2 * Asterisk -- An open source telephony toolkit.
4 * Copyright (C) 1999 - 2006, Digium, Inc.
6 * Mark Spencer <markster@digium.com>
8 * See http://www.asterisk.org for more information about
9 * the Asterisk project. Please do not directly contact
10 * any of the maintainers of this project for assistance;
11 * the project provides a web site, mailing lists and IRC
12 * channels for your use.
14 * This program is free software, distributed under the terms of
15 * the GNU General Public License Version 2. See the LICENSE file
16 * at the top of the source tree.
21 * \brief Implementation of Session Initiation Protocol
23 * \author Mark Spencer <markster@digium.com>
26 * \arg \ref AstCREDITS
28 * Implementation of RFC 3261 - without S/MIME, TCP and TLS support
29 * Configuration file \link Config_sip sip.conf \endlink
34 * \todo Better support of forking
36 * \ingroup channel_drivers
45 #include <sys/socket.h>
46 #include <sys/ioctl.h>
53 #include <sys/signal.h>
54 #include <netinet/in.h>
55 #include <netinet/in_systm.h>
56 #include <arpa/inet.h>
57 #include <netinet/ip.h>
62 ASTERISK_FILE_VERSION(__FILE__, "$Revision$")
64 #include "asterisk/lock.h"
65 #include "asterisk/channel.h"
66 #include "asterisk/config.h"
67 #include "asterisk/logger.h"
68 #include "asterisk/module.h"
69 #include "asterisk/pbx.h"
70 #include "asterisk/options.h"
71 #include "asterisk/lock.h"
72 #include "asterisk/sched.h"
73 #include "asterisk/io.h"
74 #include "asterisk/rtp.h"
75 #include "asterisk/acl.h"
76 #include "asterisk/manager.h"
77 #include "asterisk/callerid.h"
78 #include "asterisk/cli.h"
79 #include "asterisk/app.h"
80 #include "asterisk/musiconhold.h"
81 #include "asterisk/dsp.h"
82 #include "asterisk/features.h"
83 #include "asterisk/acl.h"
84 #include "asterisk/srv.h"
85 #include "asterisk/astdb.h"
86 #include "asterisk/causes.h"
87 #include "asterisk/utils.h"
88 #include "asterisk/file.h"
89 #include "asterisk/astobj.h"
90 #include "asterisk/dnsmgr.h"
91 #include "asterisk/devicestate.h"
92 #include "asterisk/linkedlists.h"
93 #include "asterisk/stringfields.h"
94 #include "asterisk/monitor.h"
104 #define VIDEO_CODEC_MASK 0x1fc0000 /*!< Video codecs from H.261 thru AST_FORMAT_MAX_VIDEO */
105 #ifndef IPTOS_MINCOST
106 #define IPTOS_MINCOST 0x02
109 /* #define VOCAL_DATA_HACK */
111 #define DEFAULT_DEFAULT_EXPIRY 120
112 #define DEFAULT_MIN_EXPIRY 60
113 #define DEFAULT_MAX_EXPIRY 3600
114 #define DEFAULT_REGISTRATION_TIMEOUT 20
115 #define DEFAULT_MAX_FORWARDS "70"
117 /* guard limit must be larger than guard secs */
118 /* guard min must be < 1000, and should be >= 250 */
119 #define EXPIRY_GUARD_SECS 15 /*!< How long before expiry do we reregister */
120 #define EXPIRY_GUARD_LIMIT 30 /*!< Below here, we use EXPIRY_GUARD_PCT instead of
122 #define EXPIRY_GUARD_MIN 500 /*!< This is the minimum guard time applied. If
123 GUARD_PCT turns out to be lower than this, it
124 will use this time instead.
125 This is in milliseconds. */
126 #define EXPIRY_GUARD_PCT 0.20 /*!< Percentage of expires timeout to use when
127 below EXPIRY_GUARD_LIMIT */
128 #define DEFAULT_EXPIRY 900 /*!< Expire slowly */
130 static int min_expiry = DEFAULT_MIN_EXPIRY; /*!< Minimum accepted registration time */
131 static int max_expiry = DEFAULT_MAX_EXPIRY; /*!< Maximum accepted registration time */
132 static int default_expiry = DEFAULT_DEFAULT_EXPIRY;
133 static int expiry = DEFAULT_EXPIRY;
136 #define MAX(a,b) ((a) > (b) ? (a) : (b))
139 #define CALLERID_UNKNOWN "Unknown"
141 #define DEFAULT_MAXMS 2000 /*!< Qualification: Must be faster than 2 seconds by default */
142 #define DEFAULT_FREQ_OK 60 * 1000 /*!< Qualification: How often to check for the host to be up */
143 #define DEFAULT_FREQ_NOTOK 10 * 1000 /*!< Qualification: How often to check, if the host is down... */
145 #define DEFAULT_RETRANS 1000 /*!< How frequently to retransmit Default: 2 * 500 ms in RFC 3261 */
146 #define MAX_RETRANS 6 /*!< Try only 6 times for retransmissions, a total of 7 transmissions */
147 #define MAX_AUTHTRIES 3 /*!< Try authentication three times, then fail */
149 #define SIP_MAX_HEADERS 64 /*!< Max amount of SIP headers to read */
150 #define SIP_MAX_LINES 64 /*!< Max amount of lines in SIP attachment (like SDP) */
151 #define SIP_MAX_PACKET 4096 /*!< Also from RFC 3261 (2543), should sub headers tho */
153 #define INITIAL_CSEQ 101 /*!< our initial sip sequence number */
155 static const char desc[] = "Session Initiation Protocol (SIP)";
156 static const char config[] = "sip.conf";
157 static const char notify_config[] = "sip_notify.conf";
158 static int usecnt = 0;
164 /* Do _NOT_ make any changes to this enum, or the array following it;
165 if you think you are doing the right thing, you are probably
166 not doing the right thing. If you think there are changes
167 needed, get someone else to review them first _before_
168 submitting a patch. If these two lists do not match properly
169 bad things will happen.
173 XMIT_CRITICAL = 2, /*!< Transmit critical SIP message reliably, with re-transmits.
174 If it fails, it's critical and will cause a teardown of the session */
175 XMIT_RELIABLE = 1, /*!< Transmit SIP message reliably, with re-transmits */
176 XMIT_UNRELIABLE = 0, /*!< Transmit SIP message without bothering with re-transmits */
179 enum subscriptiontype {
189 static const struct cfsubscription_types {
190 enum subscriptiontype type;
191 const char * const event;
192 const char * const mediatype;
193 const char * const text;
194 } subscription_types[] = {
195 { NONE, "-", "unknown", "unknown" },
196 /* IETF draft: draft-ietf-sipping-dialog-package-05.txt */
197 { DIALOG_INFO_XML, "dialog", "application/dialog-info+xml", "dialog-info+xml" },
198 { CPIM_PIDF_XML, "presence", "application/cpim-pidf+xml", "cpim-pidf+xml" }, /* RFC 3863 */
199 { PIDF_XML, "presence", "application/pidf+xml", "pidf+xml" }, /* RFC 3863 */
200 { XPIDF_XML, "presence", "application/xpidf+xml", "xpidf+xml" }, /* Pre-RFC 3863 with MS additions */
201 { MWI_NOTIFICATION, "message-summary", "application/simple-message-summary", "mwi" } /* Mailbox notification */
228 /* States for outbound registrations (with register= lines in sip.conf */
229 enum sipregistrystate {
230 REG_STATE_UNREGISTERED = 0, /*!< We are not registred */
231 REG_STATE_REGSENT, /*!< Registration request sent */
232 REG_STATE_AUTHSENT, /*!< We have tried to authenticate */
233 REG_STATE_REGISTERED, /*!< Registred and done */
234 REG_STATE_REJECTED, /*!< Registration rejected */
235 REG_STATE_TIMEOUT, /*!< Registration timed out */
236 REG_STATE_NOAUTH, /*!< We have no accepted credentials */
237 REG_STATE_FAILED, /*!< Registration failed after several tries */
241 /*! XXX Note that sip_methods[i].id == i must hold or the code breaks */
242 static const struct cfsip_methods {
244 int need_rtp; /*!< when this is the 'primary' use for a pvt structure, does it need RTP? */
247 { SIP_UNKNOWN, RTP, "-UNKNOWN-" },
248 { SIP_RESPONSE, NO_RTP, "SIP/2.0" },
249 { SIP_REGISTER, NO_RTP, "REGISTER" },
250 { SIP_OPTIONS, NO_RTP, "OPTIONS" },
251 { SIP_NOTIFY, NO_RTP, "NOTIFY" },
252 { SIP_INVITE, RTP, "INVITE" },
253 { SIP_ACK, NO_RTP, "ACK" },
254 { SIP_PRACK, NO_RTP, "PRACK" },
255 { SIP_BYE, NO_RTP, "BYE" },
256 { SIP_REFER, NO_RTP, "REFER" },
257 { SIP_SUBSCRIBE, NO_RTP, "SUBSCRIBE" },
258 { SIP_MESSAGE, NO_RTP, "MESSAGE" },
259 { SIP_UPDATE, NO_RTP, "UPDATE" },
260 { SIP_INFO, NO_RTP, "INFO" },
261 { SIP_CANCEL, NO_RTP, "CANCEL" },
262 { SIP_PUBLISH, NO_RTP, "PUBLISH" }
265 /*! Define SIP option tags, used in Require: and Supported: headers
266 We need to be aware of these properties in the phones to use
267 the replace: header. We should not do that without knowing
268 that the other end supports it...
269 This is nothing we can configure, we learn by the dialog
270 Supported: header on the REGISTER (peer) or the INVITE
272 We are not using many of these today, but will in the future.
273 This is documented in RFC 3261
276 #define NOT_SUPPORTED 0
278 #define SIP_OPT_REPLACES (1 << 0)
279 #define SIP_OPT_100REL (1 << 1)
280 #define SIP_OPT_TIMER (1 << 2)
281 #define SIP_OPT_EARLY_SESSION (1 << 3)
282 #define SIP_OPT_JOIN (1 << 4)
283 #define SIP_OPT_PATH (1 << 5)
284 #define SIP_OPT_PREF (1 << 6)
285 #define SIP_OPT_PRECONDITION (1 << 7)
286 #define SIP_OPT_PRIVACY (1 << 8)
287 #define SIP_OPT_SDP_ANAT (1 << 9)
288 #define SIP_OPT_SEC_AGREE (1 << 10)
289 #define SIP_OPT_EVENTLIST (1 << 11)
290 #define SIP_OPT_GRUU (1 << 12)
291 #define SIP_OPT_TARGET_DIALOG (1 << 13)
293 /*! \brief List of well-known SIP options. If we get this in a require,
294 we should check the list and answer accordingly. */
295 static const struct cfsip_options {
296 int id; /*!< Bitmap ID */
297 int supported; /*!< Supported by Asterisk ? */
298 char * const text; /*!< Text id, as in standard */
299 } sip_options[] = { /* XXX used in 3 places */
300 /* Replaces: header for transfer */
301 { SIP_OPT_REPLACES, SUPPORTED, "replaces" },
302 /* RFC3262: PRACK 100% reliability */
303 { SIP_OPT_100REL, NOT_SUPPORTED, "100rel" },
304 /* SIP Session Timers */
305 { SIP_OPT_TIMER, NOT_SUPPORTED, "timer" },
306 /* RFC3959: SIP Early session support */
307 { SIP_OPT_EARLY_SESSION, NOT_SUPPORTED, "early-session" },
308 /* SIP Join header support */
309 { SIP_OPT_JOIN, NOT_SUPPORTED, "join" },
310 /* RFC3327: Path support */
311 { SIP_OPT_PATH, NOT_SUPPORTED, "path" },
312 /* RFC3840: Callee preferences */
313 { SIP_OPT_PREF, NOT_SUPPORTED, "pref" },
314 /* RFC3312: Precondition support */
315 { SIP_OPT_PRECONDITION, NOT_SUPPORTED, "precondition" },
316 /* RFC3323: Privacy with proxies*/
317 { SIP_OPT_PRIVACY, NOT_SUPPORTED, "privacy" },
318 /* RFC4092: Usage of the SDP ANAT Semantics in the SIP */
319 { SIP_OPT_SDP_ANAT, NOT_SUPPORTED, "sdp-anat" },
320 /* RFC3329: Security agreement mechanism */
321 { SIP_OPT_SEC_AGREE, NOT_SUPPORTED, "sec_agree" },
322 /* SIMPLE events: draft-ietf-simple-event-list-07.txt */
323 { SIP_OPT_EVENTLIST, NOT_SUPPORTED, "eventlist" },
324 /* GRUU: Globally Routable User Agent URI's */
325 { SIP_OPT_GRUU, NOT_SUPPORTED, "gruu" },
326 /* Target-dialog: draft-ietf-sip-target-dialog-00.txt */
327 { SIP_OPT_TARGET_DIALOG,NOT_SUPPORTED, "target-dialog" },
331 /*! \brief SIP Methods we support */
332 #define ALLOWED_METHODS "INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY"
334 /*! \brief SIP Extensions we support */
335 #define SUPPORTED_EXTENSIONS "replaces"
338 /* Default values, set and reset in reload_config before reading configuration */
339 /* These are default values in the source. There are other recommended values in the
340 sip.conf.sample for new installations. These may differ to keep backwards compatibility,
341 yet encouraging new behaviour on new installations
343 #define DEFAULT_SIP_PORT 5060 /*!< From RFC 3261 (former 2543) */
344 #define DEFAULT_CONTEXT "default"
345 #define DEFAULT_MUSICCLASS "default"
346 #define DEFAULT_VMEXTEN "asterisk"
347 #define DEFAULT_CALLERID "asterisk"
348 #define DEFAULT_NOTIFYMIME "application/simple-message-summary"
349 #define DEFAULT_MWITIME 10
350 #define DEFAULT_ALLOWGUEST TRUE
351 #define DEFAULT_SRVLOOKUP FALSE /*!< Recommended setting is ON */
352 #define DEFAULT_COMPACTHEADERS FALSE
353 #define DEFAULT_TOS_SIP 0 /*!< Call signalling packets should be marked as DSCP CS3, but the default is 0 to be compatible with previous versions. */
354 #define DEFAULT_TOS_AUDIO 0 /*!< Audio packets should be marked as DSCP EF (Expedited Forwarding), but the default is 0 to be compatible with previous versions. */
355 #define DEFAULT_TOS_VIDEO 0 /*!< Video packets should be marked as DSCP AF41, but the default is 0 to be compatible with previous versions. */
356 #define DEFAULT_ALLOW_EXT_DOM TRUE
357 #define DEFAULT_REALM "asterisk"
358 #define DEFAULT_NOTIFYRINGING TRUE
359 #define DEFAULT_PEDANTIC FALSE
360 #define DEFAULT_AUTOCREATEPEER FALSE
361 #define DEFAULT_QUALIFY FALSE
362 #define DEFAULT_T1MIN 100 /*!< 100 MS for minimal roundtrip time */
363 #define DEFAULT_MAX_CALL_BITRATE (384) /*!< Max bitrate for video */
364 #ifndef DEFAULT_USERAGENT
365 #define DEFAULT_USERAGENT "Asterisk PBX" /*!< Default Useragent: header unless re-defined in sip.conf */
369 /* Default setttings are used as a channel setting and as a default when
370 configuring devices */
371 static char default_context[AST_MAX_CONTEXT];
372 static char default_subscribecontext[AST_MAX_CONTEXT];
373 static char default_language[MAX_LANGUAGE];
374 static char default_callerid[AST_MAX_EXTENSION];
375 static char default_fromdomain[AST_MAX_EXTENSION];
376 static char default_notifymime[AST_MAX_EXTENSION];
377 static int default_qualify; /*!< Default Qualify= setting */
378 static char default_vmexten[AST_MAX_EXTENSION];
379 static char default_musicclass[MAX_MUSICCLASS]; /*!< Global music on hold class */
380 static int default_maxcallbitrate; /*!< Maximum bitrate for call */
381 static struct ast_codec_pref default_prefs; /*!< Default codec prefs */
383 /* Global settings only apply to the channel */
384 static int global_rtautoclear;
385 static int global_notifyringing; /*!< Send notifications on ringing */
386 static int srvlookup; /*!< SRV Lookup on or off. Default is off, RFC behavior is on */
387 static int pedanticsipchecking; /*!< Extra checking ? Default off */
388 static int autocreatepeer; /*!< Auto creation of peers at registration? Default off. */
389 static int global_relaxdtmf; /*!< Relax DTMF */
390 static int global_rtptimeout; /*!< Time out call if no RTP */
391 static int global_rtpholdtimeout;
392 static int global_rtpkeepalive; /*!< Send RTP keepalives */
393 static int global_reg_timeout;
394 static int global_regattempts_max; /*!< Registration attempts before giving up */
395 static int global_allowguest; /*!< allow unauthenticated users/peers to connect? */
396 static int global_allowsubscribe; /*!< Flag for disabling ALL subscriptions, this is FALSE only if all peers are FALSE
397 the global setting is in globals_flags[1] */
398 static int global_mwitime; /*!< Time between MWI checks for peers */
399 static int global_tos_sip; /*!< IP type of service for SIP packets */
400 static int global_tos_audio; /*!< IP type of service for audio RTP packets */
401 static int global_tos_video; /*!< IP type of service for video RTP packets */
402 static int compactheaders; /*!< send compact sip headers */
403 static int recordhistory; /*!< Record SIP history. Off by default */
404 static int dumphistory; /*!< Dump history to verbose before destroying SIP dialog */
405 static char global_realm[MAXHOSTNAMELEN]; /*!< Default realm */
406 static char global_regcontext[AST_MAX_CONTEXT]; /*!< Context for auto-extensions */
407 static char global_useragent[AST_MAX_EXTENSION]; /*!< Useragent for the SIP channel */
408 static int allow_external_domains; /*!< Accept calls to external SIP domains? */
409 static int global_callevents; /*!< Whether we send manager events or not */
410 static int global_t1min; /*!< T1 roundtrip time minimum */
412 /*! \brief Codecs that we support by default: */
413 static int global_capability = AST_FORMAT_ULAW | AST_FORMAT_ALAW | AST_FORMAT_GSM | AST_FORMAT_H263;
414 static int noncodeccapability = AST_RTP_DTMF;
416 /* Object counters */
417 static int suserobjs = 0; /*!< Static users */
418 static int ruserobjs = 0; /*!< Realtime users */
419 static int speerobjs = 0; /*!< Statis peers */
420 static int rpeerobjs = 0; /*!< Realtime peers */
421 static int apeerobjs = 0; /*!< Autocreated peer objects */
422 static int regobjs = 0; /*!< Registry objects */
424 static struct ast_flags global_flags[2] = {{0}}; /*!< global SIP_ flags */
426 AST_MUTEX_DEFINE_STATIC(usecnt_lock);
428 /*! \brief Protect the SIP dialog list (of sip_pvt's) */
429 AST_MUTEX_DEFINE_STATIC(iflock);
431 /*! \brief Protect the monitoring thread, so only one process can kill or start it, and not
432 when it's doing something critical. */
433 AST_MUTEX_DEFINE_STATIC(netlock);
435 AST_MUTEX_DEFINE_STATIC(monlock);
437 AST_MUTEX_DEFINE_STATIC(sip_reload_lock);
439 /*! \brief This is the thread for the monitor which checks for input on the channels
440 which are not currently in use. */
441 static pthread_t monitor_thread = AST_PTHREADT_NULL;
443 static int sip_reloading = FALSE; /*!< Flag for avoiding multiple reloads at the same time */
444 static enum channelreloadreason sip_reloadreason; /*!< Reason for last reload/load of configuration */
446 static struct sched_context *sched; /*!< The scheduling context */
447 static struct io_context *io; /*!< The IO context */
449 #define DEC_CALL_LIMIT 0
450 #define INC_CALL_LIMIT 1
453 /*! \brief sip_request: The data grabbed from the UDP socket */
455 char *rlPart1; /*!< SIP Method Name or "SIP/2.0" protocol version */
456 char *rlPart2; /*!< The Request URI or Response Status */
457 int len; /*!< Length */
458 int headers; /*!< # of SIP Headers */
459 int method; /*!< Method of this request */
460 int lines; /*!< SDP Content */
461 unsigned int flags; /*!< SIP_PKT Flags for this packet */
462 char *header[SIP_MAX_HEADERS];
463 char *line[SIP_MAX_LINES];
464 char data[SIP_MAX_PACKET];
468 * A sip packet is stored into the data[] buffer, with the header followed
469 * by an empty line and the body of the message.
