                    (i.e. Pingtel) send multiple calls with the same Call-ID and different
1782                    tags in order to simplify billing.  The RFC does state that we have to
1783                    compare tags in addition to the call-id, but this generate substantially
1784                    more overhead which is totally unnecessary for the vast majority of sane
1785                    SIP implementations, and thus Asterisk does not enable this behavior
1786                    by default. Short version: You'll need this option to support conferencing
1787                    on the pingtel */
1788                 strncpy(tmp, req->header[0], sizeof(tmp) - 1);
1789                 cmd = tmp;
1790                 c = strchr(tmp, ' ');
1791                 if (c)
1792                         *c = '\0';
1793                 if (!strcasecmp(cmd, "SIP/2.0")) {
1794                         themisfrom = 0;
1795                 } else {
1796                         themisfrom = 1;
1797                 }
1798                 if (themisfrom)
1799                         strncpy(tmp, get_header(req, "From"), sizeof(tmp) - 1);
1800                 else
1801                         strncpy(tmp, get_header(req, "To"), sizeof(tmp) - 1);
1802                 tag = strstr(tmp, "tag=");
1803                 if (tag) {
1804                         tag += 4;
1805                         c = strchr(tag, ';');
1806                         if (c)
1807                                 *c = '\0';
1808                 }
1809                         
1810         }
1811                 
1812         if (!strlen(callid)) {
1813                 ast_log(LOG_WARNING, "Call missing call ID from '%s'\n", inet_ntoa(sin->sin_addr));
1814                 return NULL;
1815         }
1816         ast_mutex_lock(&iflock);
1817         p = iflist;
1818         while(p) {
1819                 if (!strcmp(p->callid, callid) && 
1820                         (!pedanticsipchecking || !tag || !strlen(p->theirtag) || !strcmp(p->theirtag, tag))) {
1821                         /* Found the call */
1822                         ast_mutex_lock(&p->lock);
1823                         ast_mutex_unlock(&iflock);
1824                         return p;
1825                 }
1826                 p = p->next;
1827         }
1828         ast_mutex_unlock(&iflock);
1829         p = sip_alloc(callid, sin, 1);
1830         if (p)
1831                 ast_mutex_lock(&p->lock);
1832         return p;
1833 }
1834
1835 static int sip_register(char *value, int lineno)
1836 {
1837         struct sip_registry *reg;
1838         char copy[256] = "";
1839         char *username=NULL, *hostname=NULL, *secret=NULL, *authuser=NULL;
1840         char *porta=NULL;
1841         char *contact=NULL;
1842         char *stringp=NULL;
1843         
1844         struct hostent *hp;
1845         if (!value)
1846                 return -1;
1847         strncpy(copy, value, sizeof(copy)-1);
1848         stringp=copy;
1849         username = stringp;
1850         hostname = strrchr(stringp, '@');
1851         if (hostname) {
1852                 *hostname = '\0';
1853                 hostname++;
1854         }
1855         if (!username || !strlen(username) || !hostname || !strlen(hostname)) {
1856                 ast_log(LOG_WARNING, "Format for registration is user[:secret[:authuser]]@host[:port][/contact] at line %d", lineno);
1857                 return -1;
1858         }
1859         stringp=username;
1860         username = strsep(&stringp, ":");
1861         if (username) {
1862                 secret = strsep(&stringp, ":");
1863                 if (secret) 
1864                         authuser = strsep(&stringp, ":");
1865         }
1866         stringp = hostname;
1867         hostname = strsep(&stringp, "/");
1868         if (hostname) 
1869                 contact = strsep(&stringp, "/");
1870         if (!contact || !strlen(contact))
1871                 contact = "s";
1872         stringp=hostname;
1873         hostname = strsep(&stringp, ":");
1874         porta = strsep(&stringp, ":");
1875         
1876         if (porta && !atoi(porta)) {
1877                 ast_log(LOG_WARNING, "%s is not a valid port number at line %d\n", porta, lineno);
1878                 return -1;
1879         }
1880         hp = gethostbyname(hostname);
1881         if (!hp) {
1882                 ast_log(LOG_WARNING, "Host '%s' not found at line %d\n", hostname, lineno);
1883                 return -1;
1884         }
1885         reg = malloc(sizeof(struct sip_registry));
1886         if (reg) {
1887                 memset(reg, 0, sizeof(struct sip_registry));
1888                 strncpy(reg->contact, contact, sizeof(reg->contact) - 1);
1889                 if (username)
1890                         strncpy(reg->username, username, sizeof(reg->username)-1);
1891                 if (hostname)
1892                         strncpy(reg->hostname, hostname, sizeof(reg->hostname)-1);
1893                 if (authuser)
1894                         strncpy(reg->authuser, authuser, sizeof(reg->authuser)-1);
1895                 if (secret)
1896                         strncpy(reg->secret, secret, sizeof(reg->secret)-1);
1897                 reg->expire = -1;
1898                 reg->timeout =  -1;
1899                 reg->refresh = default_expiry;
1900                 reg->addr.sin_family = AF_INET;
1901                 memcpy(&reg->addr.sin_addr, hp->h_addr, sizeof(&reg->addr.sin_addr));
1902                 reg->addr.sin_port = porta ? htons(atoi(porta)) : htons(DEFAULT_SIP_PORT);
1903                 reg->callid_valid = 0;
1904                 reg->ocseq = 101;
1905                 ast_mutex_lock(&regl.lock);
1906                 reg->next = regl.registrations;
1907                 regl.registrations = reg;
1908                 ast_mutex_unlock(&regl.lock);
1909         } else {
1910                 ast_log(LOG_ERROR, "Out of memory\n");
1911                 return -1;
1912         }
1913         return 0;
1914 }
1915
1916 static void parse(struct sip_request *req)
1917 {
1918         /* Divide fields by NULL's */
1919         char *c;
1920         int f = 0;
1921         c = req->data;
1922
1923         /* First header starts immediately */
1924         req->header[f] = c;
1925         while(*c) {
1926                 if (*c == '\n') {
1927                         /* We've got a new header */
1928                         *c = 0;
1929
1930 #if 0
1931                         printf("Header: %s (%d)\n", req->header[f], strlen(req->header[f]));
1932 #endif                  
1933                         if (!strlen(req->header[f])) {
1934                                 /* Line by itself means we're now in content */
1935                                 c++;
1936                                 break;
1937                         }
1938                         if (f >= SIP_MAX_HEADERS - 1) {
1939                                 ast_log(LOG_WARNING, "Too many SIP headers...\n");
1940                         } else
1941                                 f++;
1942                         req->header[f] = c + 1;
1943                 } else if (*c == '\r') {
1944                         /* Ignore but eliminate \r's */
1945                         *c = 0;
1946                 }
1947                 c++;
1948         }
1949         /* Check for last header */
1950         if (strlen(req->header[f])) 
1951                 f++;
1952         req->headers = f;
1953         /* Now we process any mime content */
1954         f = 0;
1955         req->line[f] = c;
1956         while(*c) {
1957                 if (*c == '\n') {
1958                         /* We've got a new line */
1959                         *c = 0;
1960 #if 0
1961                         printf("Line: %s (%d)\n", req->line[f], strlen(req->line[f]));
1962 #endif                  
1963                         if (f >= SIP_MAX_LINES - 1) {
1964                                 ast_log(LOG_WARNING, "Too many SDP lines...\n");
1965                         } else
1966                                 f++;
1967                         req->line[f] = c + 1;
1968                 } else if (*c == '\r') {
1969                         /* Ignore and eliminate \r's */
1970                         *c = 0;
1971                 }
1972                 c++;
1973         }
1974         /* Check for last line */
1975         if (strlen(req->line[f])) 
1976                 f++;
1977         req->lines = f;
1978         if (sipdebug)
1979                 ast_verbose("%d headers, %d lines\n", req->headers, req->lines);
1980         if (*c) 
1981                 ast_log(LOG_WARNING, "Odd content, extra stuff left over ('%s')\n", c);
1982 }
1983
1984 static int process_sdp(struct sip_pvt *p, struct sip_request *req)
1985 {
1986         char *m;
1987         char *c;
1988         char *a;
1989         char host[258];
1990         int len = -1;
1991         int portno=0;
1992         int vportno=0;
1993         int peercapability, peernoncodeccapability;
1994         int vpeercapability=0, vpeernoncodeccapability=0;
1995         struct sockaddr_in sin;
1996         char *codecs;
1997         struct hostent *hp;
1998         int codec;
1999         int iterator;
2000         int sendonly = 0;
2001         int x;
2002
2003         /* Get codec and RTP info from SDP */
2004         if (strcasecmp(get_header(req, "Content-Type"), "application/sdp")) {
2005                 ast_log(LOG_NOTICE, "Content is '%s', not 'application/sdp'\n", get_header(req, "Content-Type"));
2006                 return -1;
2007         }
2008         m = get_sdp(req, "m");
2009         c = get_sdp(req, "c");
2010         if (!strlen(m) || !strlen(c)) {
2011                 ast_log(LOG_WARNING, "Insufficient information for SDP (m = '%s', c = '%s')\n", m, c);
2012                 return -1;
2013         }
2014         if (sscanf(c, "IN IP4 %256s", host) != 1) {
2015                 ast_log(LOG_WARNING, "Invalid host in c= line, '%s'\n", c);
2016                 return -1;
2017         }
2018         /* XXX This could block for a long time, and block the main thread! XXX */
2019         hp = gethostbyname(host);
2020         if (!hp) {
2021                 ast_log(LOG_WARNING, "Unable to lookup host in c= line, '%s'\n", c);
2022                 return -1;
2023         }
2024         sdpLineNum_iterator_init(&iterator);
2025         while ((m = get_sdp_iterate(&iterator, req, "m"))[0] != '\0') {
2026                 if ((sscanf(m, "audio %d RTP/AVP %n", &x, &len) == 1)) {
2027                         portno = x;
2028                         // Scan through the RTP payload types specified in a "m=" line:
2029                         ast_rtp_pt_clear(p->rtp);
2030                         codecs = m + len;
2031                         while(strlen(codecs)) {
2032                                 if (sscanf(codecs, "%d%n", &codec, &len) != 1) {
2033                                         ast_log(LOG_WARNING, "Error in codec string '%s'\n", codecs);
2034                                         return -1;
2035                                 }
2036                                 if (sipdebug)
2037                                         ast_verbose("Found audio format %s\n", ast_getformatname(codec));
2038                                 ast_rtp_set_m_type(p->rtp, codec);
2039                                 codecs += len;
2040                                 /* Skip over any whitespace */
2041                                 while(*codecs && (*codecs < 33)) codecs++;
2042                         }
2043                 }
2044                 if (p->vrtp && (sscanf(m, "video %d RTP/AVP %n", &x, &len) == 1)) {
2045                         vportno = x;
2046                         // Scan through the RTP payload types specified in a "m=" line:
2047                         ast_rtp_pt_clear(p->vrtp);
2048                         codecs = m + len;
2049                         while(strlen(codecs)) {
2050                                 if (sscanf(codecs, "%d%n", &codec, &len) != 1) {
2051                                         ast_log(LOG_WARNING, "Error in codec string '%s'\n", codecs);
2052                                         return -1;
2053                                 }
2054                                 if (sipdebug)
2055                                         ast_verbose("Found video format %s\n", ast_getformatname(codec));
2056                                 ast_rtp_set_m_type(p->vrtp, codec);
2057                                 codecs += len;
2058                                 /* Skip over any whitespace */
2059                                 while(*codecs && (*codecs < 33)) codecs++;
2060                         }
2061                 }
2062         }
2063         sin.sin_family = AF_INET;
2064         memcpy(&sin.sin_addr, hp->h_addr, sizeof(sin.sin_addr));
2065         /* Setup audio port number */
2066         sin.sin_port = htons(portno);
2067         if (p->rtp && sin.sin_port)
2068                 ast_rtp_set_peer(p->rtp, &sin);
2069         /* Setup video port number */
2070         sin.sin_port = htons(vportno);
2071         if (p->vrtp && sin.sin_port)
2072                 ast_rtp_set_peer(p->vrtp, &sin);
2073 #if 0
2074         printf("Peer RTP is at port %s:%d\n", inet_ntoa(sin.sin_addr), ntohs(sin.sin_port));
2075 #endif  
2076         // Next, scan through each "a=rtpmap:" line, noting each
2077         // specified RTP payload type (with corresponding MIME subtype):
2078         sdpLineNum_iterator_init(&iterator);
2079         while ((a = get_sdp_iterate(&iterator, req, "a"))[0] != '\0') {
2080       char* mimeSubtype = ast_strdupa(a); // ensures we have enough space
2081           if (!strcasecmp(a, "sendonly")) {
2082                 sendonly=1;
2083                 continue;
2084           }
2085           if (!strcasecmp(a, "sendrecv")) {
2086                 sendonly=0;
2087           }
2088           if (sscanf(a, "rtpmap: %u %[^/]/", &codec, mimeSubtype) != 2) continue;
2089           if (sipdebug)
2090                 ast_verbose("Found description format %s\n", mimeSubtype);
2091           // Note: should really look at the 'freq' and '#chans' params too
2092           ast_rtp_set_rtpmap_type(p->rtp, codec, "audio", mimeSubtype);
2093           if (p->vrtp)
2094                   ast_rtp_set_rtpmap_type(p->vrtp, codec, "video", mimeSubtype);
2095         }
2096
2097         // Now gather all of the codecs that were asked for:
2098         ast_rtp_get_current_formats(p->rtp,
2099                                 &peercapability, &peernoncodeccapability);
2100         if (p->vrtp)
2101                 ast_rtp_get_current_formats(p->vrtp,
2102                                 &vpeercapability, &vpeernoncodeccapability);
2103         p->jointcapability = p->capability & (peercapability | vpeercapability);
2104         p->noncodeccapability = noncodeccapability & (peernoncodeccapability | vpeernoncodeccapability);
2105         
2106         if (sipdebug) {
2107                 ast_verbose("Capabilities: us - %d, them - %d/%d, combined - %d\n",
2108                             p->capability, peercapability, vpeercapability, p->jointcapability);
2109                 ast_verbose("Non-codec capabilities: us - %d, them - %d, combined - %d\n",
2110                             noncodeccapability, peernoncodeccapability,
2111                             p->noncodeccapability);
2112         }
2113         if (!p->jointcapability) {
2114                 ast_log(LOG_WARNING, "No compatible codecs!\n");
2115                 return -1;
2116         }
2117         if (p->owner) {
2118                 if (!(p->owner->nativeformats & p->jointcapability)) {
2119                         ast_log(LOG_DEBUG, "Oooh, we need to change our formats since our peer supports only %d and not %d\n", p->jointcapability, p->owner->nativeformats);
2120                         p->owner->nativeformats = sip_codec_choose(p->jointcapability);
2121                         ast_set_read_format(p->owner, p->owner->readformat);
2122                         ast_set_write_format(p->owner, p->owner->writeformat);
2123                 }
2124                 if (p->owner->bridge) {
2125                         /* Turn on/off music on hold if we are holding/unholding */
2126                         if (sin.sin_addr.s_addr && !sendonly) {
2127                                 ast_moh_stop(p->owner->bridge);
2128                         } else {
2129                                 ast_moh_start(p->owner->bridge, NULL);
2130                         }
2131                 }
2132         }
2133         return 0;
2134         
2135 }
2136
2137 static int add_header(struct sip_request *req, char *var, char *value)
2138 {
2139         if (req->len >= sizeof(req->data) - 4) {
2140                 ast_log(LOG_WARNING, "Out of space, can't add anymore (%s:%s)\n", var, value);
2141                 return -1;
2142         }
2143         if (req->lines) {
2144                 ast_log(LOG_WARNING, "Can't add more headers when lines have been added\n");
2145                 return -1;
2146         }
2147         req->header[req->headers] = req->data + req->len;
2148         snprintf(req->header[req->headers], sizeof(req->data) - req->len - 4, "%s: %s\r\n", var, value);
2149         req->len += strlen(req->header[req->headers]);
2150         if (req->headers < SIP_MAX_HEADERS)
2151                 req->headers++;
2152         else {
2153                 ast_log(LOG_WARNING, "Out of header space\n");
2154                 return -1;
2155         }
2156         return 0;       
2157 }
2158
2159 static int add_blank_header(struct sip_request *req)
2160 {
2161         if (req->len >= sizeof(req->data) - 4) {
2162                 ast_log(LOG_WARNING, "Out of space, can't add anymore\n");
2163                 return -1;
2164         }
2165         if (req->lines) {
2166                 ast_log(LOG_WARNING, "Can't add more headers when lines have been added\n");
2167                 return -1;
2168         }
2169         req->header[req->headers] = req->data + req->len;
2170         snprintf(req->header[req->headers], sizeof(req->data) - req->len, "\r\n");
2171         req->len += strlen(req->header[req->headers]);
2172         if (req->headers < SIP_MAX_HEADERS)
2173                 req->headers++;
2174         else {
2175                 ast_log(LOG_WARNING, "Out of header space\n");
2176                 return -1;
2177         }
2178         return 0;       
2179 }
2180
2181 static int add_line(struct sip_request *req, char *line)
2182 {
2183         if (req->len >= sizeof(req->data) - 4) {
2184                 ast_log(LOG_WARNING, "Out of space, can't add anymore\n");
2185                 return -1;
2186         }
2187         if (!req->lines) {
2188                 /* Add extra empty return */
2189                 snprintf(req->data + req->len, sizeof(req->data) - req->len, "\r\n");
2190                 req->len += strlen(req->data + req->len);
2191         }
2192         req->line[req->lines] = req->data + req->len;
2193         snprintf(req->line[req->lines], sizeof(req->data) - req->len, "%s", line);
2194         req->len += strlen(req->line[req->lines]);
2195         if (req->lines < SIP_MAX_LINES)
2196                 req->lines++;
2197         else {
2198                 ast_log(LOG_WARNING, "Out of line space\n");
2199                 return -1;
2200         }
2201         return 0;       
2202 }
2203
2204 static int copy_header(struct sip_request *req, struct sip_request *orig, char *field)
2205 {
2206         char *tmp;
2207         tmp = get_header(orig, field);
2208         if (strlen(tmp)) {
2209                 /* Add what we're responding to */
2210                 return add_header(req, field, tmp);
2211         }
2212         ast_log(LOG_NOTICE, "No field '%s' present to copy\n", field);
2213         return -1;
2214 }
2215
2216 static int copy_all_header(struct sip_request *req, struct sip_request *orig, char *field)
2217 {
2218         char *tmp;
2219         int start = 0;
2220         int copied = 0;
2221         for (;;) {
2222                 tmp = __get_header(orig, field, &start);
2223                 if (strlen(tmp)) {
2224                         /* Add what we're responding to */
2225                         add_header(req, field, tmp);
2226                         copied++;
2227                 } else
2228                         break;
2229         }
2230         return copied ? 0 : -1;
2231 }
2232
2233 static int copy_via_headers(struct sip_pvt *p, struct sip_request *req, struct sip_request *orig, char *field)
2234 {
2235         char *tmp;
2236         int start = 0;
2237         int copied = 0;
2238         char new[256];
2239         for (;;) {
2240                 tmp = __get_header(orig, field, &start);
2241                 if (strlen(tmp)) {
2242                         if (!copied && p->nat) {
2243 #ifdef THE_SIP_AUTHORS_CAN_SUCK_MY_GONADS
2244                                 /* SLD: FIXME: Nice try, but the received= should not have a port */
2245                                 /* SLD: FIXME: See RFC2543 BNF in Section 6.40.5 */
2246                                 /* MAS: Yup, RFC says you can't do it.  No way to indicate PAT...