470 * On outgoing packets, data is accumulated in data[] with len reflecting
471 * the next available byte, headers and lines count the number of lines
472 * in both parts. There are no '\0' in data[0..len-1].
474 * On received packet, the input read from the socket is copied into data[],
475 * len is set and the string is NUL-terminated. Then a parser fills up
476 * the other fields -header[] and line[] to point to the lines of the
477 * message, rlPart1 and rlPart2 parse the first lnie as below:
479 * Requests have in the first line METHOD URI SIP/2.0
480 * rlPart1 = method; rlPart2 = uri;
481 * Responses have in the first line SIP/2.0 code description
482 * rlPart1 = SIP/2.0; rlPart2 = code + description;
486 /*! \brief structure used in transfers */
488 struct ast_channel *chan1;
489 struct ast_channel *chan2;
490 struct sip_request req;
495 /*! \brief Parameters to the transmit_invite function */
496 struct sip_invite_param {
497 const char *distinctive_ring; /*!< Distinctive ring header */
498 int addsipheaders; /*!< Add extra SIP headers */
499 const char *uri_options; /*!< URI options to add to the URI */
500 const char *vxml_url; /*!< VXML url for Cisco phones */
501 char *auth; /*!< Authentication */
502 char *authheader; /*!< Auth header */
503 enum sip_auth_type auth_type; /*!< Authentication type */
506 /*! \brief Structure to save routing information for a SIP session */
508 struct sip_route *next;
512 /*! \brief Modes for SIP domain handling in the PBX */
514 SIP_DOMAIN_AUTO, /*!< This domain is auto-configured */
515 SIP_DOMAIN_CONFIG, /*!< This domain is from configuration */
519 char domain[MAXHOSTNAMELEN]; /*!< SIP domain we are responsible for */
520 char context[AST_MAX_EXTENSION]; /*!< Incoming context for this domain */
521 enum domain_mode mode; /*!< How did we find this domain? */
522 AST_LIST_ENTRY(domain) list; /*!< List mechanics */
525 static AST_LIST_HEAD_STATIC(domain_list, domain); /*!< The SIP domain list */
528 /*! \brief sip_history: Structure for saving transactions within a SIP dialog */
530 AST_LIST_ENTRY(sip_history) list;
531 char event[0]; /* actually more, depending on needs */
534 AST_LIST_HEAD_NOLOCK(sip_history_head, sip_history); /*!< history list, entry in sip_pvt */
536 /*! \brief sip_auth: Creadentials for authentication to other SIP services */
538 char realm[AST_MAX_EXTENSION]; /*!< Realm in which these credentials are valid */
539 char username[256]; /*!< Username */
540 char secret[256]; /*!< Secret */
541 char md5secret[256]; /*!< MD5Secret */
542 struct sip_auth *next; /*!< Next auth structure in list */
545 /*--- Various flags for the flags field in the pvt structure
546 Peer only flags should be set in PAGE2 below
548 #define SIP_ALREADYGONE (1 << 0) /*!< Whether or not we've already been destroyed by our peer */
549 #define SIP_NEEDDESTROY (1 << 1) /*!< if we need to be destroyed */
550 #define SIP_NOVIDEO (1 << 2) /*!< Didn't get video in invite, don't offer */
551 #define SIP_RINGING (1 << 3) /*!< Have sent 180 ringing */
552 #define SIP_PROGRESS_SENT (1 << 4) /*!< Have sent 183 message progress */
553 #define SIP_NEEDREINVITE (1 << 5) /*!< Do we need to send another reinvite? */
554 #define SIP_PENDINGBYE (1 << 6) /*!< Need to send bye after we ack? */
555 #define SIP_GOTREFER (1 << 7) /*!< Got a refer? */
556 #define SIP_PROMISCREDIR (1 << 8) /*!< Promiscuous redirection */
557 #define SIP_TRUSTRPID (1 << 9) /*!< Trust RPID headers? */
558 #define SIP_USEREQPHONE (1 << 10) /*!< Add user=phone to numeric URI. Default off */
559 #define SIP_REALTIME (1 << 11) /*!< Flag for realtime users */
560 #define SIP_USECLIENTCODE (1 << 12) /*!< Trust X-ClientCode info message */
561 #define SIP_OUTGOING (1 << 13) /*!< Is this an outgoing call? */
562 #define SIP_FREEBIT (1 << 14) /*!< Free for session-related use */
563 #define SIP_FREEBIT3 (1 << 15) /*!< Free for session-related use */
564 #define SIP_DTMF (3 << 16) /*!< DTMF Support: four settings, uses two bits */
565 #define SIP_DTMF_RFC2833 (0 << 16) /*!< DTMF Support: RTP DTMF - "rfc2833" */
566 #define SIP_DTMF_INBAND (1 << 16) /*!< DTMF Support: Inband audio, only for ULAW/ALAW - "inband" */
567 #define SIP_DTMF_INFO (2 << 16) /*!< DTMF Support: SIP Info messages - "info" */
568 #define SIP_DTMF_AUTO (3 << 16) /*!< DTMF Support: AUTO switch between rfc2833 and in-band DTMF */
570 #define SIP_NAT (3 << 18) /*!< four settings, uses two bits */
571 #define SIP_NAT_NEVER (0 << 18) /*!< No nat support */
572 #define SIP_NAT_RFC3581 (1 << 18) /*!< NAT RFC3581 */
573 #define SIP_NAT_ROUTE (2 << 18) /*!< NAT Only ROUTE */
574 #define SIP_NAT_ALWAYS (3 << 18) /*!< NAT Both ROUTE and RFC3581 */
575 /* re-INVITE related settings */
576 #define SIP_REINVITE (3 << 20) /*!< two bits used */
577 #define SIP_CAN_REINVITE (1 << 20) /*!< allow peers to be reinvited to send media directly p2p */
578 #define SIP_REINVITE_UPDATE (2 << 20) /*!< use UPDATE (RFC3311) when reinviting this peer */
579 /* "insecure" settings */
580 #define SIP_INSECURE_PORT (1 << 22) /*!< don't require matching port for incoming requests */
581 #define SIP_INSECURE_INVITE (1 << 23) /*!< don't require authentication for incoming INVITEs */
582 /* Sending PROGRESS in-band settings */
583 #define SIP_PROG_INBAND (3 << 24) /*!< three settings, uses two bits */
584 #define SIP_PROG_INBAND_NEVER (0 << 24)
585 #define SIP_PROG_INBAND_NO (1 << 24)
586 #define SIP_PROG_INBAND_YES (2 << 24)
587 #define SIP_CALL_ONHOLD (1 << 26) /*!< Call states */
588 #define SIP_CALL_LIMIT (1 << 27) /*!< Call limit enforced for this call */
589 #define SIP_SENDRPID (1 << 28) /*!< Remote Party-ID Support */
590 #define SIP_INC_COUNT (1 << 29) /*!< Did this connection increment the counter of in-use calls? */
592 #define SIP_FLAGS_TO_COPY \
593 (SIP_PROMISCREDIR | SIP_TRUSTRPID | SIP_SENDRPID | SIP_DTMF | SIP_REINVITE | \
594 SIP_PROG_INBAND | SIP_USECLIENTCODE | SIP_NAT | \
595 SIP_USEREQPHONE | SIP_INSECURE_PORT | SIP_INSECURE_INVITE)
597 /* a new page of flags for peers */
598 #define SIP_PAGE2_RTCACHEFRIENDS (1 << 0)
599 #define SIP_PAGE2_RTUPDATE (1 << 1)
600 #define SIP_PAGE2_RTAUTOCLEAR (1 << 2)
601 #define SIP_PAGE2_IGNOREREGEXPIRE (1 << 3)
602 #define SIP_PAGE2_RT_FROMCONTACT (1 << 4)
603 #define SIP_PAGE2_DEBUG (3 << 5)
604 #define SIP_PAGE2_DEBUG_CONFIG (1 << 5)
605 #define SIP_PAGE2_DEBUG_CONSOLE (1 << 6)
606 #define SIP_PAGE2_DYNAMIC (1 << 7) /*!< Dynamic Peers register with Asterisk */
607 #define SIP_PAGE2_SELFDESTRUCT (1 << 8) /*!< Automatic peers need to destruct themselves */
608 #define SIP_PAGE2_VIDEOSUPPORT (1 << 9)
609 #define SIP_PAGE2_ALLOWSUBSCRIBE (1 << 10) /*!< Allow subscriptions from this peer? */
610 #define SIP_PAGE2_ALLOWOVERLAP (1 << 11) /*!< Allow overlap dialing ? */
611 #define SIP_PAGE2_SUBSCRIBEMWIONLY (1 << 12) /*!< Only issue MWI notification if subscribed to */
614 #define SIP_PAGE2_FLAGS_TO_COPY \
615 (SIP_PAGE2_ALLOWSUBSCRIBE | SIP_PAGE2_ALLOWOVERLAP | SIP_PAGE2_VIDEOSUPPORT)
617 /* SIP packet flags */
618 #define SIP_PKT_DEBUG (1 << 0) /*!< Debug this packet */
619 #define SIP_PKT_WITH_TOTAG (1 << 1) /*!< This packet has a to-tag */
620 #define SIP_PKT_IGNORE (1 << 2) /*!< This is a re-transmit, ignore it */
621 #define SIP_PKT_IGNORE_RESP (1 << 3) /*!< Resp ignore - ??? */
622 #define SIP_PKT_IGNORE_REQ (1 << 4) /*!< Req ignore - ??? */
624 #define sipdebug ast_test_flag(&global_flags[1], SIP_PAGE2_DEBUG)
625 #define sipdebug_config ast_test_flag(&global_flags[1], SIP_PAGE2_DEBUG_CONFIG)
626 #define sipdebug_console ast_test_flag(&global_flags[1], SIP_PAGE2_DEBUG_CONSOLE)
628 /*! \brief sip_pvt: PVT structures are used for each SIP dialog, ie. a call, a registration, a subscribe */
629 static struct sip_pvt {
630 ast_mutex_t lock; /*!< Dialog private lock */
631 int method; /*!< SIP method that opened this dialog */
632 AST_DECLARE_STRING_FIELDS(
633 AST_STRING_FIELD(callid); /*!< Global CallID */
634 AST_STRING_FIELD(randdata); /*!< Random data */
635 AST_STRING_FIELD(accountcode); /*!< Account code */
636 AST_STRING_FIELD(realm); /*!< Authorization realm */
637 AST_STRING_FIELD(nonce); /*!< Authorization nonce */
638 AST_STRING_FIELD(opaque); /*!< Opaque nonsense */
639 AST_STRING_FIELD(qop); /*!< Quality of Protection, since SIP wasn't complicated enough yet. */
640 AST_STRING_FIELD(domain); /*!< Authorization domain */
641 AST_STRING_FIELD(refer_to); /*!< Place to store REFER-TO extension */
642 AST_STRING_FIELD(referred_by); /*!< Place to store REFERRED-BY extension */
643 AST_STRING_FIELD(refer_contact);/*!< Place to store Contact info from a REFER extension */
644 AST_STRING_FIELD(from); /*!< The From: header */
645 AST_STRING_FIELD(useragent); /*!< User agent in SIP request */
646 AST_STRING_FIELD(exten); /*!< Extension where to start */
647 AST_STRING_FIELD(context); /*!< Context for this call */
648 AST_STRING_FIELD(subscribecontext); /*!< Subscribecontext */
649 AST_STRING_FIELD(fromdomain); /*!< Domain to show in the from field */
650 AST_STRING_FIELD(fromuser); /*!< User to show in the user field */
651 AST_STRING_FIELD(fromname); /*!< Name to show in the user field */
652 AST_STRING_FIELD(tohost); /*!< Host we should put in the "to" field */
653 AST_STRING_FIELD(language); /*!< Default language for this call */
654 AST_STRING_FIELD(musicclass); /*!< Music on Hold class */
655 AST_STRING_FIELD(rdnis); /*!< Referring DNIS */
656 AST_STRING_FIELD(theirtag); /*!< Their tag */
657 AST_STRING_FIELD(username); /*!< [user] name */
658 AST_STRING_FIELD(peername); /*!< [peer] name, not set if [user] */
659 AST_STRING_FIELD(authname); /*!< Who we use for authentication */
660 AST_STRING_FIELD(uri); /*!< Original requested URI */
661 AST_STRING_FIELD(okcontacturi); /*!< URI from the 200 OK on INVITE */
662 AST_STRING_FIELD(peersecret); /*!< Password */
663 AST_STRING_FIELD(peermd5secret);
664 AST_STRING_FIELD(cid_num); /*!< Caller*ID */
665 AST_STRING_FIELD(cid_name); /*!< Caller*ID */
666 AST_STRING_FIELD(via); /*!< Via: header */
667 AST_STRING_FIELD(fullcontact); /*!< The Contact: that the UA registers with us */
668 AST_STRING_FIELD(our_contact); /*!< Our contact header */
669 AST_STRING_FIELD(rpid); /*!< Our RPID header */
670 AST_STRING_FIELD(rpid_from); /*!< Our RPID From header */
672 struct ast_codec_pref prefs; /*!< codec prefs */
673 unsigned int ocseq; /*!< Current outgoing seqno */
674 unsigned int icseq; /*!< Current incoming seqno */
675 ast_group_t callgroup; /*!< Call group */
676 ast_group_t pickupgroup; /*!< Pickup group */
677 int lastinvite; /*!< Last Cseq of invite */
678 struct ast_flags flags[2]; /*!< SIP_ flags */
679 int timer_t1; /*!< SIP timer T1, ms rtt */
680 unsigned int sipoptions; /*!< Supported SIP sipoptions on the other end */
681 int capability; /*!< Special capability (codec) */
682 int jointcapability; /*!< Supported capability at both ends (codecs ) */
683 int peercapability; /*!< Supported peer capability */
684 int prefcodec; /*!< Preferred codec (outbound only) */
685 int noncodeccapability;
686 int maxcallbitrate; /*!< Maximum Call Bitrate for Video Calls */
687 int callingpres; /*!< Calling presentation */
688 int authtries; /*!< Times we've tried to authenticate */
689 int expiry; /*!< How long we take to expire */
690 long branch; /*!< One random number */
691 char tag[11]; /*!< Another random number */
692 int sessionid; /*!< SDP Session ID */
693 int sessionversion; /*!< SDP Session Version */
694 struct sockaddr_in sa; /*!< Our peer */
695 struct sockaddr_in redirip; /*!< Where our RTP should be going if not to us */
696 struct sockaddr_in vredirip; /*!< Where our Video RTP should be going if not to us */
697 int redircodecs; /*!< Redirect codecs */
698 struct sockaddr_in recv; /*!< Received as */
699 struct in_addr ourip; /*!< Our IP */
700 struct ast_channel *owner; /*!< Who owns us */
701 struct sip_pvt *refer_call; /*!< Call we are referring */
702 struct sip_route *route; /*!< Head of linked list of routing steps (fm Record-Route) */
703 int route_persistant; /*!< Is this the "real" route? */
704 struct sip_auth *peerauth; /*!< Realm authentication */
705 int noncecount; /*!< Nonce-count */
706 char lastmsg[256]; /*!< Last Message sent/received */
707 int amaflags; /*!< AMA Flags */
708 int pendinginvite; /*!< Any pending invite */
709 struct sip_request initreq; /*!< Initial request that opened the SIP dialog */
711 int maxtime; /*!< Max time for first response */
712 int initid; /*!< Auto-congest ID if appropriate */
713 int autokillid; /*!< Auto-kill ID */
714 time_t lastrtprx; /*!< Last RTP received */
715 time_t lastrtptx; /*!< Last RTP sent */
716 int rtptimeout; /*!< RTP timeout time */
717 int rtpholdtimeout; /*!< RTP timeout when on hold */
718 int rtpkeepalive; /*!< Send RTP packets for keepalive */
719 enum subscriptiontype subscribed; /*!< Is this dialog a subscription? */
721 int laststate; /*!< Last known extension state */
724 struct ast_dsp *vad; /*!< Voice Activation Detection dsp */
726 struct sip_peer *relatedpeer; /*!< If this dialog is related to a peer, which one
727 Used in peerpoke, mwi subscriptions */
728 struct sip_registry *registry; /*!< If this is a REGISTER dialog, to which registry */
729 struct ast_rtp *rtp; /*!< RTP Session */
730 struct ast_rtp *vrtp; /*!< Video RTP session */
731 struct sip_pkt *packets; /*!< Packets scheduled for re-transmission */
732 struct sip_history_head *history; /*!< History of this SIP dialog */
733 struct ast_variable *chanvars; /*!< Channel variables to set for call */
734 struct sip_pvt *next; /*!< Next dialog in chain */
735 struct sip_invite_param *options; /*!< Options for INVITE */
738 #define FLAG_RESPONSE (1 << 0)
739 #define FLAG_FATAL (1 << 1)
741 /*! \brief sip packet - read in sipsock_read(), transmitted in send_request() */
743 struct sip_pkt *next; /*!< Next packet */
744 int retrans; /*!< Retransmission number */
745 int method; /*!< SIP method for this packet */
746 int seqno; /*!< Sequence number */
747 unsigned int flags; /*!< non-zero if this is a response packet (e.g. 200 OK) */
748 struct sip_pvt *owner; /*!< Owner AST call */
749 int retransid; /*!< Retransmission ID */
750 int timer_a; /*!< SIP timer A, retransmission timer */
751 int timer_t1; /*!< SIP Timer T1, estimated RTT or 500 ms */
752 int packetlen; /*!< Length of packet */
756 /*! \brief Structure for SIP user data. User's place calls to us */
758 /* Users who can access various contexts */
759 ASTOBJ_COMPONENTS(struct sip_user);
760 char secret[80]; /*!< Password */
761 char md5secret[80]; /*!< Password in md5 */
762 char context[AST_MAX_CONTEXT]; /*!< Default context for incoming calls */
763 char subscribecontext[AST_MAX_CONTEXT]; /* Default context for subscriptions */
764 char cid_num[80]; /*!< Caller ID num */
765 char cid_name[80]; /*!< Caller ID name */
766 char accountcode[AST_MAX_ACCOUNT_CODE]; /* Account code */
767 char language[MAX_LANGUAGE]; /*!< Default language for this user */
768 char musicclass[MAX_MUSICCLASS];/*!< Music on Hold class */