2247                                    good job fellas. */
2248                                 if (ntohs(p->recv.sin_port) != DEFAULT_SIP_PORT)
2249                                         snprintf(new, sizeof(new), "%s;received=%s:%d", tmp, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
2250                                 else
2251 #endif                          
2252                                         snprintf(new, sizeof(new), "%s;received=%s", tmp, inet_ntoa(p->recv.sin_addr));
2253                                 add_header(req, field, new);
2254                         } else {
2255                                 /* Add what we're responding to */
2256                                 add_header(req, field, tmp);
2257                         }
2258                         copied++;
2259                 } else
2260                         break;
2261         }
2262         if (!copied) {
2263                 ast_log(LOG_NOTICE, "No field '%s' present to copy\n", field);
2264                 return -1;
2265         }
2266         return 0;
2267 }
2268
2269 /* Add Route: header into request per learned route */
2270 static void add_route(struct sip_request *req, struct sip_route *route)
2271 {
2272         char r[256], *p;
2273         int n, rem = 255; /* sizeof(r)-1: Room for terminating 0 */
2274
2275         if (!route) return;
2276
2277         p = r;
2278         while (route) {
2279                 n = strlen(route->hop);
2280                 if ((n+3)>rem) break;
2281                 if (p != r) {
2282                         *p++ = ',';
2283                         --rem;
2284                 }
2285                 *p++ = '<';
2286                 strcpy(p, route->hop);  p += n;
2287                 *p++ = '>';
2288                 rem -= (n+2);
2289                 route = route->next;
2290         }
2291         *p = '\0';
2292         add_header(req, "Route", r);
2293 }
2294
2295 static void set_destination(struct sip_pvt *p, char *uri)
2296 {
2297         char *h, *maddr, hostname[256];
2298         int port, hn;
2299         struct hostent *hp;
2300
2301         /* Parse uri to h (host) and port - uri is already just the part inside the <> */
2302         /* general form we are expecting is sip[s]:username[:password]@host[:port][;...] */
2303
2304         if (sipdebug)
2305                 ast_verbose("set_destination: Parsing <%s> for address/port to send to\n", uri);
2306
2307         /* Find and parse hostname */
2308         h = strchr(uri, '@');
2309         if (h)
2310                 ++h;
2311         else {
2312                 h = uri;
2313                 if (strncmp(h, "sip:", 4) == 0)
2314                         h += 4;
2315                 else if (strncmp(h, "sips:", 5) == 0)
2316                         h += 5;
2317         }
2318         hn = strcspn(h, ":;>");
2319         if (hn>255) hn=255;
2320         strncpy(hostname, h, hn);  hostname[hn] = '\0';
2321         h+=hn;
2322
2323         /* Is "port" present? if not default to 5060 */
2324         if (*h == ':') {
2325                 /* Parse port */
2326                 ++h;
2327                 port = strtol(h, &h, 10);
2328         }
2329         else
2330                 port = 5060;
2331
2332         /* Got the hostname:port - but maybe there's a "maddr=" to override address? */
2333         maddr = strstr(h, "maddr=");
2334         if (maddr) {
2335                 maddr += 6;
2336                 hn = strspn(maddr, "0123456789.");
2337                 if (hn>255) hn=255;
2338                 strncpy(hostname, maddr, hn);  hostname[hn] = '\0';
2339         }
2340         
2341         hp = gethostbyname(hostname);
2342         if (hp == NULL)  {
2343                 ast_log(LOG_WARNING, "Can't find address for host '%s'\n", hostname);
2344                 return;
2345         }
2346         p->sa.sin_family = AF_INET;
2347         memcpy(&p->sa.sin_addr, hp->h_addr, sizeof(p->sa.sin_addr));
2348         p->sa.sin_port = htons(port);
2349         if (sipdebug)
2350                 ast_verbose("set_destination: set destination to %s, port %d\n", inet_ntoa(p->sa.sin_addr), port);
2351 }
2352
2353 static int init_resp(struct sip_request *req, char *resp, struct sip_request *orig)
2354 {
2355         /* Initialize a response */
2356         if (req->headers || req->len) {
2357                 ast_log(LOG_WARNING, "Request already initialized?!?\n");
2358                 return -1;
2359         }
2360         req->header[req->headers] = req->data + req->len;
2361         snprintf(req->header[req->headers], sizeof(req->data) - req->len, "SIP/2.0 %s\r\n", resp);
2362         req->len += strlen(req->header[req->headers]);
2363         if (req->headers < SIP_MAX_HEADERS)
2364                 req->headers++;
2365         else
2366                 ast_log(LOG_WARNING, "Out of header space\n");
2367         return 0;
2368 }
2369
2370 static int init_req(struct sip_request *req, char *resp, char *recip)
2371 {
2372         /* Initialize a response */
2373         if (req->headers || req->len) {
2374                 ast_log(LOG_WARNING, "Request already initialized?!?\n");
2375                 return -1;
2376         }
2377         req->header[req->headers] = req->data + req->len;
2378         snprintf(req->header[req->headers], sizeof(req->data) - req->len, "%s %s SIP/2.0\r\n", resp, recip);
2379         req->len += strlen(req->header[req->headers]);
2380         if (req->headers < SIP_MAX_HEADERS)
2381                 req->headers++;
2382         else
2383                 ast_log(LOG_WARNING, "Out of header space\n");
2384         return 0;
2385 }
2386
2387 static int respprep(struct sip_request *resp, struct sip_pvt *p, char *msg, struct sip_request *req)
2388 {
2389         char newto[256] = "", *ot;
2390         memset(resp, 0, sizeof(*resp));
2391         init_resp(resp, msg, req);
2392         copy_via_headers(p, resp, req, "Via");
2393         if (msg[0] == '2') copy_all_header(resp, req, "Record-Route");
2394         copy_header(resp, req, "From");
2395         ot = get_header(req, "To");
2396         if (!strstr(ot, "tag=")) {
2397                 /* Add the proper tag if we don't have it already.  If they have specified
2398                    their tag, use it.  Otherwise, use our own tag */
2399                 if (strlen(p->theirtag) && p->outgoing)
2400                         snprintf(newto, sizeof(newto), "%s;tag=%s", ot, p->theirtag);
2401                 else if (p->tag && !p->outgoing)
2402                         snprintf(newto, sizeof(newto), "%s;tag=as%08x", ot, p->tag);
2403                 else
2404                         strncpy(newto, ot, sizeof(newto) - 1);
2405                 ot = newto;
2406         }
2407         add_header(resp, "To", ot);
2408         copy_header(resp, req, "Call-ID");
2409         copy_header(resp, req, "CSeq");
2410         add_header(resp, "User-Agent", "Asterisk PBX");
2411         add_header(resp, "Allow", ALLOWED_METHODS);
2412         if (p->expiry) {
2413                 /* For registration responses, we also need expiry and
2414                    contact info */
2415                 char contact[256];
2416                 char tmp[256];
2417                 snprintf(contact, sizeof(contact), "%s;expires=%d", p->our_contact, p->expiry);
2418                 snprintf(tmp, sizeof(tmp), "%d", p->expiry);
2419                 add_header(resp, "Expires", tmp);
2420                 add_header(resp, "Contact", contact);
2421         } else {
2422                 add_header(resp, "Contact", p->our_contact);
2423         }
2424         return 0;
2425 }
2426
2427 static int reqprep(struct sip_request *req, struct sip_pvt *p, char *msg, int seqno)
2428 {
2429         struct sip_request *orig = &p->initreq;
2430         char stripped[80] ="";
2431         char tmp[80];
2432         char newto[256];
2433         char *c, *n;
2434         char *ot, *of;
2435
2436         memset(req, 0, sizeof(struct sip_request));
2437         
2438         snprintf(p->lastmsg, sizeof(p->lastmsg), "Tx: %s", msg);
2439         
2440         if (!seqno) {
2441                 p->ocseq++;
2442                 seqno = p->ocseq;
2443         }
2444
2445         if (strlen(p->uri)) {
2446                 c = p->uri;
2447         } else {
2448                 if (p->outgoing)
2449                         strncpy(stripped, get_header(orig, "To"), sizeof(stripped) - 1);
2450                 else
2451                         strncpy(stripped, get_header(orig, "From"), sizeof(stripped) - 1);
2452                 
2453                 c = strchr(stripped, '<');
2454                 if (c) 
2455                         c++;
2456                 else
2457                         c = stripped;
2458                 n = strchr(c, '>');
2459                 if (n)
2460                         *n = '\0';
2461                 n = strchr(c, ';');
2462                 if (n)
2463                         *n = '\0';
2464         }       
2465         init_req(req, msg, c);
2466
2467         snprintf(tmp, sizeof(tmp), "%d %s", seqno, msg);