769 char useragent[256]; /*!< User agent in SIP request */
770 struct ast_codec_pref prefs; /*!< codec prefs */
771 ast_group_t callgroup; /*!< Call group */
772 ast_group_t pickupgroup; /*!< Pickup Group */
773 unsigned int sipoptions; /*!< Supported SIP options */
774 struct ast_flags flags[2]; /*!< SIP_ flags */
775 int amaflags; /*!< AMA flags for billing */
776 int callingpres; /*!< Calling id presentation */
777 int capability; /*!< Codec capability */
778 int inUse; /*!< Number of calls in use */
779 int call_limit; /*!< Limit of concurrent calls */
780 struct ast_ha *ha; /*!< ACL setting */
781 struct ast_variable *chanvars; /*!< Variables to set for channel created by user */
782 int maxcallbitrate; /*!< Maximum Bitrate for a video call */
785 /*! \brief Structure for SIP peer data, we place calls to peers if registered or fixed IP address (host) */
786 /* XXX field 'name' must be first otherwise sip_addrcmp() will fail */
788 ASTOBJ_COMPONENTS(struct sip_peer); /*!< name, refcount, objflags, object pointers */
789 /*!< peer->name is the unique name of this object */
790 char secret[80]; /*!< Password */
791 char md5secret[80]; /*!< Password in MD5 */
792 struct sip_auth *auth; /*!< Realm authentication list */
793 char context[AST_MAX_CONTEXT]; /*!< Default context for incoming calls */
794 char subscribecontext[AST_MAX_CONTEXT]; /*!< Default context for subscriptions */
795 char username[80]; /*!< Temporary username until registration */
796 char accountcode[AST_MAX_ACCOUNT_CODE]; /*!< Account code */
797 int amaflags; /*!< AMA Flags (for billing) */
798 char tohost[MAXHOSTNAMELEN]; /*!< If not dynamic, IP address */
799 char regexten[AST_MAX_EXTENSION]; /*!< Extension to register (if regcontext is used) */
800 char fromuser[80]; /*!< From: user when calling this peer */
801 char fromdomain[MAXHOSTNAMELEN]; /*!< From: domain when calling this peer */
802 char fullcontact[256]; /*!< Contact registered with us (not in sip.conf) */
803 char cid_num[80]; /*!< Caller ID num */
804 char cid_name[80]; /*!< Caller ID name */
805 int callingpres; /*!< Calling id presentation */
806 int inUse; /*!< Number of calls in use */
807 int call_limit; /*!< Limit of concurrent calls */
808 char vmexten[AST_MAX_EXTENSION]; /*!< Dialplan extension for MWI notify message*/
809 char mailbox[AST_MAX_EXTENSION]; /*!< Mailbox setting for MWI checks */
810 char language[MAX_LANGUAGE]; /*!< Default language for prompts */
811 char musicclass[MAX_MUSICCLASS];/*!< Music on Hold class */
812 char useragent[256]; /*!< User agent in SIP request (saved from registration) */
813 struct ast_codec_pref prefs; /*!< codec prefs */
815 time_t lastmsgcheck; /*!< Last time we checked for MWI */
816 unsigned int sipoptions; /*!< Supported SIP options */
817 struct ast_flags flags[2]; /*!< SIP_ flags */
818 int expire; /*!< When to expire this peer registration */
819 int capability; /*!< Codec capability */
820 int rtptimeout; /*!< RTP timeout */
821 int rtpholdtimeout; /*!< RTP Hold Timeout */
822 int rtpkeepalive; /*!< Send RTP packets for keepalive */
823 ast_group_t callgroup; /*!< Call group */
824 ast_group_t pickupgroup; /*!< Pickup group */
825 struct ast_dnsmgr_entry *dnsmgr;/*!< DNS refresh manager for peer */
826 struct sockaddr_in addr; /*!< IP address of peer */
827 int maxcallbitrate; /*!< Maximum Bitrate for a video call */
830 struct sip_pvt *call; /*!< Call pointer */
831 int pokeexpire; /*!< When to expire poke (qualify= checking) */
832 int lastms; /*!< How long last response took (in ms), or -1 for no response */
833 int maxms; /*!< Max ms we will accept for the host to be up, 0 to not monitor */
834 struct timeval ps; /*!< Ping send time */
836 struct sockaddr_in defaddr; /*!< Default IP address, used until registration */
837 struct ast_ha *ha; /*!< Access control list */
838 struct ast_variable *chanvars; /*!< Variables to set for channel created by user */
839 struct sip_pvt *mwipvt; /*!< Subscription for MWI */
845 /*! \brief Registrations with other SIP proxies */
846 struct sip_registry {
847 ASTOBJ_COMPONENTS_FULL(struct sip_registry,1,1);
848 AST_DECLARE_STRING_FIELDS(
849 AST_STRING_FIELD(callid); /*!< Global Call-ID */
850 AST_STRING_FIELD(realm); /*!< Authorization realm */
851 AST_STRING_FIELD(nonce); /*!< Authorization nonce */
852 AST_STRING_FIELD(opaque); /*!< Opaque nonsense */
853 AST_STRING_FIELD(qop); /*!< Quality of Protection, since SIP wasn't complicated enough yet. */
854 AST_STRING_FIELD(domain); /*!< Authorization domain */
855 AST_STRING_FIELD(username); /*!< Who we are registering as */
856 AST_STRING_FIELD(authuser); /*!< Who we *authenticate* as */
857 AST_STRING_FIELD(hostname); /*!< Domain or host we register to */
858 AST_STRING_FIELD(secret); /*!< Password in clear text */
859 AST_STRING_FIELD(md5secret); /*!< Password in md5 */
860 AST_STRING_FIELD(contact); /*!< Contact extension */
861 AST_STRING_FIELD(random);
863 int portno; /*!< Optional port override */
864 int expire; /*!< Sched ID of expiration */
865 int regattempts; /*!< Number of attempts (since the last success) */
866 int timeout; /*!< sched id of sip_reg_timeout */
867 int refresh; /*!< How often to refresh */
868 struct sip_pvt *call; /*!< create a sip_pvt structure for each outbound "registration dialog" in progress */
869 enum sipregistrystate regstate; /*!< Registration state (see above) */
870 int callid_valid; /*!< 0 means we haven't chosen callid for this registry yet. */
871 unsigned int ocseq; /*!< Sequence number we got to for REGISTERs for this registry */
872 struct sockaddr_in us; /*!< Who the server thinks we are */
873 int noncecount; /*!< Nonce-count */
874 char lastmsg[256]; /*!< Last Message sent/received */
877 /* --- Linked lists of various objects --------*/
879 /*! \brief The user list: Users and friends */
880 static struct ast_user_list {
881 ASTOBJ_CONTAINER_COMPONENTS(struct sip_user);
884 /*! \brief The peer list: Peers and Friends */
885 static struct ast_peer_list {
886 ASTOBJ_CONTAINER_COMPONENTS(struct sip_peer);
889 /*! \brief The register list: Other SIP proxys we register with and place calls to */
890 static struct ast_register_list {
891 ASTOBJ_CONTAINER_COMPONENTS(struct sip_registry);
895 /*! \todo Move the sip_auth list to AST_LIST */
896 static struct sip_auth *authl = NULL; /*!< Authentication list for realm authentication */
899 /* --- Sockets and networking --------------*/
900 static int sipsock = -1; /*!< Main socket for SIP network communication */
901 static struct sockaddr_in bindaddr = { 0, }; /*!< The address we bind to */
902 static struct sockaddr_in externip; /*!< External IP address if we are behind NAT */
903 static char externhost[MAXHOSTNAMELEN]; /*!< External host name (possibly with dynamic DNS and DHCP */
904 static time_t externexpire = 0; /*!< Expiration counter for re-resolving external host name in dynamic DNS */
905 static int externrefresh = 10;
906 static struct ast_ha *localaddr; /*!< List of local networks, on the same side of NAT as this Asterisk */
907 static struct in_addr __ourip;
908 static struct sockaddr_in outboundproxyip;
910 static struct sockaddr_in debugaddr;
912 struct ast_config *notify_types; /*!< The list of manual NOTIFY types we know how to send */
916 /*---------------------------- Forward declarations of functions in chan_sip.c */
917 static int transmit_response(struct sip_pvt *p, char *msg, struct sip_request *req);
918 static int transmit_response_with_sdp(struct sip_pvt *p, char *msg, struct sip_request *req, enum xmittype reliable);
919 static int transmit_response_with_unsupported(struct sip_pvt *p, const char *msg, struct sip_request *req, const char *unsupported);
920 static int transmit_response_with_auth(struct sip_pvt *p, const char *msg, struct sip_request *req, const char *rand, enum xmittype reliable, const char *header, int stale);
921 static int transmit_request(struct sip_pvt *p, int sipmethod, int inc, enum xmittype reliable, int newbranch);
922 static int transmit_request_with_auth(struct sip_pvt *p, int sipmethod, int inc, enum xmittype reliable, int newbranch);
923 static int transmit_invite(struct sip_pvt *p, int sipmethod, int sendsdp, int init);
924 static int transmit_reinvite_with_sdp(struct sip_pvt *p);
925 static int transmit_info_with_digit(struct sip_pvt *p, char digit);
926 static int transmit_info_with_vidupdate(struct sip_pvt *p);
927 static int transmit_message_with_text(struct sip_pvt *p, const char *text);
928 static int transmit_refer(struct sip_pvt *p, const char *dest);
929 static int sip_sipredirect(struct sip_pvt *p, const char *dest);
930 static struct sip_peer *temp_peer(const char *name);
931 static int do_proxy_auth(struct sip_pvt *p, struct sip_request *req, char *header, char *respheader, int sipmethod, int init);
932 static void free_old_route(struct sip_route *route);
933 static int reply_digest(struct sip_pvt *p, struct sip_request *req, char *header, int sipmethod, char *digest, int digest_len);
934 static int build_reply_digest(struct sip_pvt *p, int method, char *digest, int digest_len);
935 static int update_call_counter(struct sip_pvt *fup, int event);
936 static struct sip_peer *build_peer(const char *name, struct ast_variable *v, int realtime);
937 static struct sip_user *build_user(const char *name, struct ast_variable *v, int realtime);
938 static int sip_do_reload(enum channelreloadreason reason);
939 static int expire_register(void *data);
940 static struct ast_channel *sip_request_call(const char *type, int format, void *data, int *cause);
941 static int sip_devicestate(void *data);
942 static int sip_sendtext(struct ast_channel *ast, const char *text);
943 static int sip_call(struct ast_channel *ast, char *dest, int timeout);
944 static int sip_hangup(struct ast_channel *ast);
945 static int sip_answer(struct ast_channel *ast);
946 static struct ast_frame *sip_read(struct ast_channel *ast);
947 static int sip_write(struct ast_channel *ast, struct ast_frame *frame);
948 static int sip_indicate(struct ast_channel *ast, int condition);
949 static int sip_transfer(struct ast_channel *ast, const char *dest);
950 static int sip_fixup(struct ast_channel *oldchan, struct ast_channel *newchan);
951 static int sip_senddigit(struct ast_channel *ast, char digit);
952 static int clear_realm_authentication(struct sip_auth *authlist); /* Clear realm authentication list (at reload) */
953 static struct sip_auth *add_realm_authentication(struct sip_auth *authlist, char *configuration, int lineno); /* Add realm authentication in list */
954 static struct sip_auth *find_realm_authentication(struct sip_auth *authlist, const char *realm); /* Find authentication for a specific realm */
955 static int check_auth(struct sip_pvt *p, struct sip_request *req, const char *username,
956 const char *secret, const char *md5secret, int sipmethod,
957 char *uri, enum xmittype reliable, int ignore);
958 static int check_sip_domain(const char *domain, char *context, size_t len); /* Check if domain is one of our local domains */
959 static void append_date(struct sip_request *req); /* Append date to SIP packet */
960 static int determine_firstline_parts(struct sip_request *req);
961 static void sip_dump_history(struct sip_pvt *dialog); /* Dump history to LOG_DEBUG at end of dialog, before destroying data */
962 static const struct cfsubscription_types *find_subscription_type(enum subscriptiontype subtype);
963 static int transmit_state_notify(struct sip_pvt *p, int state, int full);
964 static const char *gettag(const struct sip_request *req, char *header, char *tagbuf, int tagbufsize);
965 static int find_sip_method(const char *msg);
966 static unsigned int parse_sip_options(struct sip_pvt *pvt, const char *supported);
967 static void sip_destroy(struct sip_pvt *p);
968 static void sip_destroy_peer(struct sip_peer *peer);
969 static void sip_destroy_user(struct sip_user *user);
970 static void parse_request(struct sip_request *req);
971 static const char *get_header(const struct sip_request *req, const char *name);
972 static void copy_request(struct sip_request *dst,struct sip_request *src);
973 static int transmit_response_reliable(struct sip_pvt *p, const char *msg, struct sip_request *req);
974 static int transmit_register(struct sip_registry *r, int sipmethod, char *auth, char *authheader);
975 static int sip_poke_peer(struct sip_peer *peer);
976 static int __sip_do_register(struct sip_registry *r);
977 static int restart_monitor(void);
978 static void set_peer_defaults(struct sip_peer *peer);
979 static struct sip_peer *temp_peer(const char *name);
980 static int sip_send_mwi_to_peer(struct sip_peer *peer);
981 static int sip_scheddestroy(struct sip_pvt *p, int ms);
983 /*------Request handling functions */
984 static int handle_request_invite(struct sip_pvt *p, struct sip_request *req, int debug, int seqno, struct sockaddr_in *sin, int *recount, char *e);
985 static int handle_request_refer(struct sip_pvt *p, struct sip_request *req, int debug, int ignore, int seqno, int *nounlock);
986 static int handle_request_bye(struct sip_pvt *p, struct sip_request *req);
987 static int handle_request_register(struct sip_pvt *p, struct sip_request *req, struct sockaddr_in *sin, char *e);
988 static int handle_request_cancel(struct sip_pvt *p, struct sip_request *req);
989 static int handle_request_message(struct sip_pvt *p, struct sip_request *req);
990 static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req, struct sockaddr_in *sin, int seqno, char *e);
991 static void handle_request_info(struct sip_pvt *p, struct sip_request *req);
992 static int handle_request_options(struct sip_pvt *p, struct sip_request *req);
994 /*----- RTP interface functions */
995 static int sip_set_rtp_peer(struct ast_channel *chan, struct ast_rtp *rtp, struct ast_rtp *vrtp, int codecs, int nat_active);
996 static struct ast_rtp *sip_get_rtp_peer(struct ast_channel *chan);
997 static struct ast_rtp *sip_get_vrtp_peer(struct ast_channel *chan);
998 static int sip_get_codec(struct ast_channel *chan);
1000 /*! \brief Definition of this channel for PBX channel registration */
1001 static const struct ast_channel_tech sip_tech = {
1003 .description = "Session Initiation Protocol (SIP)",
1004 .capabilities = ((AST_FORMAT_MAX_AUDIO << 1) - 1),
1005 .properties = AST_CHAN_TP_WANTSJITTER,
1006 .requester = sip_request_call,
1007 .devicestate = sip_devicestate,
1009 .hangup = sip_hangup,
1010 .answer = sip_answer,
1013 .write_video = sip_write,
1014 .indicate = sip_indicate,
1015 .transfer = sip_transfer,
1017 .send_digit = sip_senddigit,
1018 .bridge = ast_rtp_bridge,
1019 .send_text = sip_sendtext,
1022 /*! \brief Interface structure with callbacks used to connect to RTP module */
1023 static struct ast_rtp_protocol sip_rtp = {
1025 get_rtp_info: sip_get_rtp_peer,
1026 get_vrtp_info: sip_get_vrtp_peer,
1027 set_rtp_peer: sip_set_rtp_peer,
1028 get_codec: sip_get_codec,
1032 /*! \brief returns true if 'name' (with optional trailing whitespace)
1033 * matches the sip method 'id'.
1034 * Strictly speaking, SIP methods are case SENSITIVE, but we do
1035 * a case-insensitive comparison to be more tolerant.
1036 * following Jon Postel's rule: Be gentle in what you accept, strict with what you send
1038 static int method_match(enum sipmethod id, const char *name)
1040 int len = strlen(sip_methods[id].text);
1041 int l_name = name ? strlen(name) : 0;
1042 /* true if the string is long enough, and ends with whitespace, and matches */
1043 return (l_name >= len && name[len] < 33 &&
1044 !strncasecmp(sip_methods[id].text, name, len));
1047 /*! \brief find_sip_method: Find SIP method from header */
1048 static int find_sip_method(const char *msg)
1052 if (ast_strlen_zero(msg))
1054 for (i = 1; i < (sizeof(sip_methods) / sizeof(sip_methods[0])) && !res; i++) {
1055 if (method_match(i, msg))
1056 res = sip_methods[i].id;
1061 /*! \brief Parse supported header in incoming packet */
1062 static unsigned int parse_sip_options(struct sip_pvt *pvt, const char *supported)
1065 char *temp = ast_strdupa(supported);
1066 unsigned int profile = 0;
1069 if (!pvt || ast_strlen_zero(supported) )
1072 if (option_debug > 2 && sipdebug)
1073 ast_log(LOG_DEBUG, "Begin: parsing SIP \"Supported: %s\"\n", supported);
1075 for (next = temp; next; next = sep) {
1077 if ( (sep = strchr(next, ',')) != NULL)
1079 next = ast_skip_blanks(next);
1080 if (option_debug > 2 && sipdebug)
1081 ast_log(LOG_DEBUG, "Found SIP option: -%s-\n", next);
1082 for (i=0; i < (sizeof(sip_options) / sizeof(sip_options[0])); i++) {
1083 if (!strcasecmp(next, sip_options[i].text)) {
1084 profile |= sip_options[i].id;
1086 if (option_debug > 2 && sipdebug)
1087 ast_log(LOG_DEBUG, "Matched SIP option: %s\n", next);
1091 if (!found && option_debug > 2 && sipdebug)
1092 ast_log(LOG_DEBUG, "Found no match for SIP option: %s (Please file bug report!)\n", next);
1095 pvt->sipoptions = profile;
1099 /*! \brief See if we pass debug IP filter */
1100 static inline int sip_debug_test_addr(const struct sockaddr_in *addr)
1104 if (debugaddr.sin_addr.s_addr) {
1105 if (((ntohs(debugaddr.sin_port) != 0)
1106 && (debugaddr.sin_port != addr->sin_port))
1107 || (debugaddr.sin_addr.s_addr != addr->sin_addr.s_addr))
1113 /* The real destination address for a write */
1114 static const struct sockaddr_in *sip_real_dst(const struct sip_pvt *p)
1116 return ast_test_flag(&p->flags[0], SIP_NAT) & SIP_NAT_ROUTE ? &p->recv : &p->sa;
1119 static const char *sip_nat_mode(const struct sip_pvt *p)
1121 return ast_test_flag(&p->flags[0], SIP_NAT) & SIP_NAT_ROUTE ? "NAT" : "no NAT";
1124 /*! \brief Test PVT for debugging output */
1125 static inline int sip_debug_test_pvt(struct sip_pvt *p)
1129 return sip_debug_test_addr(sip_real_dst(p));
1132 /*! \brief Transmit SIP message */
1133 static int __sip_xmit(struct sip_pvt *p, char *data, int len)
1136 char iabuf[INET_ADDRSTRLEN];
1137 const struct sockaddr_in *dst = sip_real_dst(p);
1138 res=sendto(sipsock, data, len, 0, (const struct sockaddr *)dst, sizeof(struct sockaddr_in));
1141 ast_log(LOG_WARNING, "sip_xmit of %p (len %d) to %s:%d returned %d: %s\n", data, len, ast_inet_ntoa(iabuf, sizeof(iabuf), dst->sin_addr), ntohs(dst->sin_port), res, strerror(errno));
1146 /*! \brief Build a Via header for a request */
1147 static void build_via(struct sip_pvt *p)
1149 char iabuf[INET_ADDRSTRLEN];
1150 /* Work around buggy UNIDEN UIP200 firmware */
1151 const char *rport = ast_test_flag(&p->flags[0], SIP_NAT) & SIP_NAT_RFC3581 ? ";rport" : "";
1153 /* z9hG4bK is a magic cookie. See RFC 3261 section 8.1.1.7 */
1154 ast_string_field_build(p, via, "SIP/2.0/UDP %s:%d;branch=z9hG4bK%08x%s",
1155 ast_inet_ntoa(iabuf, sizeof(iabuf), p->ourip), ourport, p->branch, rport);
1158 /*! \brief NAT fix - decide which IP address to use for ASterisk server?
1159 * Only used for outbound registrations */
1160 static int ast_sip_ouraddrfor(struct in_addr *them, struct in_addr *us)
1163 * Using the localaddr structure built up with localnet statements
1164 * apply it to their address to see if we need to substitute our
1165 * externip or can get away with our internal bindaddr
1167 struct sockaddr_in theirs;
1168 theirs.sin_addr = *them;
1170 if (localaddr && externip.sin_addr.s_addr &&
1171 ast_apply_ha(localaddr, &theirs)) {
1172 if (externexpire && time(NULL) >= externexpire) {
1173 struct ast_hostent ahp;
1176 time(&externexpire);
1177 externexpire += externrefresh;
1178 if ((hp = ast_gethostbyname(externhost, &ahp))) {
1179 memcpy(&externip.sin_addr, hp->h_addr, sizeof(externip.sin_addr));
1181 ast_log(LOG_NOTICE, "Warning: Re-lookup of '%s' failed!\n", externhost);
1183 *us = externip.sin_addr;
1185 char iabuf[INET_ADDRSTRLEN];
1186 ast_inet_ntoa(iabuf, sizeof(iabuf), *(struct in_addr *)&them->s_addr);
1188 ast_log(LOG_DEBUG, "Target address %s is not local, substituting externip\n", iabuf);
1190 } else if (bindaddr.sin_addr.s_addr)
1191 *us = bindaddr.sin_addr;
1193 return ast_ouraddrfor(them, us);
1197 /*! \brief Append to SIP dialog history
1198 \return Always returns 0 */
1199 #define append_history(p, event, fmt , args... ) append_history_full(p, "%-15s " fmt, event, ## args)
1201 static int append_history_full(struct sip_pvt *p, const char *fmt, ...)
1202 __attribute__ ((format (printf, 2, 3)));
1204 /*! \brief Append to SIP dialog history with arg list */
1205 static void append_history_va(struct sip_pvt *p, const char *fmt, va_list ap)
1207 char buf[80], *c = buf; /* max history length */
1208 struct sip_history *hist;
1211 vsnprintf(buf, sizeof(buf), fmt, ap);
1212 strsep(&c, "\r\n"); /* Trim up everything after \r or \n */
1213 l = strlen(buf) + 1;
1214 if (!(hist = ast_calloc(1, sizeof(*hist) + l)))
1216 if (!p->history && !(p->history = ast_calloc(1, sizeof(*p->history)))) {
1220 memcpy(hist->event, buf, l);
1221 AST_LIST_INSERT_TAIL(p->history, hist, list);
1224 /*! \brief Append to SIP dialog history with arg list */
1225 static int append_history_full(struct sip_pvt *p, const char *fmt, ...)
1229 if (!recordhistory || !p)
1232 append_history_va(p, fmt, ap);
1238 /*! \brief Retransmit SIP message if no answer */
1239 static int retrans_pkt(void *data)
1241 struct sip_pkt *pkt=data, *prev, *cur = NULL;
1242 char iabuf[INET_ADDRSTRLEN];
1243 int reschedule = DEFAULT_RETRANS;
1246 ast_mutex_lock(&pkt->owner->lock);
1248 if (pkt->retrans < MAX_RETRANS) {
1250 if (!pkt->timer_t1) { /* Re-schedule using timer_a and timer_t1 */
1251 if (sipdebug && option_debug > 3)
1252 ast_log(LOG_DEBUG, "SIP TIMER: Not rescheduling id #%d:%s (Method %d) (No timer T1)\n", pkt->retransid, sip_methods[pkt->method].text, pkt->method);
1256 if (sipdebug && option_debug > 3)
1257 ast_log(LOG_DEBUG, "SIP TIMER: Rescheduling retransmission #%d (%d) %s - %d\n", pkt->retransid, pkt->retrans, sip_methods[pkt->method].text, pkt->method);
1261 pkt->timer_a = 2 * pkt->timer_a;
1263 /* For non-invites, a maximum of 4 secs */
1264 siptimer_a = pkt->timer_t1 * pkt->timer_a; /* Double each time */
1265 if (pkt->method != SIP_INVITE && siptimer_a > 4000)
1268 /* Reschedule re-transmit */
1269 reschedule = siptimer_a;
1270 if (option_debug > 3)
1271 ast_log(LOG_DEBUG, "** SIP timers: Rescheduling retransmission %d to %d ms (t1 %d ms (Retrans id #%d)) \n", pkt->retrans +1, siptimer_a, pkt->timer_t1, pkt->retransid);
1274 if (pkt->owner && sip_debug_test_pvt(pkt->owner)) {
1275 if (ast_test_flag(&pkt->owner->flags[0], SIP_NAT_ROUTE))
1276 ast_verbose("Retransmitting #%d (NAT) to %s:%d:\n%s\n---\n", pkt->retrans, ast_inet_ntoa(iabuf, sizeof(iabuf), pkt->owner->recv.sin_addr), ntohs(pkt->owner->recv.sin_port), pkt->data);
1278 ast_verbose("Retransmitting #%d (no NAT) to %s:%d:\n%s\n---\n", pkt->retrans, ast_inet_ntoa(iabuf, sizeof(iabuf), pkt->owner->sa.sin_addr), ntohs(pkt->owner->sa.sin_port), pkt->data);
1281 append_history(pkt->owner, "ReTx", "%d %s", reschedule, pkt->data);
1282 __sip_xmit(pkt->owner, pkt->data, pkt->packetlen);
1283 ast_mutex_unlock(&pkt->owner->lock);
1286 /* Too many retries */
1287 if (pkt->owner && pkt->method != SIP_OPTIONS) {
1288 if (ast_test_flag(pkt, FLAG_FATAL) || sipdebug) /* Tell us if it's critical or if we're debugging */
1289 ast_log(LOG_WARNING, "Maximum retries exceeded on transmission %s for seqno %d (%s %s)\n", pkt->owner->callid, pkt->seqno, (ast_test_flag(pkt, FLAG_FATAL)) ? "Critical" : "Non-critical", (ast_test_flag(pkt, FLAG_RESPONSE)) ? "Response" : "Request");
1291 if ((pkt->method == SIP_OPTIONS) && sipdebug)
1292 ast_log(LOG_WARNING, "Cancelling retransmit of OPTIONs (call id %s) \n", pkt->owner->callid);
1294 append_history(pkt->owner, "MaxRetries", "%s", (ast_test_flag(pkt, FLAG_FATAL)) ? "(Critical)" : "(Non-critical)");
1296 pkt->retransid = -1;
1298 if (ast_test_flag(pkt, FLAG_FATAL)) {
1299 while(pkt->owner->owner && ast_mutex_trylock(&pkt->owner->owner->lock)) {
1300 ast_mutex_unlock(&pkt->owner->lock);
1302 ast_mutex_lock(&pkt->owner->lock);
1304 if (pkt->owner->owner) {
1305 ast_set_flag(&pkt->owner->flags[0], SIP_ALREADYGONE);
1306 ast_log(LOG_WARNING, "Hanging up call %s - no reply to our critical packet.\n", pkt->owner->callid);
1307 ast_queue_hangup(pkt->owner->owner);
1308 ast_mutex_unlock(&pkt->owner->owner->lock);
1310 /* If no channel owner, destroy now */
1311 ast_set_flag(&pkt->owner->flags[0], SIP_NEEDDESTROY);
1314 /* In any case, go ahead and remove the packet */
1315 for (prev = NULL, cur = pkt->owner->packets; cur; prev = cur, cur = cur->next) {
1321 prev->next = cur->next;
1323 pkt->owner->packets = cur->next;
1324 ast_mutex_unlock(&pkt->owner->lock);
1328 ast_log(LOG_WARNING, "Weird, couldn't find packet owner!\n");
1330 ast_mutex_unlock(&pkt->owner->lock);
1334 /*! \brief Transmit packet with retransmits
1335 \return 0 on success, -1 on failure to allocate packet
1337 static int __sip_reliable_xmit(struct sip_pvt *p, int seqno, int resp, char *data, int len, int fatal, int sipmethod)
1339 struct sip_pkt *pkt;
1340 int siptimer_a = DEFAULT_RETRANS;
1342 if (!(pkt = ast_calloc(1, sizeof(*pkt) + len + 1)))
1344 memcpy(pkt->data, data, len);
1345 pkt->method = sipmethod;
1346 pkt->packetlen = len;
1347 pkt->next = p->packets;
1351 pkt->data[len] = '\0';
1352 pkt->timer_t1 = p->timer_t1; /* Set SIP timer T1 */
1354 ast_set_flag(pkt, FLAG_FATAL);
1356 siptimer_a = pkt->timer_t1 * 2;
1358 /* Schedule retransmission */
1359 pkt->retransid = ast_sched_add_variable(sched, siptimer_a, retrans_pkt, pkt, 1);
1360 if (option_debug > 3 && sipdebug)
1361 ast_log(LOG_DEBUG, "*** SIP TIMER: Initalizing retransmit timer on packet: Id #%d\n", pkt->retransid);
1362 pkt->next = p->packets;
1365 __sip_xmit(pkt->owner, pkt->data, pkt->packetlen); /* Send packet */
1366 if (sipmethod == SIP_INVITE) {
1367 /* Note this is a pending invite */
1368 p->pendinginvite = seqno;
1373 /*! \brief Kill a SIP dialog (called by scheduler) */
1374 static int __sip_autodestruct(void *data)