2468
2469         add_header(req, "Via", p->via);
2470         if (p->route) {
2471                 set_destination(p, p->route->hop);
2472                 add_route(req, p->route->next);
2473         }
2474
2475         ot = get_header(orig, "To");
2476         of = get_header(orig, "From");
2477
2478         /* Add tag *unless* this is a CANCEL, in which case we need to send it exactly
2479            as our original request, including tag (or presumably lack thereof) */
2480         if (!strstr(ot, "tag=") && strcasecmp(msg, "CANCEL")) {
2481                 /* Add the proper tag if we don't have it already.  If they have specified
2482                    their tag, use it.  Otherwise, use our own tag */
2483                 if (p->outgoing && strlen(p->theirtag))
2484                         snprintf(newto, sizeof(newto), "%s;tag=%s", ot, p->theirtag);
2485                 else if (!p->outgoing)
2486                         snprintf(newto, sizeof(newto), "%s;tag=as%08x", ot, p->tag);
2487                 else
2488                         snprintf(newto, sizeof(newto), "%s", ot);
2489                 ot = newto;
2490         }
2491
2492         if (p->outgoing) {
2493                 add_header(req, "From", of);
2494                 add_header(req, "To", ot);
2495         } else {
2496                 add_header(req, "From", ot);
2497                 add_header(req, "To", of);
2498         }
2499         add_header(req, "Contact", p->our_contact);
2500         copy_header(req, orig, "Call-ID");
2501         add_header(req, "CSeq", tmp);
2502
2503         add_header(req, "User-Agent", "Asterisk PBX");
2504         return 0;
2505 }
2506
2507 static int __transmit_response(struct sip_pvt *p, char *msg, struct sip_request *req, int reliable)
2508 {
2509         struct sip_request resp;
2510         int seqno = 0;
2511         if (reliable && (sscanf(get_header(req, "CSeq"), "%i ", &seqno) != 1)) {
2512                 ast_log(LOG_WARNING, "Unable to determine sequence number from '%s'\n", get_header(req, "CSeq"));
2513                 return -1;
2514         }
2515         respprep(&resp, p, msg, req);
2516         add_header(&resp, "Content-Length", "0");
2517         add_blank_header(&resp);
2518         return send_response(p, &resp, reliable, seqno);
2519 }
2520
2521 static int transmit_response(struct sip_pvt *p, char *msg, struct sip_request *req) 
2522 {
2523         return __transmit_response(p, msg, req, 0);
2524 }
2525 static int transmit_response_reliable(struct sip_pvt *p, char *msg, struct sip_request *req)
2526 {
2527         return __transmit_response(p, msg, req, 1);
2528 }
2529
2530 static void append_date(struct sip_request *req)
2531 {
2532         char tmpdat[256];
2533         struct tm tm;
2534         time_t t;
2535         time(&t);
2536         gmtime_r(&t, &tm);
2537         strftime(tmpdat, sizeof(tmpdat), "%a, %d %b %Y %T GMT", &tm);
2538         add_header(req, "Date", tmpdat);
2539 }
2540
2541 static int transmit_response_with_date(struct sip_pvt *p, char *msg, struct sip_request *req)
2542 {
2543         struct sip_request resp;
2544         respprep(&resp, p, msg, req);
2545         append_date(&resp);
2546         add_header(&resp, "Content-Length", "0");
2547         add_blank_header(&resp);
2548         return send_response(p, &resp, 0, 0);
2549 }
2550
2551 static int transmit_response_with_allow(struct sip_pvt *p, char *msg, struct sip_request *req)
2552 {
2553         struct sip_request resp;
2554         respprep(&resp, p, msg, req);
2555         add_header(&resp, "Accept", "application/sdp");
2556         add_header(&resp, "Content-Length", "0");
2557         add_blank_header(&resp);
2558         return send_response(p, &resp, 0, 0);
2559 }
2560
2561 static int transmit_response_with_auth(struct sip_pvt *p, char *msg, struct sip_request *req, char *randdata, int reliable)
2562 {
2563         struct sip_request resp;
2564         char tmp[256];
2565         int seqno = 0;
2566         if (reliable && (sscanf(get_header(req, "CSeq"), "%i ", &seqno) != 1)) {
2567                 ast_log(LOG_WARNING, "Unable to determine sequence number from '%s'\n", get_header(req, "CSeq"));
2568                 return -1;
2569         }
2570         snprintf(tmp, sizeof(tmp), "Digest realm=\"asterisk\", nonce=\"%s\"", randdata);
2571         respprep(&resp, p, msg, req);
2572         add_header(&resp, "Proxy-Authenticate", tmp);
2573         add_header(&resp, "Content-Length", "0");
2574         add_blank_header(&resp);
2575         return send_response(p, &resp, reliable, seqno);
2576 }
2577
2578 static int add_text(struct sip_request *req, char *text)
2579 {
2580         /* XXX Convert \n's to \r\n's XXX */
2581         int len = strlen(text);
2582         char clen[256];
2583         snprintf(clen, sizeof(clen), "%d", len);
2584         add_header(req, "Content-Type", "text/plain");
2585         add_header(req, "Content-Length", clen);
2586         add_line(req, text);
2587         return 0;
2588 }
2589
2590 static int add_digit(struct sip_request *req, char digit)
2591 {
2592         char tmp[256];
2593         int len;
2594         char clen[256];
2595         snprintf(tmp, sizeof(tmp), "Signal=%c\r\nDuration=250\r\n", digit);
2596         len = strlen(tmp);
2597         snprintf(clen, sizeof(clen), "%d", len);
2598         add_header(req, "Content-Type", "application/dtmf-relay");
2599         add_header(req, "Content-Length", clen);
2600         add_line(req, tmp);
2601         return 0;
2602 }
2603
2604 static int add_sdp(struct sip_request *resp, struct sip_pvt *p, struct ast_rtp *rtp, struct ast_rtp *vrtp)
2605 {
2606         int len;
2607         int codec;
2608         int alreadysent = 0;
2609         char costr[80];
2610         struct sockaddr_in sin;
2611         struct sockaddr_in vsin;
2612         struct sip_codec_pref *cur;
2613         char v[256];
2614         char s[256];
2615         char o[256];
2616         char c[256];
2617         char t[256];
2618         char m[256];
2619         char m2[256];
2620         char a[1024] = "";
2621         char a2[1024] = "";
2622         int x;
2623         struct sockaddr_in dest;
2624         struct sockaddr_in vdest;
2625         /* XXX We break with the "recommendation" and send our IP, in order that our
2626                peer doesn't have to gethostbyname() us XXX */
2627         len = 0;
2628         if (!p->rtp) {
2629                 ast_log(LOG_WARNING, "No way to add SDP without an RTP structure\n");
2630                 return -1;
2631         }
2632         if (!p->sessionid) {
2633                 p->sessionid = getpid();
2634                 p->sessionversion = p->sessionid;
2635         } else
2636                 p->sessionversion++;
2637         ast_rtp_get_us(p->rtp, &sin);
2638         if (p->vrtp)
2639                 ast_rtp_get_us(p->vrtp, &vsin);
2640
2641         if (p->redirip.sin_addr.s_addr) {
2642                 dest.sin_port = p->redirip.sin_port;
2643                 dest.sin_addr = p->redirip.sin_addr;
2644         } else if (rtp) {
2645                 ast_rtp_get_peer(rtp, &dest);
2646         } else {
2647                 dest.sin_addr = p->ourip;
2648                 dest.sin_port = sin.sin_port;
2649         }
2650
2651         /* Determine video destination */
2652         if (p->vrtp) {
2653                 if (p->vredirip.sin_addr.s_addr) {
2654                         vdest.sin_port = p->vredirip.sin_port;
2655                         vdest.sin_addr = p->vredirip.sin_addr;
2656                 } else if (vrtp) {
2657                         ast_rtp_get_peer(vrtp, &vdest);
2658                 } else {
2659                         vdest.sin_addr = p->ourip;
2660                         vdest.sin_port = vsin.sin_port;
2661                 }
2662         }
2663         if (sipdebug)
2664                 ast_verbose("We're at %s port %d\n", inet_ntoa(p->ourip), ntohs(sin.sin_port)); 
2665         if (sipdebug && p->vrtp)
2666                 ast_verbose("Video is at %s port %d\n", inet_ntoa(p->ourip), ntohs(vsin.sin_port));     
2667         snprintf(v, sizeof(v), "v=0\r\n");
2668         snprintf(o, sizeof(o), "o=root %d %d IN IP4 %s\r\n", p->sessionid, p->sessionversion, inet_ntoa(dest.sin_addr));
2669         snprintf(s, sizeof(s), "s=session\r\n");
2670         snprintf(c, sizeof(c), "c=IN IP4 %s\r\n", inet_ntoa(dest.sin_addr));
2671         snprintf(t, sizeof(t), "t=0 0\r\n");
2672         snprintf(m, sizeof(m), "m=audio %d RTP/AVP", ntohs(dest.sin_port));
2673         snprintf(m2, sizeof(m2), "m=video %d RTP/AVP", ntohs(vdest.sin_port));
2674         /* Start by sending our preferred codecs */
2675         cur = prefs;
2676         while(cur) {
2677                 if (p->jointcapability & cur->codec) {
2678                         if (sipdebug)
2679                                 ast_verbose("Answering with preferred capability %d\n", cur->codec);
2680                         codec = ast_rtp_lookup_code(p->rtp, 1, cur->codec);
2681                         if (codec > -1) {
2682                                 snprintf(costr, sizeof(costr), " %d", codec);
2683                                 if (cur->codec < AST_FORMAT_MAX_AUDIO) {
2684                                         strncat(m, costr, sizeof(m) - strlen(m));
2685                                         snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/8000\r\n", codec, ast_rtp_lookup_mime_subtype(1, cur->codec));
2686                                         strncat(a, costr, sizeof(a));
2687                                 } else {
2688                                         strncat(m2, costr, sizeof(m2) - strlen(m2));
2689                                         snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/90000\r\n", codec, ast_rtp_lookup_mime_subtype(1, cur->codec));
2690                                         strncat(a2, costr, sizeof(a2));
2691                                 }
2692                         }
2693                 }
2694                 alreadysent |= cur->codec;
2695                 cur = cur->next;
2696         }
2697         /* Now send any other common codecs, and non-codec formats: */
2698         for (x = 1; x <= (videosupport ? AST_FORMAT_MAX_VIDEO : AST_FORMAT_MAX_AUDIO); x <<= 1) {
2699                 if ((p->jointcapability & x) && !(alreadysent & x)) {
2700                         if (sipdebug)
2701                                 ast_verbose("Answering with capability %d\n", x);       
2702                         codec = ast_rtp_lookup_code(p->rtp, 1, x);
2703                         if (codec > -1) {
2704                                 snprintf(costr, sizeof(costr), " %d", codec);
2705                                 if (x < AST_FORMAT_MAX_AUDIO) {
2706                                         strncat(m, costr, sizeof(m) - strlen(m));
2707                                         snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/8000\r\n", codec, ast_rtp_lookup_mime_subtype(1, x));
2708                                         strncat(a, costr, sizeof(a) - strlen(a));
2709                                 } else {
2710                                         strncat(m2, costr, sizeof(m2) - strlen(m2));
2711                                         snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/90000\r\n", codec, ast_rtp_lookup_mime_subtype(1, x));
2712                                         strncat(a2, costr, sizeof(a2) - strlen(a2));
2713                                 }
2714                         }
2715                 }
2716         }
2717         for (x = 1; x <= AST_RTP_MAX; x <<= 1) {
2718                 if (p->noncodeccapability & x) {
2719                         if (sipdebug)
2720                                 ast_verbose("Answering with non-codec capability %d\n", x);
2721                         codec = ast_rtp_lookup_code(p->rtp, 0, x);
2722                         if (codec > -1) {
2723                                 snprintf(costr, sizeof(costr), " %d", codec);
2724                                 strncat(m, costr, sizeof(m) - strlen(m));
2725                                 snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/8000\r\n", codec, ast_rtp_lookup_mime_subtype(0, x));
2726                                 strncat(a, costr, sizeof(a) - strlen(a));
2727                                 if (x == AST_RTP_DTMF) {
2728                                   /* Indicate we support DTMF...  Not sure about 16, but MSN supports it so dang it, we will too... */
2729                                   snprintf(costr, sizeof costr, "a=fmtp:%d 0-16\r\n",
2730                                            codec);
2731                                   strncat(a, costr, sizeof(a) - strlen(a));
2732                                 }
2733                         }
2734                 }
2735         }
2736         strncat(a, "a=silenceSupp:off - - - -\r\n", sizeof(a) - strlen(a));
2737         if (strlen(m) < sizeof(m) - 2)
2738                 strcat(m, "\r\n");
2739         if (strlen(m2) < sizeof(m2) - 2)
2740                 strcat(m2, "\r\n");
2741         if ((sizeof(m) <= strlen(m) - 2) || (sizeof(m2) <= strlen(m2) - 2) || (sizeof(a) == strlen(a)) || (sizeof(a2) == strlen(a2)))
2742                 ast_log(LOG_WARNING, "SIP SDP may be truncated due to undersized buffer!!\n");
2743         len = strlen(v) + strlen(s) + strlen(o) + strlen(c) + strlen(t) + strlen(m) + strlen(a);
2744         if (p->vrtp)
2745                 len += strlen(m2) + strlen(a2);
2746         snprintf(costr, sizeof(costr), "%d", len);
2747         add_header(resp, "Content-Type", "application/sdp");
2748         add_header(resp, "Content-Length", costr);
2749         add_line(resp, v);
2750         add_line(resp, o);
2751         add_line(resp, s);
2752         add_line(resp, c);
2753         add_line(resp, t);
2754         add_line(resp, m);
2755         add_line(resp, a);
2756         if (p->vrtp) {
2757                 add_line(resp, m2);
2758                 add_line(resp, a2);
2759         }
2760         return 0;
2761 }
2762
2763 static void copy_request(struct sip_request *dst,struct sip_request *src)
2764 {
2765         long offset;
2766         int x;
2767         offset = ((void *)dst) - ((void *)src);
2768         /* First copy stuff */
2769         memcpy(dst, src, sizeof(*dst));
2770         /* Now fix pointer arithmetic */
2771         for (x=0;x<src->headers;x++)
2772                 dst->header[x] += offset;
2773         for (x=0;x<src->lines;x++)
2774                 dst->line[x] += offset;
2775 }
2776
2777 static int transmit_response_with_sdp(struct sip_pvt *p, char *msg, struct sip_request *req, int retrans)
2778 {
2779         struct sip_request resp;
2780         int seqno;
2781         if (sscanf(get_header(req, "CSeq"), "%i ", &seqno) != 1) {
2782                 ast_log(LOG_WARNING, "Unable to get seqno from '%s'\n", get_header(req, "CSeq"));
2783                 return -1;
2784         }
2785         respprep(&resp, p, msg, req);
2786         add_sdp(&resp, p, NULL, NULL);
2787         return send_response(p, &resp, retrans, seqno);
2788 }
2789
2790 static int determine_firstline_parts( struct sip_request *req ) {
2791
2792   char *e, *cmd;
2793   int len;
2794   
2795   cmd= req->header[0];
2796   while(*cmd && (*cmd < 33)) {
2797     cmd++;
2798   }
2799   if (!*cmd) {
2800     return -1;
2801   }
2802   e= cmd;
2803   while(*e && (*e > 32)) {
2804     e++;
2805   }
2806   /* Get the command */
2807   if (*e) {
2808     *e = '\0';
2809     e++;
2810   }
2811   req->rlPart1= cmd;
2812   while( *e && ( *e < 33 ) ) {
2813     e++; 
2814   }
2815   if( !*e ) {
2816     return -1;
2817   }
2818     
2819   if ( !strcasecmp(cmd, "SIP/2.0") ) {
2820     /* We have a response */
2821     req->rlPart2= e;
2822     len= strlen( req->rlPart2 );
2823     if( len < 2 ) { return -1; }
2824     e+= len - 1;
2825     while( *e && *e<33 ) {
2826       e--; 
2827     }
2828     *(++e)= '\0';
2829   } else {
2830     /* We have a request */
2831     if( *e == '<' ) { 
2832       e++;
2833       if( !*e ) { return -1; }  
2834     }
2835     req->rlPart2= e;
2836     if( ( e= strrchr( req->rlPart2, 'S' ) ) == NULL ) {
2837       return -1;
2838     }
2839     while( isspace( *(--e) ) ) {}
2840     if( *e == '>' ) {
2841       *e= '\0';
2842     } else {
2843       *(++e)= '\0';
2844     }
2845   }
2846   return 1;
2847 }
2848
2849 static int transmit_reinvite_with_sdp(struct sip_pvt *p, struct ast_rtp *rtp, struct ast_rtp *vrtp)
2850 {
2851         struct sip_request req;
2852         if (p->canreinvite == REINVITE_UPDATE)
2853                 reqprep(&req, p, "UPDATE", 0);
2854         else {
2855                 p->branch++;
2856                 snprintf(p->via, sizeof(p->via), "SIP/2.0/UDP %s:%d;branch=z9hG4bK%08x", inet_ntoa(p->ourip), ourport, p->branch);
2857                 reqprep(&req, p, "INVITE", 0);
2858         }
2859         add_header(&req, "Allow", ALLOWED_METHODS);
2860         add_sdp(&req, p, rtp, vrtp);
2861         /* Use this as the basis */
2862         copy_request(&p->initreq, &req);
2863         parse(&p->initreq);
2864         determine_firstline_parts(&p->initreq);
2865         p->lastinvite = p->ocseq;
2866         p->outgoing = 1;
2867         return send_request(p, &req, 1, p->ocseq);
2868 }
2869
2870 static void extract_uri(struct sip_pvt *p, struct sip_request *req)
2871 {
2872         char stripped[256]="";
2873         char *c, *n;
2874         strncpy(stripped, get_header(req, "Contact"), sizeof(stripped) - 1);
2875         c = strchr(stripped, '<');
2876         if (c) 
2877                 c++;
2878         else
2879                 c = stripped;
2880         n = strchr(c, '>');
2881         if (n)
2882                 *n = '\0';
2883         n = strchr(c, ';');
2884         if (n)
2885                 *n = '\0';
2886         if (c && strlen(c))
2887                 strncpy(p->uri, c, sizeof(p->uri) - 1);
2888 }
2889
2890 static void build_contact(struct sip_pvt *p)
2891 {
2892         /* Construct Contact: header */
2893         if (ourport != 5060)