1376 struct sip_pvt *p = data;
1378 /* If this is a subscription, tell the phone that we got a timeout */
1379 if (p->subscribed) {
1380 p->subscribed = TIMEOUT;
1381 transmit_state_notify(p, AST_EXTENSION_DEACTIVATED, 1); /* Send last notification */
1382 p->subscribed = NONE;
1383 append_history(p, "Subscribestatus", "timeout");
1384 if (option_debug > 2)
1385 ast_log(LOG_DEBUG, "Re-scheduled destruction of SIP subsription %s\n", p->callid ? p->callid : "<unknown>");
1386 return 10000; /* Reschedule this destruction so that we know that it's gone */
1389 /* Reset schedule ID */
1393 ast_log(LOG_DEBUG, "Auto destroying call '%s'\n", p->callid);
1394 append_history(p, "AutoDestroy", "");
1396 ast_log(LOG_WARNING, "Autodestruct on dialog '%s' with owner in place (Method: %s)\n", p->callid, sip_methods[p->method].text);
1397 ast_queue_hangup(p->owner);
1404 /*! \brief Schedule destruction of SIP call */
1405 static int sip_scheddestroy(struct sip_pvt *p, int ms)
1407 if (sip_debug_test_pvt(p))
1408 ast_verbose("Scheduling destruction of SIP dialog '%s' in %d ms (Method: %s)\n", p->callid, ms, sip_methods[p->method].text);
1410 append_history(p, "SchedDestroy", "%d ms", ms);
1412 if (p->autokillid > -1)
1413 ast_sched_del(sched, p->autokillid);
1414 p->autokillid = ast_sched_add(sched, ms, __sip_autodestruct, p);
1418 /*! \brief Cancel destruction of SIP dialog */
1419 static int sip_cancel_destroy(struct sip_pvt *p)
1421 if (p->autokillid > -1) {
1422 ast_sched_del(sched, p->autokillid);
1423 append_history(p, "CancelDestroy", "");
1429 /*! \brief Acknowledges receipt of a packet and stops retransmission */
1430 static int __sip_ack(struct sip_pvt *p, int seqno, int resp, int sipmethod, int reset)
1432 struct sip_pkt *cur, *prev = NULL;
1435 /* Just in case... */
1438 msg = sip_methods[sipmethod].text;
1440 ast_mutex_lock(&p->lock);
1441 for (cur = p->packets; cur; prev = cur, cur = cur->next) {
1442 if ((cur->seqno == seqno) && ((ast_test_flag(cur, FLAG_RESPONSE)) == resp) &&
1443 ((ast_test_flag(cur, FLAG_RESPONSE)) ||
1444 (!strncasecmp(msg, cur->data, strlen(msg)) && (cur->data[strlen(msg)] < 33)))) {
1445 if (!resp && (seqno == p->pendinginvite)) {
1446 ast_log(LOG_DEBUG, "Acked pending invite %d\n", p->pendinginvite);
1447 p->pendinginvite = 0;
1449 /* this is our baby */
1451 prev->next = cur->next;
1453 p->packets = cur->next;
1454 if (cur->retransid > -1) {
1455 if (sipdebug && option_debug > 3)
1456 ast_log(LOG_DEBUG, "** SIP TIMER: Cancelling retransmit of packet (reply received) Retransid #%d\n", cur->retransid);
1457 ast_sched_del(sched, cur->retransid);
1465 ast_mutex_unlock(&p->lock);
1467 ast_log(LOG_DEBUG, "Stopping retransmission on '%s' of %s %d: Match %s\n", p->callid, resp ? "Response" : "Request", seqno, res ? "Not Found" : "Found");
1471 /*! \brief Pretend to ack all packets */
1472 static int __sip_pretend_ack(struct sip_pvt *p)
1474 struct sip_pkt *cur = NULL;
1476 while (p->packets) {
1477 if (cur == p->packets) {
1478 ast_log(LOG_WARNING, "Have a packet that doesn't want to give up! %s\n", sip_methods[cur->method].text);
1483 __sip_ack(p, p->packets->seqno, (ast_test_flag(p->packets, FLAG_RESPONSE)), cur->method, FALSE);
1484 else { /* Unknown packet type */
1488 ast_copy_string(method, p->packets->data, sizeof(method));
1489 c = ast_skip_blanks(method); /* XXX what ? */
1491 __sip_ack(p, p->packets->seqno, (ast_test_flag(p->packets, FLAG_RESPONSE)), find_sip_method(method), FALSE);
1497 /*! \brief Acks receipt of packet, keep it around (used for provisional responses) */
1498 static int __sip_semi_ack(struct sip_pvt *p, int seqno, int resp, int sipmethod)
1500 struct sip_pkt *cur;
1503 for (cur = p->packets; cur; cur = cur->next) {
1504 if (cur->seqno == seqno && ast_test_flag(cur, FLAG_RESPONSE) == resp &&
1505 (ast_test_flag(cur, FLAG_RESPONSE) || method_match(sipmethod, cur->data))) {
1506 /* this is our baby */
1507 if (cur->retransid > -1) {
1508 if (option_debug > 3 && sipdebug)
1509 ast_log(LOG_DEBUG, "*** SIP TIMER: Cancelling retransmission #%d - %s (got response)\n", cur->retransid, sip_methods[sipmethod].text);
1510 ast_sched_del(sched, cur->retransid);
1512 cur->retransid = -1;
1518 ast_log(LOG_DEBUG, "(Provisional) Stopping retransmission (but retaining packet) on '%s' %s %d: %s\n", p->callid, resp ? "Response" : "Request", seqno, res ? "Not Found" : "Found");
1523 /*! \brief Copy SIP request, parse it */
1524 static void parse_copy(struct sip_request *dst, struct sip_request *src)
1526 memset(dst, 0, sizeof(*dst));
1527 memcpy(dst->data, src->data, sizeof(dst->data));
1528 dst->len = src->len;
1532 /*! \brief Transmit response on SIP request*/
1533 static int send_response(struct sip_pvt *p, struct sip_request *req, enum xmittype reliable, int seqno)
1537 if (sip_debug_test_pvt(p)) {
1538 char iabuf[INET_ADDRSTRLEN];
1539 if (ast_test_flag(&p->flags[0], SIP_NAT_ROUTE))
1540 ast_verbose("%sTransmitting (NAT) to %s:%d:\n%s\n---\n", reliable ? "Reliably " : "", ast_inet_ntoa(iabuf, sizeof(iabuf), p->recv.sin_addr), ntohs(p->recv.sin_port), req->data);
1542 ast_verbose("%sTransmitting (no NAT) to %s:%d:\n%s\n---\n", reliable ? "Reliably " : "", ast_inet_ntoa(iabuf, sizeof(iabuf), p->sa.sin_addr), ntohs(p->sa.sin_port), req->data);
1544 if (recordhistory) {
1545 struct sip_request tmp;
1546 parse_copy(&tmp, req);
1547 append_history(p, reliable ? "TxRespRel" : "TxResp", "%s / %s - %s", tmp.data, get_header(&tmp, "CSeq"),
1548 tmp.method == SIP_RESPONSE ? tmp.rlPart2 : sip_methods[tmp.method].text);
1551 __sip_reliable_xmit(p, seqno, 1, req->data, req->len, (reliable == XMIT_CRITICAL), req->method) :
1552 __sip_xmit(p, req->data, req->len);
1558 /*! \brief Send SIP Request to the other part of the dialogue */
1559 static int send_request(struct sip_pvt *p, struct sip_request *req, enum xmittype reliable, int seqno)
1563 if (sip_debug_test_pvt(p)) {
1564 char iabuf[INET_ADDRSTRLEN];
1565 if (ast_test_flag(&p->flags[0], SIP_NAT_ROUTE))
1566 ast_verbose("%sTransmitting (NAT) to %s:%d:\n%s\n---\n", reliable ? "Reliably " : "", ast_inet_ntoa(iabuf, sizeof(iabuf), p->recv.sin_addr), ntohs(p->recv.sin_port), req->data);
1568 ast_verbose("%sTransmitting (no NAT) to %s:%d:\n%s\n---\n", reliable ? "Reliably " : "", ast_inet_ntoa(iabuf, sizeof(iabuf), p->sa.sin_addr), ntohs(p->sa.sin_port), req->data);
1570 if (recordhistory) {
1571 struct sip_request tmp;
1572 parse_copy(&tmp, req);
1573 append_history(p, reliable ? "TxReqRel" : "TxReq", "%s / %s - %s", tmp.data, get_header(&tmp, "CSeq"), sip_methods[tmp.method].text);
1576 __sip_reliable_xmit(p, seqno, 0, req->data, req->len, (reliable > 1), req->method) :
1577 __sip_xmit(p, req->data, req->len);
1581 /*! \brief Pick out text in brackets from character string
1582 \return pointer to terminated stripped string
1583 \param tmp input string that will be modified */
1584 static char *get_in_brackets(char *tmp)
1588 char *first_bracket;
1589 char *second_bracket;
1594 first_quote = strchr(parse, '"');
1595 first_bracket = strchr(parse, '<');
1596 if (first_quote && first_bracket && (first_quote < first_bracket)) {
1598 for (parse = first_quote + 1; *parse; parse++) {
1599 if ((*parse == '"') && (last_char != '\\'))
1604 ast_log(LOG_WARNING, "No closing quote found in '%s'\n", tmp);
1610 if (first_bracket) {
1611 second_bracket = strchr(first_bracket + 1, '>');
1612 if (second_bracket) {
1613 *second_bracket = '\0';
1614 return first_bracket + 1;
1616 ast_log(LOG_WARNING, "No closing bracket found in '%s'\n", tmp);
1624 /*! \brief Send SIP MESSAGE text within a call
1625 Called from PBX core sendtext() application */
1626 static int sip_sendtext(struct ast_channel *ast, const char *text)
1628 struct sip_pvt *p = ast->tech_pvt;
1629 int debug = sip_debug_test_pvt(p);
1632 ast_verbose("Sending text %s on %s\n", text, ast->name);
1635 if (ast_strlen_zero(text))
1638 ast_verbose("Really sending text %s on %s\n", text, ast->name);
1639 transmit_message_with_text(p, text);
1643 /*! \brief Update peer object in realtime storage */
1644 static void realtime_update_peer(const char *peername, struct sockaddr_in *sin, const char *username, const char *fullcontact, int expirey)
1648 char regseconds[20];
1650 const char *fc = fullcontact ? "fullcontact" : NULL;
1654 snprintf(regseconds, sizeof(regseconds), "%d", (int)nowtime); /* Expiration time */
1655 ast_inet_ntoa(ipaddr, sizeof(ipaddr), sin->sin_addr);
1656 snprintf(port, sizeof(port), "%d", ntohs(sin->sin_port));
1658 ast_update_realtime("sippeers", "name", peername, "ipaddr", ipaddr,
1659 "port", port, "regseconds", regseconds,
1660 "username", username, fc, fullcontact, NULL); /* note fc _can_ be NULL */
1663 /*! \brief Automatically add peer extension to dial plan */
1664 static void register_peer_exten(struct sip_peer *peer, int onoff)
1667 char *stringp, *ext;
1668 if (!ast_strlen_zero(global_regcontext)) {
1670 ast_copy_string(multi, S_OR(peer->regexten, peer->name), sizeof(multi));
1672 while((ext = strsep(&stringp, "&"))) {
1674 ast_add_extension(global_regcontext, 1, ext, 1, NULL, NULL, "Noop",
1675 ast_strdup(peer->name), free, "SIP");
1677 ast_context_remove_extension(global_regcontext, ext, 1, NULL);
1682 /*! \brief Destroy peer object from memory */
1683 static void sip_destroy_peer(struct sip_peer *peer)
1685 if (option_debug > 2)
1686 ast_log(LOG_DEBUG, "Destroying SIP peer %s\n", peer->name);
1688 /* Delete it, it needs to disappear */
1690 sip_destroy(peer->call);
1692 if (peer->mwipvt) { /* We have an active subscription, delete it */
1693 sip_destroy(peer->mwipvt);
1696 if (peer->chanvars) {
1697 ast_variables_destroy(peer->chanvars);
1698 peer->chanvars = NULL;
1700 if (peer->expire > -1)
1701 ast_sched_del(sched, peer->expire);
1702 if (peer->pokeexpire > -1)
1703 ast_sched_del(sched, peer->pokeexpire);
1704 register_peer_exten(peer, FALSE);
1705 ast_free_ha(peer->ha);
1706 if (ast_test_flag(&peer->flags[1], SIP_PAGE2_SELFDESTRUCT))
1708 else if (ast_test_flag(&peer->flags[0], SIP_REALTIME))
1712 clear_realm_authentication(peer->auth);
1715 ast_dnsmgr_release(peer->dnsmgr);
1719 /*! \brief Update peer data in database (if used) */
1720 static void update_peer(struct sip_peer *p, int expiry)
1722 int rtcachefriends = ast_test_flag(&p->flags[1], SIP_PAGE2_RTCACHEFRIENDS);
1723 if (ast_test_flag(&global_flags[1], SIP_PAGE2_RTUPDATE) &&
1724 (ast_test_flag(&p->flags[0], SIP_REALTIME) || rtcachefriends)) {
1725 realtime_update_peer(p->name, &p->addr, p->username, rtcachefriends ? p->fullcontact : NULL, expiry);
1730 /*! \brief realtime_peer: Get peer from realtime storage
1731 * Checks the "sippeers" realtime family from extconfig.conf
1732 * \todo Consider adding check of port address when matching here to follow the same
1733 * algorithm as for static peers. Will we break anything by adding that?