2894                 snprintf(p->our_contact, sizeof(p->our_contact), "<sip:%s@%s:%d>", p->exten, inet_ntoa(p->ourip), ourport);
2895         else
2896                 snprintf(p->our_contact, sizeof(p->our_contact), "<sip:%s@%s>", p->exten, inet_ntoa(p->ourip));
2897 }
2898
2899 static void initreqprep(struct sip_request *req, struct sip_pvt *p, char *cmd, char *vxml_url)
2900 {
2901         char invite[256];
2902         char from[256];
2903         char to[256];
2904         char tmp[80];
2905         char cid[256];
2906         char *l = callerid, *n=NULL;
2907
2908         snprintf(p->lastmsg, sizeof(p->lastmsg), "Init: %s", cmd);
2909
2910         if (p->owner && p->owner->callerid) {
2911                 strcpy(cid, p->owner->callerid);
2912                 ast_callerid_parse(cid, &n, &l);
2913                 if (l) 
2914                         ast_shrink_phone_number(l);
2915                 if (!l || !ast_isphonenumber(l))
2916                                 l = callerid;
2917         }
2918         /* if user want's his callerid restricted */
2919         if (p->restrictcid) {
2920                 l = CALLERID_UNKNOWN;
2921                 n = l;
2922         }
2923         if (!n || !strlen(n))
2924                 n = l;
2925         /* Allow user to be overridden */
2926         if (strlen(p->fromuser))
2927                 l = p->fromuser;
2928
2929         if ((ourport != 5060) && !strlen(p->fromdomain))
2930                 snprintf(from, sizeof(from), "\"%s\" <sip:%s@%s:%d>;tag=as%08x", n, l, strlen(p->fromdomain) ? p->fromdomain : inet_ntoa(p->ourip), ourport, p->tag);
2931         else
2932                 snprintf(from, sizeof(from), "\"%s\" <sip:%s@%s>;tag=as%08x", n, l, strlen(p->fromdomain) ? p->fromdomain : inet_ntoa(p->ourip), p->tag);
2933
2934         if (strlen(p->username)) {
2935                 if (ntohs(p->sa.sin_port) != DEFAULT_SIP_PORT) {
2936                         snprintf(invite, sizeof(invite), "sip:%s@%s:%d",p->username, p->tohost, ntohs(p->sa.sin_port));
2937                 } else {
2938                         snprintf(invite, sizeof(invite), "sip:%s@%s",p->username, p->tohost);
2939                 }
2940         } else if (ntohs(p->sa.sin_port) != DEFAULT_SIP_PORT) {
2941                 snprintf(invite, sizeof(invite), "sip:%s:%d", p->tohost, ntohs(p->sa.sin_port));
2942         } else {
2943                 snprintf(invite, sizeof(invite), "sip:%s", p->tohost);
2944         }
2945         strncpy(p->uri, invite, sizeof(p->uri) - 1);
2946         /* If there is a VXML URL append it to the SIP URL */
2947         if (vxml_url)
2948         {
2949                 snprintf(to, sizeof(to), "<%s>;%s", invite, vxml_url);
2950         }
2951         else
2952         {
2953                 snprintf(to, sizeof(to), "<%s>", invite );
2954         }
2955         memset(req, 0, sizeof(struct sip_request));
2956         init_req(req, cmd, invite);
2957         snprintf(tmp, sizeof(tmp), "%d %s", ++p->ocseq, cmd);
2958
2959         add_header(req, "Via", p->via);
2960         /* SLD: FIXME?: do Route: here too?  I think not cos this is the first request.
2961          * OTOH, then we won't have anything in p->route anyway */
2962         add_header(req, "From", from);
2963         strncpy(p->exten, l, sizeof(p->exten) - 1);
2964         build_contact(p);
2965         add_header(req, "To", to);
2966         add_header(req, "Contact", p->our_contact);
2967         add_header(req, "Call-ID", p->callid);
2968         add_header(req, "CSeq", tmp);
2969         add_header(req, "User-Agent", "Asterisk PBX");
2970 }
2971
2972 static int transmit_invite(struct sip_pvt *p, char *cmd, int sdp, char *auth, char *authheader, char *vxml_url, char *distinctive_ring, int init)
2973 {
2974         struct sip_request req;
2975         
2976         if (init)
2977                 initreqprep(&req, p, cmd, vxml_url);
2978         else
2979                 reqprep(&req, p, cmd, 0);
2980                 
2981         if (auth)
2982                 add_header(&req, authheader, auth);
2983         append_date(&req);
2984         if (!strcasecmp(cmd, "REFER")) {
2985                 if (strlen(p->refer_to))
2986                         add_header(&req, "Refer-To", p->refer_to);
2987                 if (strlen(p->referred_by))
2988                         add_header(&req, "Referred-By", p->referred_by);
2989         }
2990         
2991         if (distinctive_ring)
2992         {
2993                 add_header(&req, "Alert-info",distinctive_ring);
2994         }
2995         add_header(&req, "Allow", ALLOWED_METHODS);
2996         if (sdp) {
2997                 add_sdp(&req, p, NULL, NULL);
2998         } else {
2999                 add_header(&req, "Content-Length", "0");
3000                 add_blank_header(&req);
3001         }
3002
3003         if (!p->initreq.headers) {
3004                 /* Use this as the basis */
3005                 copy_request(&p->initreq, &req);
3006                 parse(&p->initreq);
3007                 determine_firstline_parts(&p->initreq);
3008         }
3009         p->lastinvite = p->ocseq;
3010         return send_request(p, &req, 1, p->ocseq);
3011 }
3012
3013 static int transmit_state_notify(struct sip_pvt *p, int state, int full)
3014 {
3015         char tmp[2000];
3016         char from[256], to[256];
3017         char *t, *c, *a;
3018         char *mfrom, *mto;
3019         struct sip_request req;
3020         char clen[20];
3021         
3022         strncpy(from, get_header(&p->initreq, "From"), sizeof(from)-1);
3023
3024         c = ditch_braces(from);
3025         if (strncmp(c, "sip:", 4)) {
3026                 ast_log(LOG_WARNING, "Huh?  Not a SIP header (%s)?\n", c);
3027                 return -1;
3028         }
3029         if ((a = strchr(c, ';'))) {
3030                 *a = '\0';
3031         }
3032         mfrom = c;
3033                 
3034         reqprep(&req, p, "NOTIFY", 0);
3035
3036         if (p->subscribed == 1) {
3037             strncpy(to, get_header(&p->initreq, "To"), sizeof(to)-1);
3038
3039             c = ditch_braces(to);
3040             if (strncmp(c, "sip:", 4)) {
3041                 ast_log(LOG_WARNING, "Huh?  Not a SIP header (%s)?\n", c);
3042                 return -1;
3043             }
3044             if ((a = strchr(c, ';'))) {
3045                 *a = '\0';
3046             }
3047             mto = c;
3048
3049             add_header(&req, "Content-Type", "application/xpidf+xml");
3050
3051             if ((state==AST_EXTENSION_UNAVAILABLE) || (state==AST_EXTENSION_BUSY))
3052                 state = 2;
3053             else if (state==AST_EXTENSION_INUSE)
3054                 state = 1;
3055             else
3056                 state = 0;
3057             
3058             t = tmp;            
3059             sprintf(t, "<?xml version=\"1.0\"?>\n");
3060             t = tmp + strlen(tmp);
3061             sprintf(t, "<!DOCTYPE presence PUBLIC \"-//IETF//DTD RFCxxxx XPIDF 1.0//EN\" \"xpidf.dtd\">\n");
3062             t = tmp + strlen(tmp);
3063             sprintf(t, "<presence>\n");
3064             t = tmp + strlen(tmp);
3065             sprintf(t, "<presentity uri=\"%s;method=SUBSCRIBE\" />\n", mfrom);
3066             t = tmp + strlen(tmp);
3067             sprintf(t, "<atom id=\"%s\">\n", p->exten);
3068             t = tmp + strlen(tmp);
3069             sprintf(t, "<address uri=\"%s;user=ip\" priority=\"0,800000\">\n", mto);
3070             t = tmp + strlen(tmp);
3071             sprintf(t, "<status status=\"%s\" />\n", !state ? "open" : (state==1) ? "inuse" : "closed");
3072             t = tmp + strlen(tmp);
3073             sprintf(t, "<msnsubstatus substatus=\"%s\" />\n", !state ? "online" : (state==1) ? "onthephone" : "offline");
3074             t = tmp + strlen(tmp);
3075             sprintf(t, "</address>\n</atom>\n</presence>\n");           
3076         } else {
3077             add_header(&req, "Event", "dialog");
3078             add_header(&req, "Content-Type", "application/dialog-info+xml");
3079         
3080             t = tmp;            
3081             sprintf(t, "<?xml version=\"1.0\"?>\n");
3082             t = tmp + strlen(tmp);
3083             sprintf(t, "<dialog-info xmlns=\"urn:ietf:params:xml:ns:dialog-info\" version=\"%d\" state=\"%s\" entity=\"%s\">\n", p->dialogver++, full ? "full":"partial", mfrom);
3084             t = tmp + strlen(tmp);
3085             sprintf(t, "<dialog id=\"%s\">\n", p->exten);
3086             t = tmp + strlen(tmp);
3087             sprintf(t, "<state>%s</state>\n", state ? "confirmed" : "terminated");
3088             t = tmp + strlen(tmp);
3089             sprintf(t, "</dialog>\n</dialog-info>\n");  
3090         }
3091         if (t > tmp + sizeof(tmp))
3092                 ast_log(LOG_WARNING, "Buffer overflow detected!!  (Please file a bug report)\n");
3093
3094         snprintf(clen, sizeof(clen), "%d", strlen(tmp));
3095         add_header(&req, "Content-Length", clen);
3096         add_line(&req, tmp);
3097
3098         return send_request(p, &req, 1, p->ocseq);
3099 }
3100