1735 static struct sip_peer *realtime_peer(const char *peername, struct sockaddr_in *sin)
1737 struct sip_peer *peer = NULL;
1738 struct ast_variable *var;
1739 struct ast_variable *tmp;
1740 char *newpeername = (char *) peername;
1743 /* First check on peer name */
1745 var = ast_load_realtime("sippeers", "name", peername, NULL);
1746 else if (sin) { /* Then check on IP address for dynamic peers */
1747 ast_inet_ntoa(iabuf, sizeof(iabuf), sin->sin_addr);
1748 var = ast_load_realtime("sippeers", "host", iabuf, NULL); /* First check for fixed IP hosts */
1750 var = ast_load_realtime("sippeers", "ipaddr", iabuf, NULL); /* Then check for registred hosts */
1758 for (tmp = var; tmp; tmp = tmp->next) {
1759 /* If this is type=user, then skip this object. */
1760 if (!strcasecmp(tmp->name, "type") &&
1761 !strcasecmp(tmp->value, "user")) {
1762 ast_variables_destroy(var);
1764 } else if (!newpeername && !strcasecmp(tmp->name, "name")) {
1765 newpeername = tmp->value;
1769 if (!newpeername) { /* Did not find peer in realtime */
1770 ast_log(LOG_WARNING, "Cannot Determine peer name ip=%s\n", iabuf);
1771 ast_variables_destroy(var);
1775 /* Peer found in realtime, now build it in memory */
1776 peer = build_peer(newpeername, var, !ast_test_flag(&global_flags[1], SIP_PAGE2_RTCACHEFRIENDS));
1778 ast_variables_destroy(var);
1782 if (ast_test_flag(&global_flags[1], SIP_PAGE2_RTCACHEFRIENDS)) {
1784 ast_copy_flags(&peer->flags[1],&global_flags[1], SIP_PAGE2_RTAUTOCLEAR|SIP_PAGE2_RTCACHEFRIENDS);
1785 if (ast_test_flag(&global_flags[1], SIP_PAGE2_RTAUTOCLEAR)) {
1786 if (peer->expire > -1) {
1787 ast_sched_del(sched, peer->expire);
1789 peer->expire = ast_sched_add(sched, (global_rtautoclear) * 1000, expire_register, (void *)peer);
1791 ASTOBJ_CONTAINER_LINK(&peerl,peer);
1793 ast_set_flag(&peer->flags[0], SIP_REALTIME);
1795 ast_variables_destroy(var);
1800 /*! \brief Support routine for find_peer */
1801 static int sip_addrcmp(char *name, struct sockaddr_in *sin)
1803 /* We know name is the first field, so we can cast */
1804 struct sip_peer *p = (struct sip_peer *) name;
1805 return !(!inaddrcmp(&p->addr, sin) ||
1806 (ast_test_flag(&p->flags[0], SIP_INSECURE_PORT) &&
1807 (p->addr.sin_addr.s_addr == sin->sin_addr.s_addr)));
1810 /*! \brief Locate peer by name or ip address
1811 * This is used on incoming SIP message to find matching peer on ip
1812 or outgoing message to find matching peer on name */
1813 static struct sip_peer *find_peer(const char *peer, struct sockaddr_in *sin, int realtime)
1815 struct sip_peer *p = NULL;
1818 p = ASTOBJ_CONTAINER_FIND(&peerl, peer);
1820 p = ASTOBJ_CONTAINER_FIND_FULL(&peerl, sin, name, sip_addr_hashfunc, 1, sip_addrcmp);
1822 if (!p && realtime) {
1823 p = realtime_peer(peer, sin);
1828 /*! \brief Remove user object from in-memory storage */
1829 static void sip_destroy_user(struct sip_user *user)
1831 if (option_debug > 2)
1832 ast_log(LOG_DEBUG, "Destroying user object from memory: %s\n", user->name);
1833 ast_free_ha(user->ha);
1834 if (user->chanvars) {
1835 ast_variables_destroy(user->chanvars);
1836 user->chanvars = NULL;
1838 if (ast_test_flag(&user->flags[0], SIP_REALTIME))
1845 /*! \brief Load user from realtime storage
1846 * Loads user from "sipusers" category in realtime (extconfig.conf)
1847 * Users are matched on From: user name (the domain in skipped) */
1848 static struct sip_user *realtime_user(const char *username)
1850 struct ast_variable *var;
1851 struct ast_variable *tmp;
1852 struct sip_user *user = NULL;
1854 var = ast_load_realtime("sipusers", "name", username, NULL);
1859 for (tmp = var; tmp; tmp = tmp->next) {
1860 if (!strcasecmp(tmp->name, "type") &&
1861 !strcasecmp(tmp->value, "peer")) {
1862 ast_variables_destroy(var);
1867 user = build_user(username, var, !ast_test_flag(&global_flags[1], SIP_PAGE2_RTCACHEFRIENDS));
1869 if (!user) { /* No user found */
1870 ast_variables_destroy(var);
1874 if (ast_test_flag(&global_flags[1], SIP_PAGE2_RTCACHEFRIENDS)) {
1875 ast_set_flag(&user->flags[1], SIP_PAGE2_RTCACHEFRIENDS);
1877 ASTOBJ_CONTAINER_LINK(&userl,user);
1879 /* Move counter from s to r... */
1882 ast_set_flag(&user->flags[0], SIP_REALTIME);
1884 ast_variables_destroy(var);
1888 /*! \brief Locate user by name
1889 * Locates user by name (From: sip uri user name part) first
1890 * from in-memory list (static configuration) then from
1891 * realtime storage (defined in extconfig.conf) */
1892 static struct sip_user *find_user(const char *name, int realtime)
1894 struct sip_user *u = ASTOBJ_CONTAINER_FIND(&userl, name);
1896 u = realtime_user(name);
1900 /*! \brief Create address structure from peer reference */
1901 static int create_addr_from_peer(struct sip_pvt *r, struct sip_peer *peer)
1905 if ((peer->addr.sin_addr.s_addr || peer->defaddr.sin_addr.s_addr) &&
1906 (!peer->maxms || ((peer->lastms >= 0) && (peer->lastms <= peer->maxms)))) {
1907 r->sa = (peer->addr.sin_addr.s_addr) ? peer->addr : peer->defaddr;
1913 ast_copy_flags(&r->flags[0], &peer->flags[0], SIP_FLAGS_TO_COPY);
1914 ast_copy_flags(&r->flags[1], &peer->flags[1], SIP_PAGE2_FLAGS_TO_COPY);
1915 r->capability = peer->capability;
1916 if (!ast_test_flag(&r->flags[1], SIP_PAGE2_VIDEOSUPPORT) && r->vrtp) {
1917 ast_rtp_destroy(r->vrtp);
1920 r->prefs = peer->prefs;
1921 natflags = ast_test_flag(&r->flags[0], SIP_NAT) & SIP_NAT_ROUTE;
1924 ast_log(LOG_DEBUG, "Setting NAT on RTP to %d\n", natflags);
1925 ast_rtp_setnat(r->rtp, natflags);
1929 ast_log(LOG_DEBUG, "Setting NAT on VRTP to %d\n", natflags);
1930 ast_rtp_setnat(r->vrtp, natflags);
1932 ast_string_field_set(r, peername, peer->username);
1933 ast_string_field_set(r, authname, peer->username);
1934 ast_string_field_set(r, username, peer->username);
1935 ast_string_field_set(r, peersecret, peer->secret);
1936 ast_string_field_set(r, peermd5secret, peer->md5secret);
1937 ast_string_field_set(r, tohost, peer->tohost);
1938 ast_string_field_set(r, fullcontact, peer->fullcontact);
1939 if (!r->initreq.headers && !ast_strlen_zero(peer->fromdomain)) {
1942 tmpcall = ast_strdupa(r->callid);
1944 c = strchr(tmpcall, '@');
1947 ast_string_field_build(r, callid, "%s@%s", tmpcall, peer->fromdomain);
1951 if (ast_strlen_zero(r->tohost)) {
1952 char iabuf[INET_ADDRSTRLEN];
1954 ast_inet_ntoa(iabuf, sizeof(iabuf), r->sa.sin_addr);
1955 ast_string_field_set(r, tohost, iabuf);
1957 if (!ast_strlen_zero(peer->fromdomain))
1958 ast_string_field_set(r, fromdomain, peer->fromdomain);
1959 if (!ast_strlen_zero(peer->fromuser))
1960 ast_string_field_set(r, fromuser, peer->fromuser);
1961 r->maxtime = peer->maxms;
1962 r->callgroup = peer->callgroup;
1963 r->pickupgroup = peer->pickupgroup;
1964 /* Set timer T1 to RTT for this peer (if known by qualify=) */
1965 /* Minimum is settable or default to 100 ms */
1966 if (peer->maxms && peer->lastms)
1967 r->timer_t1 = peer->lastms < global_t1min ? global_t1min : peer->lastms;
1968 if ((ast_test_flag(&r->flags[0], SIP_DTMF) == SIP_DTMF_RFC2833) ||
1969 (ast_test_flag(&r->flags[0], SIP_DTMF) == SIP_DTMF_AUTO))
1970 r->noncodeccapability |= AST_RTP_DTMF;
1972 r->noncodeccapability &= ~AST_RTP_DTMF;
1973 ast_string_field_set(r, context, peer->context);
1974 r->rtptimeout = peer->rtptimeout;
1975 r->rtpholdtimeout = peer->rtpholdtimeout;
1976 r->rtpkeepalive = peer->rtpkeepalive;
1977 if (peer->call_limit)
1978 ast_set_flag(&r->flags[0], SIP_CALL_LIMIT);
1979 r->maxcallbitrate = peer->maxcallbitrate;
1984 /*! \brief create address structure from peer name
1985 * Or, if peer not found, find it in the global DNS
1986 * returns TRUE (-1) on failure, FALSE on success */
1987 static int create_addr(struct sip_pvt *dialog, const char *opeer)
1990 struct ast_hostent ahp;
1995 char host[MAXHOSTNAMELEN], *hostn;
1998 ast_copy_string(peer, opeer, sizeof(peer));
1999 port = strchr(peer, ':');
2002 dialog->sa.sin_family = AF_INET;
2003 dialog->timer_t1 = 500; /* Default SIP retransmission timer T1 (RFC 3261) */
2004 p = find_peer(peer, NULL, 1);
2008 if (create_addr_from_peer(dialog, p))
2009 ASTOBJ_UNREF(p, sip_destroy_peer);
2016 portno = port ? atoi(port) : DEFAULT_SIP_PORT;
2018 char service[MAXHOSTNAMELEN];
2021 snprintf(service, sizeof(service), "_sip._udp.%s", peer);
2022 ret = ast_get_srv(NULL, host, sizeof(host), &tportno, service);
2028 hp = ast_gethostbyname(hostn, &ahp);
2030 ast_string_field_set(dialog, tohost, peer);
2031 memcpy(&dialog->sa.sin_addr, hp->h_addr, sizeof(dialog->sa.sin_addr));
2032 dialog->sa.sin_port = htons(portno);
2033 dialog->recv = dialog->sa;
2036 ast_log(LOG_WARNING, "No such host: %s\n", peer);
2040 ASTOBJ_UNREF(p, sip_destroy_peer);
2045 /*! \brief Scheduled congestion on a call */
2046 static int auto_congest(void *nothing)
2048 struct sip_pvt *p = nothing;
2050 ast_mutex_lock(&p->lock);
2053 /* XXX fails on possible deadlock */
2054 if (!ast_mutex_trylock(&p->owner->lock)) {
2055 ast_log(LOG_NOTICE, "Auto-congesting %s\n", p->owner->name);
2056 ast_queue_control(p->owner, AST_CONTROL_CONGESTION);
2057 ast_mutex_unlock(&p->owner->lock);
2060 ast_mutex_unlock(&p->lock);
2067 /*! \brief Initiate SIP call from PBX
2068 * used from the dial() application */
2069 static int sip_call(struct ast_channel *ast, char *dest, int timeout)
2073 struct varshead *headp;
2074 struct ast_var_t *current;
2077 if ((ast->_state != AST_STATE_DOWN) && (ast->_state != AST_STATE_RESERVED)) {
2078 ast_log(LOG_WARNING, "sip_call called on %s, neither down nor reserved\n", ast->name);
2082 /* Check whether there is vxml_url, distinctive ring variables */
2083 headp=&ast->varshead;
2084 AST_LIST_TRAVERSE(headp,current,entries) {
2085 /* Check whether there is a VXML_URL variable */
2086 if (!p->options->vxml_url && !strcasecmp(ast_var_name(current), "VXML_URL")) {
2087 p->options->vxml_url = ast_var_value(current);
2088 } else if (!p->options->uri_options && !strcasecmp(ast_var_name(current), "SIP_URI_OPTIONS")) {
2089 p->options->uri_options = ast_var_value(current);
2090 } else if (!p->options->distinctive_ring && !strcasecmp(ast_var_name(current), "ALERT_INFO")) {
2091 /* Check whether there is a ALERT_INFO variable */
2092 p->options->distinctive_ring = ast_var_value(current);
2093 } else if (!p->options->addsipheaders && !strncasecmp(ast_var_name(current), "SIPADDHEADER", strlen("SIPADDHEADER"))) {
2094 /* Check whether there is a variable with a name starting with SIPADDHEADER */
2095 p->options->addsipheaders = 1;
2100 ast_set_flag(&p->flags[0], SIP_OUTGOING);
2102 ast_log(LOG_DEBUG, "Outgoing Call for %s\n", p->username);
2103 res = update_call_counter(p, INC_CALL_LIMIT);
2105 p->callingpres = ast->cid.cid_pres;
2106 p->jointcapability = p->capability;
2107 transmit_invite(p, SIP_INVITE, 1, 2);
2109 /* Initialize auto-congest time */
2110 p->initid = ast_sched_add(sched, p->maxtime * 4, auto_congest, p);
2116 /*! \brief Destroy registry object
2117 Objects created with the register= statement in static configuration */
2118 static void sip_registry_destroy(struct sip_registry *reg)
2121 if (option_debug > 2)
2122 ast_log(LOG_DEBUG, "Destroying registry entry for %s@%s\n", reg->username, reg->hostname);
2125 /* Clear registry before destroying to ensure
2126 we don't get reentered trying to grab the registry lock */
2127 reg->call->registry = NULL;
2128 if (option_debug > 2)
2129 ast_log(LOG_DEBUG, "Destroying active SIP dialog for registry %s@%s\n", reg->username, reg->hostname);
2130 sip_destroy(reg->call);
2132 if (reg->expire > -1)
2133 ast_sched_del(sched, reg->expire);
2134 if (reg->timeout > -1)
2135 ast_sched_del(sched, reg->timeout);
2136 ast_string_field_free_all(reg);
2142 /*! \brief Execute destrucion of SIP dialog structure, release memory */
2143 static void __sip_destroy(struct sip_pvt *p, int lockowner)
2145 struct sip_pvt *cur, *prev = NULL;
2148 if (sip_debug_test_pvt(p) || option_debug > 2)
2149 ast_verbose("Really destroying SIP dialog '%s' Method: %s\n", p->callid, sip_methods[p->method].text);
2151 /* Remove link from peer to subscription of MWI */
2152 if (p->relatedpeer && p->relatedpeer->mwipvt)
2153 p->relatedpeer->mwipvt = NULL;
2156 sip_dump_history(p);
2161 if (p->stateid > -1)
2162 ast_extension_state_del(p->stateid, NULL);
2164 ast_sched_del(sched, p->initid);
2165 if (p->autokillid > -1)
2166 ast_sched_del(sched, p->autokillid);
2169 ast_rtp_destroy(p->rtp);
2171 ast_rtp_destroy(p->vrtp);
2173 free_old_route(p->route);
2177 if (p->registry->call == p)
2178 p->registry->call = NULL;
2179 ASTOBJ_UNREF(p->registry, sip_registry_destroy);
2182 /* Unlink us from the owner if we have one */
2185 ast_mutex_lock(&p->owner->lock);
2187 ast_log(LOG_DEBUG, "Detaching from %s\n", p->owner->name);
2188 p->owner->tech_pvt = NULL;
2190 ast_mutex_unlock(&p->owner->lock);
2194 struct sip_history *hist;
2195 while( (hist = AST_LIST_REMOVE_HEAD(p->history, list)) )
2201 for (prev = NULL, cur = iflist; cur; prev = cur, cur = cur->next) {
2204 prev->next = cur->next;
2211 ast_log(LOG_WARNING, "Trying to destroy \"%s\", not found in dialog list?!?! \n", p->callid);
2215 ast_sched_del(sched, p->initid);
2217 /* remove all current packets in this dialog */
2218 while((cp = p->packets)) {
2219 p->packets = p->packets->next;
2220 if (cp->retransid > -1)
2221 ast_sched_del(sched, cp->retransid);
2225 ast_variables_destroy(p->chanvars);
2228 ast_mutex_destroy(&p->lock);
2230 ast_string_field_free_all(p);
2235 /*! \brief update_call_counter: Handle call_limit for SIP users
2236 * Setting a call-limit will cause calls above the limit not to be accepted.
2238 * Remember that for a type=friend, there's one limit for the user and
2239 * another for the peer, not a combined call limit.
2240 * This will cause unexpected behaviour in subscriptions, since a "friend"
2241 * is *two* devices in Asterisk, not one.
2243 * Thought: For realtime, we should propably update storage with inuse counter...
2245 * \return 0 if call is ok (no call limit, below treshold)
2246 * -1 on rejection of call
2249 static int update_call_counter(struct sip_pvt *fup, int event)
2252 int *inuse, *call_limit;
2253 int outgoing = ast_test_flag(&fup->flags[0], SIP_OUTGOING);
2254 struct sip_user *u = NULL;
2255 struct sip_peer *p = NULL;
2257 if (option_debug > 2)
2258 ast_log(LOG_DEBUG, "Updating call counter for %s call\n", outgoing ? "outgoing" : "incoming");
2259 /* Test if we need to check call limits, in order to avoid
2260 realtime lookups if we do not need it */
2261 if (!ast_test_flag(&fup->flags[0], SIP_CALL_LIMIT))
2264 ast_copy_string(name, fup->username, sizeof(name));
2266 /* Check the list of users */
2267 if (!outgoing) /* Only check users for incoming calls */
2268 u = find_user(name, 1);
2272 call_limit = &u->call_limit;
2275 /* Try to find peer */
2277 p = find_peer(fup->peername, NULL, 1);
2280 call_limit = &p->call_limit;
2281 ast_copy_string(name, fup->peername, sizeof(name));
2283 if (option_debug > 1)
2284 ast_log(LOG_DEBUG, "%s is not a local user, no call limit\n", name);
2289 /* incoming and outgoing affects the inUse counter */
2290 case DEC_CALL_LIMIT:
2292 if (ast_test_flag(&fup->flags[0], SIP_INC_COUNT))
2297 if (option_debug > 1 || sipdebug) {
2298 ast_log(LOG_DEBUG, "Call %s %s '%s' removed from call limit %d\n", outgoing ? "to" : "from", u ? "user":"peer", name, *call_limit);
2301 case INC_CALL_LIMIT:
2302 if (*call_limit > 0 ) {
2303 if (*inuse >= *call_limit) {
2304 ast_log(LOG_ERROR, "Call %s %s '%s' rejected due to usage limit of %d\n", outgoing ? "to" : "from", u ? "user":"peer", name, *call_limit);
2306 ASTOBJ_UNREF(u, sip_destroy_user);
2308 ASTOBJ_UNREF(p, sip_destroy_peer);
2313 ast_set_flag(&fup->flags[0], SIP_INC_COUNT);
2314 if (option_debug > 1 || sipdebug) {
2315 ast_log(LOG_DEBUG, "Call %s %s '%s' is %d out of %d\n", outgoing ? "to" : "from", u ? "user":"peer", name, *inuse, *call_limit);
2319 ast_log(LOG_ERROR, "update_call_counter(%s, %d) called with no event!\n", name, event);
2322 ASTOBJ_UNREF(u, sip_destroy_user);
2324 ASTOBJ_UNREF(p, sip_destroy_peer);
2328 /*! \brief Destroy SIP call structure */
2329 static void sip_destroy(struct sip_pvt *p)
2331 ast_mutex_lock(&iflock);
2332 if (option_debug > 2)
2333 ast_log(LOG_DEBUG, "Destroying SIP dialog %s\n", p->callid);
2334 __sip_destroy(p, 1);
2335 ast_mutex_unlock(&iflock);
2338 /*! \brief Convert SIP hangup causes to Asterisk hangup causes */
2339 static int hangup_sip2cause(int cause)
2341 /* Possible values taken from causes.h */
2344 case 401: /* Unauthorized */
2345 return AST_CAUSE_CALL_REJECTED;
2346 case 403: /* Not found */
2347 return AST_CAUSE_CALL_REJECTED;
2348 case 404: /* Not found */
2349 return AST_CAUSE_UNALLOCATED;
2350 case 405: /* Method not allowed */
2351 return AST_CAUSE_INTERWORKING;
2352 case 407: /* Proxy authentication required */
2353 return AST_CAUSE_CALL_REJECTED;
2354 case 408: /* No reaction */
2355 return AST_CAUSE_NO_USER_RESPONSE;
2356 case 409: /* Conflict */
2357 return AST_CAUSE_NORMAL_TEMPORARY_FAILURE;
2358 case 410: /* Gone */
2359 return AST_CAUSE_UNALLOCATED;
2360 case 411: /* Length required */
2361 return AST_CAUSE_INTERWORKING;
2362 case 413: /* Request entity too large */
2363 return AST_CAUSE_INTERWORKING;
2364 case 414: /* Request URI too large */
2365 return AST_CAUSE_INTERWORKING;
2366 case 415: /* Unsupported media type */
2367 return AST_CAUSE_INTERWORKING;
2368 case 420: /* Bad extension */
2369 return AST_CAUSE_NO_ROUTE_DESTINATION;
2370 case 480: /* No answer */
2371 return AST_CAUSE_FAILURE;
2372 case 481: /* No answer */
2373 return AST_CAUSE_INTERWORKING;
2374 case 482: /* Loop detected */
2375 return AST_CAUSE_INTERWORKING;
2376 case 483: /* Too many hops */
2377 return AST_CAUSE_NO_ANSWER;
2378 case 484: /* Address incomplete */
2379 return AST_CAUSE_INVALID_NUMBER_FORMAT;
2380 case 485: /* Ambigous */
2381 return AST_CAUSE_UNALLOCATED;
2382 case 486: /* Busy everywhere */
2383 return AST_CAUSE_BUSY;
2384 case 487: /* Request terminated */
2385 return AST_CAUSE_INTERWORKING;
2386 case 488: /* No codecs approved */
2387 return AST_CAUSE_BEARERCAPABILITY_NOTAVAIL;
2388 case 491: /* Request pending */
2389 return AST_CAUSE_INTERWORKING;
2390 case 493: /* Undecipherable */
2391 return AST_CAUSE_INTERWORKING;
2392 case 500: /* Server internal failure */
2393 return AST_CAUSE_FAILURE;
2394 case 501: /* Call rejected */
2395 return AST_CAUSE_FACILITY_REJECTED;
2397 return AST_CAUSE_DESTINATION_OUT_OF_ORDER;
2398 case 503: /* Service unavailable */
2399 return AST_CAUSE_CONGESTION;
2400 case 504: /* Gateway timeout */
2401 return AST_CAUSE_RECOVERY_ON_TIMER_EXPIRE;
2402 case 505: /* SIP version not supported */
2403 return AST_CAUSE_INTERWORKING;
2404 case 600: /* Busy everywhere */
2405 return AST_CAUSE_USER_BUSY;
2406 case 603: /* Decline */
2407 return AST_CAUSE_CALL_REJECTED;
2408 case 604: /* Does not exist anywhere */
2409 return AST_CAUSE_UNALLOCATED;
2410 case 606: /* Not acceptable */
2411 return AST_CAUSE_BEARERCAPABILITY_NOTAVAIL;
2413 return AST_CAUSE_NORMAL;
2419 /*! \brief Convert Asterisk hangup causes to SIP codes
2421 Possible values from causes.h
2422 AST_CAUSE_NOTDEFINED AST_CAUSE_NORMAL AST_CAUSE_BUSY
2423 AST_CAUSE_FAILURE AST_CAUSE_CONGESTION AST_CAUSE_UNALLOCATED
2425 In addition to these, a lot of PRI codes is defined in causes.h
2426 ...should we take care of them too ?
2430 ISUP Cause value SIP response
2431 ---------------- ------------
2432 1 unallocated number 404 Not Found
2433 2 no route to network 404 Not found
2434 3 no route to destination 404 Not found
2435 16 normal call clearing --- (*)
2436 17 user busy 486 Busy here
2437 18 no user responding 408 Request Timeout
2438 19 no answer from the user 480 Temporarily unavailable
2439 20 subscriber absent 480 Temporarily unavailable
2440 21 call rejected 403 Forbidden (+)
2441 22 number changed (w/o diagnostic) 410 Gone
2442 22 number changed (w/ diagnostic) 301 Moved Permanently
2443 23 redirection to new destination 410 Gone
2444 26 non-selected user clearing 404 Not Found (=)
2445 27 destination out of order 502 Bad Gateway
2446 28 address incomplete 484 Address incomplete
2447 29 facility rejected 501 Not implemented
2448 31 normal unspecified 480 Temporarily unavailable
2451 static const char *hangup_cause2sip(int cause)
2454 case AST_CAUSE_UNALLOCATED: /* 1 */
2455 case AST_CAUSE_NO_ROUTE_DESTINATION: /* 3 IAX2: Can't find extension in context */
2456 case AST_CAUSE_NO_ROUTE_TRANSIT_NET: /* 2 */
2457 return "404 Not Found";
2458 case AST_CAUSE_CONGESTION: /* 34 */
2459 case AST_CAUSE_SWITCH_CONGESTION: /* 42 */
2460 return "503 Service Unavailable";
2461 case AST_CAUSE_NO_USER_RESPONSE: /* 18 */
2462 return "408 Request Timeout";
2463 case AST_CAUSE_NO_ANSWER: /* 19 */
2464 return "480 Temporarily unavailable";
2465 case AST_CAUSE_CALL_REJECTED: /* 21 */
2466 return "403 Forbidden";
2467 case AST_CAUSE_NUMBER_CHANGED: /* 22 */
2469 case AST_CAUSE_NORMAL_UNSPECIFIED: /* 31 */
2470 return "480 Temporarily unavailable";
2471 case AST_CAUSE_INVALID_NUMBER_FORMAT:
2472 return "484 Address incomplete";
2473 case AST_CAUSE_USER_BUSY:
2474 return "486 Busy here";
2475 case AST_CAUSE_FAILURE:
2476 return "500 Server internal failure";
2477 case AST_CAUSE_FACILITY_REJECTED: /* 29 */
2478 return "501 Not Implemented";
2479 case AST_CAUSE_CHAN_NOT_IMPLEMENTED:
2480 return "503 Service Unavailable";
2481 /* Used in chan_iax2 */
2482 case AST_CAUSE_DESTINATION_OUT_OF_ORDER:
2483 return "502 Bad Gateway";
2484 case AST_CAUSE_BEARERCAPABILITY_NOTAVAIL: /* Can't find codec to connect to host */
2485 return "488 Not Acceptable Here";
2487 case AST_CAUSE_NOTDEFINED:
2489 ast_log(LOG_DEBUG, "AST hangup cause %d (no match found in SIP)\n", cause);
2498 /*! \brief sip_hangup: Hangup SIP call
2499 * Part of PBX interface, called from ast_hangup */
2500 static int sip_hangup(struct ast_channel *ast)
2502 struct sip_pvt *p = ast->tech_pvt;
2503 int needcancel = FALSE;
2504 struct ast_flags locflags = {0};
2507 ast_log(LOG_DEBUG, "Asked to hangup channel that was not connected\n");
2510 if (option_debug && sipdebug)
2511 ast_log(LOG_DEBUG, "Hangup call %s, SIP callid %s)\n", ast->name, p->callid);
2513 ast_mutex_lock(&p->lock);
2514 if (option_debug && sipdebug)
2515 ast_log(LOG_DEBUG, "update_call_counter(%s) - decrement call limit counter on hangup\n", p->username);
2516 update_call_counter(p, DEC_CALL_LIMIT);
2517 /* Determine how to disconnect */
2518 if (p->owner != ast) {
2519 ast_log(LOG_WARNING, "Huh? We aren't the owner? Can't hangup call.\n");
2520 ast_mutex_unlock(&p->lock);
2523 /* If the call is not UP, we need to send CANCEL instead of BYE */
2524 if (ast->_state != AST_STATE_UP)
2530 ast_dsp_free(p->vad);
2533 ast->tech_pvt = NULL;
2535 ast_mutex_lock(&usecnt_lock);
2537 ast_mutex_unlock(&usecnt_lock);
2538 ast_update_use_count();
2540 ast_set_flag(&locflags, SIP_NEEDDESTROY);
2542 /* Start the process if it's not already started */
2543 if (!ast_test_flag(&p->flags[0], SIP_ALREADYGONE) && !ast_strlen_zero(p->initreq.data)) {
2544 if (needcancel) { /* Outgoing call, not up */
2545 if (ast_test_flag(&p->flags[0], SIP_OUTGOING)) {
2546 /* stop retransmitting an INVITE that has not received a response */
2547 __sip_pretend_ack(p);
2549 /* Send a new request: CANCEL */
2550 transmit_request_with_auth(p, SIP_CANCEL, p->ocseq, XMIT_RELIABLE, 0);
2551 /* Actually don't destroy us yet, wait for the 487 on our original
2552 INVITE, but do set an autodestruct just in case we never get it. */
2553 ast_clear_flag(&locflags, SIP_NEEDDESTROY);
2555 sip_scheddestroy(p, 32000);
2556 if ( p->initid != -1 ) {
2557 /* channel still up - reverse dec of inUse counter
2558 only if the channel is not auto-congested */
2559 update_call_counter(p, INC_CALL_LIMIT);
2561 } else { /* Incoming call, not up */
2563 if (ast->hangupcause && (res = hangup_cause2sip(ast->hangupcause)))
2564 transmit_response_reliable(p, res, &p->initreq);
2566 transmit_response_reliable(p, "603 Declined", &p->initreq);
2568 } else { /* Call is in UP state, send BYE */
2569 if (!p->pendinginvite) {
2571 transmit_request_with_auth(p, SIP_BYE, 0, XMIT_RELIABLE, 1);
2573 /* Note we will need a BYE when this all settles out
2574 but we can't send one while we have "INVITE" outstanding. */
2575 ast_set_flag(&p->flags[0], SIP_PENDINGBYE);
2576 ast_clear_flag(&p->flags[0], SIP_NEEDREINVITE);
2580 ast_copy_flags(&p->flags[0], &locflags, SIP_NEEDDESTROY);
2581 ast_mutex_unlock(&p->lock);
2585 /*! \brief Try setting codec suggested by the SIP_CODEC channel variable */
2586 static void try_suggested_sip_codec(struct sip_pvt *p)
2591 codec = pbx_builtin_getvar_helper(p->owner, "SIP_CODEC");
2595 fmt = ast_getformatbyname(codec);
2597 ast_log(LOG_NOTICE, "Changing codec to '%s' for this call because of ${SIP_CODEC) variable\n", codec);
2598 if (p->jointcapability & fmt) {
2599 p->jointcapability &= fmt;
2600 p->capability &= fmt;
2602 ast_log(LOG_NOTICE, "Ignoring ${SIP_CODEC} variable because it is not shared by both ends.\n");
2604 ast_log(LOG_NOTICE, "Ignoring ${SIP_CODEC} variable because of unrecognized/not configured codec (check allow/disallow in sip.conf): %s\n", codec);
2608 /*! \brief sip_answer: Answer SIP call , send 200 OK on Invite
2609 * Part of PBX interface */
2610 static int sip_answer(struct ast_channel *ast)
2613 struct sip_pvt *p = ast->tech_pvt;
2615 ast_mutex_lock(&p->lock);
2616 if (ast->_state != AST_STATE_UP) {
2617 try_suggested_sip_codec(p);
2619 ast_setstate(ast, AST_STATE_UP);
2621 ast_log(LOG_DEBUG, "SIP answering channel: %s\n", ast->name);
2622 res = transmit_response_with_sdp(p, "200 OK", &p->initreq, XMIT_RELIABLE);
2624 ast_mutex_unlock(&p->lock);
2628 /*! \brief Send frame to media channel (rtp) */
2629 static int sip_write(struct ast_channel *ast, struct ast_frame *frame)
2631 struct sip_pvt *p = ast->tech_pvt;
2634 switch (frame->frametype) {
2635 case AST_FRAME_VOICE:
2636 if (!(frame->subclass & ast->nativeformats)) {
2637 ast_log(LOG_WARNING, "Asked to transmit frame type %d, while native formats is %d (read/write = %d/%d)\n",
2638 frame->subclass, ast->nativeformats, ast->readformat, ast->writeformat);
2642 ast_mutex_lock(&p->lock);
2644 /* If channel is not up, activate early media session */
2645 if ((ast->_state != AST_STATE_UP) &&
2646 !ast_test_flag(&p->flags[0], SIP_PROGRESS_SENT) &&
2647 !ast_test_flag(&p->flags[0], SIP_OUTGOING)) {
2648 transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, XMIT_UNRELIABLE);
2649 ast_set_flag(&p->flags[0], SIP_PROGRESS_SENT);
2651 time(&p->lastrtptx);
2652 res = ast_rtp_write(p->rtp, frame);
2654 ast_mutex_unlock(&p->lock);
2657 case AST_FRAME_VIDEO:
2659 ast_mutex_lock(&p->lock);
2661 /* Activate video early media */
2662 if ((ast->_state != AST_STATE_UP) &&
2663 !ast_test_flag(&p->flags[0], SIP_PROGRESS_SENT) &&
2664 !ast_test_flag(&p->flags[0], SIP_OUTGOING)) {
2665 transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, XMIT_UNRELIABLE);
2666 ast_set_flag(&p->flags[0], SIP_PROGRESS_SENT);
2668 time(&p->lastrtptx);
2669 res = ast_rtp_write(p->vrtp, frame);
2671 ast_mutex_unlock(&p->lock);
2674 case AST_FRAME_IMAGE:
2678 ast_log(LOG_WARNING, "Can't send %d type frames with SIP write\n", frame->frametype);
2685 /*! \brief sip_fixup: Fix up a channel: If a channel is consumed, this is called.