3101 static int transmit_notify(struct sip_pvt *p, int newmsgs, int oldmsgs)
3102 {
3103         struct sip_request req;
3104         char tmp[256];
3105         char tmp2[256];
3106         char clen[20];
3107         initreqprep(&req, p, "NOTIFY", NULL);
3108         add_header(&req, "Event", "message-summary");
3109         add_header(&req, "Content-Type", notifymime);
3110
3111         snprintf(tmp, sizeof(tmp), "Messages-Waiting: %s\n", newmsgs ? "yes" : "no");
3112         snprintf(tmp2, sizeof(tmp2), "Voicemail: %d/%d\n", newmsgs, oldmsgs);
3113         snprintf(clen, sizeof(clen), "%d", strlen(tmp) + strlen(tmp2));
3114         add_header(&req, "Content-Length", clen);
3115         add_line(&req, tmp);
3116         add_line(&req, tmp2);
3117
3118         if (!p->initreq.headers) {
3119                 /* Use this as the basis */
3120                 copy_request(&p->initreq, &req);
3121                 parse(&p->initreq);
3122                 determine_firstline_parts(&p->initreq);
3123         }
3124
3125         return send_request(p, &req, 1, p->ocseq);
3126 }
3127
3128 static int transmit_register(struct sip_registry *r, char *cmd, char *auth, char *authheader);
3129
3130 static int sip_reregister(void *data) 
3131 {
3132         /* if we are here, we know that we need to reregister. */
3133         struct sip_registry *r=(struct sip_registry *)data;
3134         ast_mutex_lock(&regl.lock);
3135         r->expire = -1;
3136         __sip_do_register(r);
3137         ast_mutex_unlock(&regl.lock);
3138         return 0;
3139 }
3140
3141
3142 static int __sip_do_register(struct sip_registry *r)
3143 {
3144         int res;
3145         res=transmit_register(r, "REGISTER", NULL, NULL);
3146         return res;
3147 }
3148
3149 static int sip_reg_timeout(void *data)
3150 {
3151         /* if we are here, our registration timed out, so we'll just do it over */
3152         struct sip_registry *r=data;
3153         struct sip_pvt *p;
3154         int res;
3155         ast_mutex_lock(&regl.lock);
3156         ast_log(LOG_NOTICE, "Registration for '%s@%s' timed out, trying again\n", r->username, inet_ntoa(r->addr.sin_addr)); 
3157         if (r->call) {
3158                 /* Unlink us, destroy old call.  Locking is not relevent here because all this happens
3159                    in the single SIP manager thread. */
3160                 p = r->call;
3161                 p->registry = NULL;
3162                 r->call = NULL;
3163                 p->needdestroy = 1;
3164         }
3165         r->regstate=REG_STATE_UNREGISTERED;
3166         r->timeout = -1;
3167         res=transmit_register(r, "REGISTER", NULL, NULL);
3168         ast_mutex_unlock(&regl.lock);
3169         return 0;
3170 }
3171
3172 static int transmit_register(struct sip_registry *r, char *cmd, char *auth, char *authheader)
3173 {
3174         struct sip_request req;
3175         char from[256];
3176         char to[256];
3177         char tmp[80];
3178         char via[80];
3179         char addr[80];
3180         struct sip_pvt *p;
3181         struct hostent *hp;
3182
3183         /* exit if we are already in process with this registrar ?*/
3184         if ( r == NULL || ((auth==NULL) && (r->regstate==REG_STATE_REGSENT || r->regstate==REG_STATE_AUTHSENT))) {
3185                 ast_log(LOG_NOTICE, "Strange, trying to register when registration already pending\n");
3186                 return 0;
3187         }
3188
3189         if (r->call) {
3190                 if (!auth) {
3191                         ast_log(LOG_WARNING, "Already have a call??\n");
3192                         return 0;
3193                 } else
3194                         p = r->call;
3195         } else {
3196                 if (!r->callid_valid) {
3197                         build_callid(r->callid, sizeof(r->callid), __ourip);
3198                         r->callid_valid = 1;
3199                 }
3200                 p=sip_alloc( r->callid, &r->addr, 0);
3201                 if (!p) {
3202                         ast_log(LOG_WARNING, "Unable to allocate registration call\n");
3203                         return 0;
3204                 }
3205                 p->outgoing = 1;
3206                 r->call=p;
3207                 p->registry=r;
3208                 strncpy(p->peersecret, r->secret, sizeof(p->peersecret)-1);
3209                 strncpy(p->peermd5secret, r->md5secret, sizeof(p->peermd5secret)-1);
3210                 if (strlen(r->authuser))
3211                         strncpy(p->peername, r->authuser, sizeof(p->peername)-1);
3212                 else
3213                         strncpy(p->peername, r->username, sizeof(p->peername)-1);
3214                 strncpy(p->username, r->username, sizeof(p->username)-1);
3215                 strncpy(p->exten, r->contact, sizeof(p->exten) - 1);
3216
3217                 /*
3218                   check which address we should use in our contact header 
3219                   based on whether the remote host is on the external or
3220                   internal network so we can register through nat
3221                  */
3222                 if ((hp = gethostbyname(r->hostname))) {
3223                         if (ast_sip_ouraddrfor((struct in_addr *)hp->h_addr, &p->ourip))
3224                                 memcpy(&p->ourip, &bindaddr.sin_addr, sizeof(p->ourip));
3225                 }
3226                 build_contact(p);
3227         }
3228
3229         /* set up a timeout */
3230         if (auth==NULL)  {
3231                 if (r->timeout > -1) {
3232                         ast_log(LOG_WARNING, "Still have a timeout, %d\n", r->timeout);
3233                         ast_sched_del(sched, r->timeout);
3234                 }
3235                 r->timeout = ast_sched_add(sched, 20*1000, sip_reg_timeout, r);
3236                 ast_log(LOG_DEBUG, "Scheduled a timeout # %d\n", r->timeout);
3237         }
3238
3239         if (strchr(r->username, '@')) {
3240                 snprintf(from, sizeof(from), "<sip:%s>;tag=as%08x", r->username, p->tag);
3241                 snprintf(to, sizeof(to),     "<sip:%s>", r->username);
3242         } else {
3243                 snprintf(from, sizeof(from), "<sip:%s@%s>;tag=as%08x", r->username, r->hostname, p->tag);
3244                 snprintf(to, sizeof(to),     "<sip:%s@%s>", r->username, r->hostname);
3245         }
3246         
3247         snprintf(addr, sizeof(addr), "sip:%s", r->hostname);
3248         strncpy(p->uri, addr, sizeof(p->uri) - 1);
3249
3250         memset(&req, 0, sizeof(req));
3251         init_req(&req, cmd, addr);
3252
3253         snprintf(tmp, sizeof(tmp), "%u %s", ++r->ocseq, cmd);
3254         p->ocseq = r->ocseq;
3255
3256         /* z9hG4bK is a magic cookie.  See RFC 3261 section 8.1.1.7 */
3257         snprintf(via, sizeof(via), "SIP/2.0/UDP %s:%d;branch=z9hG4bK%08x", inet_ntoa(p->ourip), ourport, p->branch);
3258         add_header(&req, "Via", via);
3259         add_header(&req, "From", from);
3260         add_header(&req, "To", to);
3261         add_header(&req, "Call-ID", p->callid);
3262         add_header(&req, "CSeq", tmp);
3263         add_header(&req, "User-Agent", "Asterisk PBX");
3264         if (auth) 
3265                 add_header(&req, authheader, auth);
3266
3267         snprintf(tmp, sizeof(tmp), "%d", default_expiry);
3268         add_header(&req, "Expires", tmp);
3269         add_header(&req, "Contact", p->our_contact);
3270         add_header(&req, "Event", "registration");
3271         add_header(&req, "Content-Length", "0");
3272         add_blank_header(&req);
3273         copy_request(&p->initreq, &req);
3274         parse(&p->initreq);
3275         determine_firstline_parts(&p->initreq);
3276         r->regstate=auth?REG_STATE_AUTHSENT:REG_STATE_REGSENT;
3277         return send_request(p, &req, 1, p->ocseq);
3278 }
3279
3280 static int transmit_message_with_text(struct sip_pvt *p, char *text)
3281 {
3282         struct sip_request req;
3283         reqprep(&req, p, "MESSAGE", 0);
3284         add_text(&req, text);
3285         return send_request(p, &req, 1, p->ocseq);
3286 }
3287
3288 static int transmit_refer(struct sip_pvt *p, char *dest)
3289 {
3290         struct sip_request req;
3291         char from[256];
3292         char *of, *c;
3293         char referto[256];
3294         if (p->outgoing) 
3295                 of = get_header(&p->initreq, "To");
3296         else
3297                 of = get_header(&p->initreq, "From");
3298         strncpy(from, of, sizeof(from) - 1);
3299         of = ditch_braces(from);
3300         strncpy(p->from,of,sizeof(p->from) - 1);
3301         if (strncmp(of, "sip:", 4)) {
3302                 ast_log(LOG_NOTICE, "From address missing 'sip:', using it anyway\n");
3303         } else
3304                 of += 4;
3305         /* Get just the username part */
3306         if ((c = strchr(of, '@'))) {
3307                 *c = '\0';
3308                 c++;
3309         }
3310         if (c) {
3311                 snprintf(referto, sizeof(referto), "<sip:%s@%s>", dest, c);
3312         } else {
3313                 snprintf(referto, sizeof(referto), "<sip:%s>", dest);
3314         }
3315
3316         /* save in case we get 407 challenge */
3317         strncpy(p->refer_to, referto, sizeof(p->refer_to) - 1); 
3318         strncpy(p->referred_by, p->our_contact, sizeof(p->referred_by) - 1); 
3319
3320         reqprep(&req, p, "REFER", 0);
3321         add_header(&req, "Refer-To", referto);
3322         if (strlen(p->our_contact))
3323                 add_header(&req, "Referred-By", p->our_contact);
3324         add_blank_header(&req);
3325         return send_request(p, &req, 1, p->ocseq);
3326 }
3327
3328 static int transmit_info_with_digit(struct sip_pvt *p, char digit)
3329 {
3330         struct sip_request req;
3331         reqprep(&req, p, "INFO", 0);
3332         add_digit(&req, digit);
3333         return send_request(p, &req, 1, p->ocseq);
3334 }
3335
3336 static int transmit_request(struct sip_pvt *p, char *msg, int seqno, int reliable)
3337 {
3338         struct sip_request resp;
3339         reqprep(&resp, p, msg, seqno);
3340         add_header(&resp, "Content-Length", "0");
3341         add_blank_header(&resp);
3342         return send_request(p, &resp, reliable, seqno ? seqno : p->ocseq);
3343 }
3344
3345 static int transmit_request_with_auth(struct sip_pvt *p, char *msg, int seqno, int reliable)
3346 {
3347         struct sip_request resp;
3348         reqprep(&resp, p, msg, seqno);
3349         if (*p->realm)
3350         {
3351                 char digest[256];
3352                 memset(digest,0,sizeof(digest));
3353                 build_reply_digest(p, msg, digest, sizeof(digest));
3354                 add_header(&resp, "Proxy-Authorization", digest);
3355         }
3356
3357         add_header(&resp, "Content-Length", "0");
3358         add_blank_header(&resp);
3359         return send_request(p, &resp, reliable, seqno ? seqno : p->ocseq);      
3360 }
3361
3362 static int expire_register(void *data)
3363 {
3364         struct sip_peer *p = data;
3365         memset(&p->addr, 0, sizeof(p->addr));
3366         ast_db_del("SIP/Registry", p->name);
3367         p->expire = -1;
3368         ast_device_state_changed("SIP/%s", p->name);
3369         if (p->selfdestruct) {
3370                 p->delme = 1;
3371                 prune_peers();
3372         }
3373         return 0;
3374 }
3375
3376 static int sip_poke_peer(struct sip_peer *peer);
3377
3378 static void reg_source_db(struct sip_peer *p)
3379 {
3380         char data[80];
3381         struct in_addr in;
3382         char *c, *d, *u;
3383         int expiry;
3384         if (!ast_db_get("SIP/Registry", p->name, data, sizeof(data))) {
3385                 c = strchr(data, ':');
3386                 if (c) {
3387                         *c = '\0';
3388                         c++;
3389                         if (inet_aton(data, &in)) {
3390                                 d = strchr(c, ':');
3391                                 if (d) {
3392                                         *d = '\0';
3393                                         d++;
3394                                         u = strchr(d, ':');
3395                                         if (u) {
3396                                                 *u = '\0';
3397                                                 u++;
3398                                                 strncpy(p->username, u, sizeof(p->username));
3399                                         }
3400                                         ast_verbose(VERBOSE_PREFIX_3 "SIP Seeding '%s' at %s@%s:%d for %d\n", p->name, 
3401                                                 p->username, inet_ntoa(in), atoi(c), atoi(d));
3402                                         sip_poke_peer(p);
3403                                         expiry = atoi(d);
3404                                         memset(&p->addr, 0, sizeof(p->addr));
3405                                         p->addr.sin_family = AF_INET;
3406                                         p->addr.sin_addr = in;
3407                                         p->addr.sin_port = htons(atoi(c));
3408                                         if (p->expire > -1)
3409                                                 ast_sched_del(sched, p->expire);
3410                                         p->expire = ast_sched_add(sched, (expiry + 10) * 1000, expire_register, (void *)p);
3411                                 }                                       
3412                                         
3413                         }
3414                 }
3415         }
3416 }
3417
3418 static int parse_contact(struct sip_pvt *pvt, struct sip_peer *p, struct sip_request *req)
3419 {
3420         char contact[80]= ""; 
3421         char data[256];
3422         char *expires = get_header(req, "Expires");
3423         int expiry = atoi(expires);
3424         char *c, *n, *pt;
3425         int port;
3426         struct hostent *hp;
3427         struct sockaddr_in oldsin;
3428         if (!strlen(expires)) {
3429                 expires = strstr(get_header(req, "Contact"), "expires=");
3430                 if (expires) {
3431                         if (sscanf(expires + 8, "%d;", &expiry) != 1)
3432                                 expiry = default_expiry;
3433                 } else {
3434                         /* Nothing has been specified */
3435                         expiry = default_expiry;
3436                 }
3437         }
3438         /* Look for brackets */
3439         strncpy(contact, get_header(req, "Contact"), sizeof(contact) - 1);
3440         c = contact;
3441         
3442         if ((n=strchr(c, '<'))) {
3443                 c = n + 1;
3444                 n = strchr(c, '>');
3445                 /* Lose the part after the > */
3446                 if (n) 
3447                         *n = '\0';
3448         }
3449         if (!strcasecmp(c, "*") || !expiry) {
3450                 /* This means remove all registrations and return OK */
3451                 memset(&p->addr, 0, sizeof(p->addr));
3452                 if (p->expire > -1)
3453                         ast_sched_del(sched, p->expire);
3454                 p->expire = -1;
3455                 ast_db_del("SIP/Registry", p->name);
3456                 if (option_verbose > 2)
3457                         ast_verbose(VERBOSE_PREFIX_3 "Unregistered SIP '%s'\n", p->name);
3458                 return 0;
3459         }
3460         /* Make sure it's a SIP URL */
3461         if (strncasecmp(c, "sip:", 4)) {
3462                 ast_log(LOG_NOTICE, "'%s' is not a valid SIP contact (missing sip:) trying to use anyway\n", c);
3463         } else
3464                 c += 4;
3465         /* Ditch q */
3466         n = strchr(c, ';');
3467         if (n) 
3468                 *n = '\0';
3469         /* Grab host */
3470         n = strchr(c, '@');
3471         if (!n) {
3472                 n = c;
3473                 c = NULL;
3474         } else {
3475                 *n = '\0';
3476                 n++;
3477         }
3478         pt = strchr(n, ':');
3479         if (pt) {
3480                 *pt = '\0';
3481                 pt++;
3482                 port = atoi(pt);
3483         } else
3484                 port = DEFAULT_SIP_PORT;
3485         memcpy(&oldsin, &p->addr, sizeof(oldsin));
3486         if (!p->nat) {
3487                 /* XXX This could block for a long time XXX */
3488                 hp = gethostbyname(n);
3489                 if (!hp)  {
3490                         ast_log(LOG_WARNING, "Invalid host '%s'\n", n);
3491                         return -1;
3492                 }
3493                 p->addr.sin_family = AF_INET;
3494                 memcpy(&p->addr.sin_addr, hp->h_addr, sizeof(p->addr.sin_addr));
3495                 p->addr.sin_port = htons(port);
3496         } else {
3497                 /* Don't trust the contact field.  Just use what they came to us
3498                    with */
3499                 memcpy(&p->addr, &pvt->recv, sizeof(p->addr));
3500         }
3501         if (c)
3502                 strncpy(p->username, c, sizeof(p->username) - 1);
3503         else
3504                 strcpy(p->username, "");
3505         if (p->expire > -1)
3506                 ast_sched_del(sched, p->expire);
3507         if ((expiry < 1) || (expiry > max_expiry))
3508                 expiry = max_expiry;
3509         if (!p->temponly)
3510                 p->expire = ast_sched_add(sched, (expiry + 10) * 1000, expire_register, p);
3511         pvt->expiry = expiry;
3512         snprintf(data, sizeof(data), "%s:%d:%d:%s", inet_ntoa(p->addr.sin_addr), ntohs(p->addr.sin_port), expiry, p->username);
3513         ast_db_put("SIP/Registry", p->name, data);
3514         if (inaddrcmp(&p->addr, &oldsin)) {
3515                 sip_poke_peer(p);
3516                 if (option_verbose > 2)
3517                         ast_verbose(VERBOSE_PREFIX_3 "Registered SIP '%s' at %s port %d expires %d\n", p->name, inet_ntoa(p->addr.sin_addr), ntohs(p->addr.sin_port), expiry);
3518         }
3519         return 0;
3520 }