2686 Basically update any ->owner links */
2687 static int sip_fixup(struct ast_channel *oldchan, struct ast_channel *newchan)
2692 if (!newchan || !newchan->tech_pvt) {
2693 ast_log(LOG_WARNING, "No SIP tech_pvt! Fixup of %s failed.\n", oldchan->name);
2696 p = newchan->tech_pvt;
2698 ast_mutex_lock(&p->lock);
2699 if (p->owner != oldchan)
2700 ast_log(LOG_WARNING, "old channel wasn't %p but was %p\n", oldchan, p->owner);
2703 append_history(p, "Masq", "Old channel: %s\n", oldchan->name);
2706 ast_mutex_unlock(&p->lock);
2710 /*! \brief Send DTMF character on SIP channel
2711 within one call, we're able to transmit in many methods simultaneously */
2712 static int sip_senddigit(struct ast_channel *ast, char digit)
2714 struct sip_pvt *p = ast->tech_pvt;
2717 ast_mutex_lock(&p->lock);
2718 switch (ast_test_flag(&p->flags[0], SIP_DTMF)) {
2720 transmit_info_with_digit(p, digit);
2722 case SIP_DTMF_RFC2833:
2724 ast_rtp_senddigit(p->rtp, digit);
2726 case SIP_DTMF_INBAND:
2730 ast_mutex_unlock(&p->lock);
2734 /*! \brief Transfer SIP call */
2735 static int sip_transfer(struct ast_channel *ast, const char *dest)
2737 struct sip_pvt *p = ast->tech_pvt;
2740 ast_mutex_lock(&p->lock);
2741 if (ast->_state == AST_STATE_RING)
2742 res = sip_sipredirect(p, dest);
2744 res = transmit_refer(p, dest);
2745 ast_mutex_unlock(&p->lock);
2749 /*! \brief Play indication to user
2750 * With SIP a lot of indications is sent as messages, letting the device play
2751 the indication - busy signal, congestion etc
2752 \return -1 to force ast_indicate to send indication in audio, 0 if SIP can handle the indication by sending a message
2754 static int sip_indicate(struct ast_channel *ast, int condition)
2756 struct sip_pvt *p = ast->tech_pvt;
2759 ast_mutex_lock(&p->lock);
2761 case AST_CONTROL_RINGING:
2762 if (ast->_state == AST_STATE_RING) {
2763 if (!ast_test_flag(&p->flags[0], SIP_PROGRESS_SENT) ||
2764 (ast_test_flag(&p->flags[0], SIP_PROG_INBAND) == SIP_PROG_INBAND_NEVER)) {
2765 /* Send 180 ringing if out-of-band seems reasonable */
2766 transmit_response(p, "180 Ringing", &p->initreq);
2767 ast_set_flag(&p->flags[0], SIP_RINGING);
2768 if (ast_test_flag(&p->flags[0], SIP_PROG_INBAND) != SIP_PROG_INBAND_YES)
2771 /* Well, if it's not reasonable, just send in-band */
2776 case AST_CONTROL_BUSY:
2777 if (ast->_state != AST_STATE_UP) {
2778 transmit_response(p, "486 Busy Here", &p->initreq);
2779 ast_set_flag(&p->flags[0], SIP_ALREADYGONE);
2780 ast_softhangup_nolock(ast, AST_SOFTHANGUP_DEV);
2785 case AST_CONTROL_CONGESTION:
2786 if (ast->_state != AST_STATE_UP) {
2787 transmit_response(p, "503 Service Unavailable", &p->initreq);
2788 ast_set_flag(&p->flags[0], SIP_ALREADYGONE);
2789 ast_softhangup_nolock(ast, AST_SOFTHANGUP_DEV);
2794 case AST_CONTROL_PROCEEDING:
2795 if ((ast->_state != AST_STATE_UP) &&
2796 !ast_test_flag(&p->flags[0], SIP_PROGRESS_SENT) &&
2797 !ast_test_flag(&p->flags[0], SIP_OUTGOING)) {
2798 transmit_response(p, "100 Trying", &p->initreq);
2803 case AST_CONTROL_PROGRESS:
2804 if ((ast->_state != AST_STATE_UP) &&
2805 !ast_test_flag(&p->flags[0], SIP_PROGRESS_SENT) &&
2806 !ast_test_flag(&p->flags[0], SIP_OUTGOING)) {
2807 transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, XMIT_UNRELIABLE);
2808 ast_set_flag(&p->flags[0], SIP_PROGRESS_SENT);
2813 case AST_CONTROL_HOLD: /* The other part of the bridge are put on hold */
2815 ast_log(LOG_DEBUG, "Bridged channel now on hold - %s\n", p->callid);
2818 case AST_CONTROL_UNHOLD: /* The other part of the bridge are back from hold */
2820 ast_log(LOG_DEBUG, "Bridged channel is back from hold, let's talk! : %s\n", p->callid);
2823 case AST_CONTROL_VIDUPDATE: /* Request a video frame update */
2824 if (p->vrtp && !ast_test_flag(&p->flags[0], SIP_NOVIDEO)) {
2825 transmit_info_with_vidupdate(p);
2826 /* ast_rtcp_send_h261fur(p->vrtp); */
2835 ast_log(LOG_WARNING, "Don't know how to indicate condition %d\n", condition);
2839 ast_mutex_unlock(&p->lock);
2845 /*! \brief Initiate a call in the SIP channel
2846 called from sip_request_call (calls from the pbx ) */
2847 static struct ast_channel *sip_new(struct sip_pvt *i, int state, const char *title)
2849 struct ast_channel *tmp;
2850 struct ast_variable *v = NULL;
2854 ast_mutex_unlock(&i->lock);
2855 /* Don't hold a sip pvt lock while we allocate a channel */
2856 tmp = ast_channel_alloc(1);
2857 ast_mutex_lock(&i->lock);
2859 ast_log(LOG_WARNING, "Unable to allocate SIP channel structure\n");
2862 tmp->tech = &sip_tech;
2863 /* Select our native format based on codec preference until we receive
2864 something from another device to the contrary. */
2865 if (i->jointcapability)
2866 what = i->jointcapability;
2867 else if (i->capability)
2868 what = i->capability;
2870 what = global_capability;
2871 tmp->nativeformats = ast_codec_choose(&i->prefs, what, 1) | (i->jointcapability & AST_FORMAT_VIDEO_MASK);
2872 fmt = ast_best_codec(tmp->nativeformats);
2875 ast_string_field_build(tmp, name, "SIP/%s-%04lx", title, ast_random() & 0xffff);
2876 else if (strchr(i->fromdomain,':'))
2877 ast_string_field_build(tmp, name, "SIP/%s-%08x", strchr(i->fromdomain,':')+1, (int)(long)(i));
2879 ast_string_field_build(tmp, name, "SIP/%s-%08x", i->fromdomain, (int)(long)(i));
2881 if (ast_test_flag(&i->flags[0], SIP_DTMF) == SIP_DTMF_INBAND) {
2882 i->vad = ast_dsp_new();
2883 ast_dsp_set_features(i->vad, DSP_FEATURE_DTMF_DETECT);
2884 if (global_relaxdtmf)
2885 ast_dsp_digitmode(i->vad, DSP_DIGITMODE_DTMF | DSP_DIGITMODE_RELAXDTMF);
2888 tmp->fds[0] = ast_rtp_fd(i->rtp);
2889 tmp->fds[1] = ast_rtcp_fd(i->rtp);
2892 tmp->fds[2] = ast_rtp_fd(i->vrtp);
2893 tmp->fds[3] = ast_rtcp_fd(i->vrtp);
2895 if (state == AST_STATE_RING)
2897 tmp->adsicpe = AST_ADSI_UNAVAILABLE;
2898 tmp->writeformat = fmt;
2899 tmp->rawwriteformat = fmt;
2900 tmp->readformat = fmt;
2901 tmp->rawreadformat = fmt;
2904 tmp->callgroup = i->callgroup;
2905 tmp->pickupgroup = i->pickupgroup;
2906 tmp->cid.cid_pres = i->callingpres;
2907 if (!ast_strlen_zero(i->accountcode))
2908 ast_string_field_set(tmp, accountcode, i->accountcode);
2910 tmp->amaflags = i->amaflags;
2911 if (!ast_strlen_zero(i->language))
2912 ast_string_field_set(tmp, language, i->language);
2913 if (!ast_strlen_zero(i->musicclass))
2914 ast_string_field_set(tmp, musicclass, i->musicclass);
2916 ast_mutex_lock(&usecnt_lock);
2918 ast_mutex_unlock(&usecnt_lock);
2919 ast_copy_string(tmp->context, i->context, sizeof(tmp->context));
2920 ast_copy_string(tmp->exten, i->exten, sizeof(tmp->exten));
2921 if (!ast_strlen_zero(i->cid_num))
2922 tmp->cid.cid_num = ast_strdup(i->cid_num);
2923 if (!ast_strlen_zero(i->cid_name))
2924 tmp->cid.cid_name = ast_strdup(i->cid_name);
2925 if (!ast_strlen_zero(i->rdnis))
2926 tmp->cid.cid_rdnis = ast_strdup(i->rdnis);
2927 if (!ast_strlen_zero(i->exten) && strcmp(i->exten, "s"))
2928 tmp->cid.cid_dnid = ast_strdup(i->exten);
2930 if (!ast_strlen_zero(i->uri))
2931 pbx_builtin_setvar_helper(tmp, "SIPURI", i->uri);
2932 if (!ast_strlen_zero(i->domain))
2933 pbx_builtin_setvar_helper(tmp, "SIPDOMAIN", i->domain);
2934 if (!ast_strlen_zero(i->useragent))
2935 pbx_builtin_setvar_helper(tmp, "SIPUSERAGENT", i->useragent);
2936 if (!ast_strlen_zero(i->callid))
2937 pbx_builtin_setvar_helper(tmp, "SIPCALLID", i->callid);
2938 ast_setstate(tmp, state);
2939 if (state != AST_STATE_DOWN && ast_pbx_start(tmp)) {
2940 ast_log(LOG_WARNING, "Unable to start PBX on %s\n", tmp->name);
2941 tmp->hangupcause = AST_CAUSE_SWITCH_CONGESTION;
2945 /* Set channel variables for this call from configuration */
2946 for (v = i->chanvars ; v ; v = v->next)
2947 pbx_builtin_setvar_helper(tmp,v->name,v->value);
2949 append_history(i, "NewChan", "Channel %s - from %s", tmp->name, i->callid);
2954 /*! \brief Reads one line of SIP message body */
2955 static const char* get_sdp_by_line(const char* line, const char *name, int nameLen)
2957 if (strncasecmp(line, name, nameLen) == 0 && line[nameLen] == '=')
2958 return ast_skip_blanks(line + nameLen + 1);
2962 /*! \brief get_sdp_iterate: lookup 'name' in the request starting
2963 * at the 'start' line. Returns the matching line, and 'start'
2964 * is updated with the next line number.
2966 static const char* get_sdp_iterate(int* start,
2967 struct sip_request *req, const char *name)
2969 int len = strlen(name);
2971 while (*start < req->lines) {
2972 const char *r = get_sdp_by_line(req->line[(*start)++], name, len);
2979 /*! \brief get_sdp: Gets all kind of SIP message bodies, including SDP,
2980 but the name wrongly applies _only_ sdp */
2981 static const char *get_sdp(struct sip_request *req, const char *name)
2984 return get_sdp_iterate(&dummy, req, name);
2987 static const char *find_alias(const char *name, const char *_default)
2989 /*! \brief Structure for conversion between compressed SIP and "normal" SIP */
2990 static const struct cfalias {
2991 char * const fullname;
2992 char * const shortname;
2994 { "Content-Type", "c" },
2995 { "Content-Encoding", "e" },
2999 { "Content-Length", "l" },
3002 { "Supported", "k" },
3003 { "Refer-To", "r" },
3004 { "Referred-By", "b" },
3005 { "Allow-Events", "u" },
3008 { "Accept-Contact", "a" },
3009 { "Reject-Contact", "j" },
3010 { "Request-Disposition", "d" },
3011 { "Session-Expires", "x" },
3014 for (x=0;x<sizeof(aliases) / sizeof(aliases[0]); x++)
3015 if (!strcasecmp(aliases[x].fullname, name))
3016 return aliases[x].shortname;
3020 static const char *__get_header(const struct sip_request *req, const char *name, int *start)
3025 * Technically you can place arbitrary whitespace both before and after the ':' in
3026 * a header, although RFC3261 clearly says you shouldn't before, and place just
3027 * one afterwards. If you shouldn't do it, what absolute idiot decided it was
3028 * a good idea to say you can do it, and if you can do it, why in the hell would.
3029 * you say you shouldn't.
3030 * Anyways, pedanticsipchecking controls whether we allow spaces before ':',
3031 * and we always allow spaces after that for compatibility.
3033 for (pass = 0; name && pass < 2;pass++) {
3034 int x, len = strlen(name);
3035 for (x=*start; x<req->headers; x++) {
3036 if (!strncasecmp(req->header[x], name, len)) {
3037 char *r = req->header[x] + len; /* skip name */
3038 if (pedanticsipchecking)
3039 r = ast_skip_blanks(r);
3043 return ast_skip_blanks(r+1);
3047 if (pass == 0) /* Try aliases */
3048 name = find_alias(name, NULL);
3051 /* Don't return NULL, so get_header is always a valid pointer */
3055 /*! \brief Get header from SIP request */
3056 static const char *get_header(const struct sip_request *req, const char *name)
3059 return __get_header(req, name, &start);
3062 /*! \brief Read RTP from network */
3063 static struct ast_frame *sip_rtp_read(struct ast_channel *ast, struct sip_pvt *p)
3065 /* Retrieve audio/etc from channel. Assumes p->lock is already held. */
3066 struct ast_frame *f;
3069 /* We have no RTP allocated for this channel */
3070 return &ast_null_frame;
3075 f = ast_rtp_read(p->rtp); /* RTP Audio */
3078 f = ast_rtcp_read(p->rtp); /* RTCP Control Channel */
3081 f = ast_rtp_read(p->vrtp); /* RTP Video */
3084 f = ast_rtcp_read(p->vrtp); /* RTCP Control Channel for video */
3087 f = &ast_null_frame;
3089 /* Don't forward RFC2833 if we're not supposed to */
3090 if (f && (f->frametype == AST_FRAME_DTMF) &&
3091 (ast_test_flag(&p->flags[0], SIP_DTMF) != SIP_DTMF_RFC2833))
3092 return &ast_null_frame;
3095 /* We already hold the channel lock */
3096 if (f->frametype == AST_FRAME_VOICE) {
3097 if (f->subclass != (p->owner->nativeformats & AST_FORMAT_AUDIO_MASK)) {
3099 ast_log(LOG_DEBUG, "Oooh, format changed to %d\n", f->subclass);
3100 p->owner->nativeformats = (p->owner->nativeformats & AST_FORMAT_VIDEO_MASK) | f->subclass;
3101 ast_set_read_format(p->owner, p->owner->readformat);
3102 ast_set_write_format(p->owner, p->owner->writeformat);
3104 if ((ast_test_flag(&p->flags[0], SIP_DTMF) == SIP_DTMF_INBAND) && p->vad) {
3105 f = ast_dsp_process(p->owner, p->vad, f);
3106 if (option_debug && f && (f->frametype == AST_FRAME_DTMF))
3107 ast_log(LOG_DEBUG, "* Detected inband DTMF '%c'\n", f->subclass);
3114 /*! \brief Read SIP RTP from channel */
3115 static struct ast_frame *sip_read(struct ast_channel *ast)
3117 struct ast_frame *fr;
3118 struct sip_pvt *p = ast->tech_pvt;
3120 ast_mutex_lock(&p->lock);
3121 fr = sip_rtp_read(ast, p);
3122 time(&p->lastrtprx);
3123 ast_mutex_unlock(&p->lock);
3128 /*! \brief Generate 32 byte random string for callid's etc */
3129 static char *generate_random_string(char *buf, size_t size)
3135 val[x] = ast_random();
3136 snprintf(buf, size, "%08lx%08lx%08lx%08lx", val[0], val[1], val[2], val[3]);
3141 /*! \brief Build SIP Call-ID value for a non-REGISTER transaction */
3142 static void build_callid_pvt(struct sip_pvt *pvt)
3144 char iabuf[INET_ADDRSTRLEN];
3147 const char *host = S_OR(pvt->fromdomain, ast_inet_ntoa(iabuf, sizeof(iabuf), pvt->ourip));
3149 ast_string_field_build(pvt, callid, "%s@%s", generate_random_string(buf, sizeof(buf)), host);
3153 /*! \brief Build SIP Call-ID value for a REGISTER transaction */
3154 static void build_callid_registry(struct sip_registry *reg, struct in_addr ourip, const char *fromdomain)
3156 char iabuf[INET_ADDRSTRLEN];
3159 const char *host = S_OR(fromdomain, ast_inet_ntoa(iabuf, sizeof(iabuf), ourip));
3161 ast_string_field_build(reg, callid, "%s@%s", generate_random_string(buf, sizeof(buf)), host);
3164 /*! \brief Make our SIP dialog tag */
3165 static void make_our_tag(char *tagbuf, size_t len)
3167 snprintf(tagbuf, len, "as%08lx", ast_random());
3170 /*! \brief Allocate SIP_PVT structure and set defaults */
3171 static struct sip_pvt *sip_alloc(ast_string_field callid, struct sockaddr_in *sin,
3172 int useglobal_nat, const int intended_method)
3176 if (!(p = ast_calloc(1, sizeof(*p))))
3179 if (ast_string_field_init(p, 512)) {
3184 ast_mutex_init(&p->lock);
3186 p->method = intended_method;
3189 p->subscribed = NONE;
3191 p->prefs = default_prefs; /* Set default codecs for this call */
3193 if (intended_method != SIP_OPTIONS) /* Peerpoke has it's own system */
3194 p->timer_t1 = 500; /* Default SIP retransmission timer T1 (RFC 3261) */
3197 if (ast_sip_ouraddrfor(&p->sa.sin_addr,&p->ourip))
3203 ast_copy_flags(&p->flags[0], &global_flags[0], SIP_FLAGS_TO_COPY);
3204 ast_copy_flags(&p->flags[1], &global_flags[1], SIP_PAGE2_FLAGS_TO_COPY);
3206 p->branch = ast_random();
3207 make_our_tag(p->tag, sizeof(p->tag));
3208 p->ocseq = INITIAL_CSEQ;
3210 if (sip_methods[intended_method].need_rtp) {
3211 p->rtp = ast_rtp_new_with_bindaddr(sched, io, 1, 0, bindaddr.sin_addr);
3212 if (ast_test_flag(&p->flags[1], SIP_PAGE2_VIDEOSUPPORT))
3213 p->vrtp = ast_rtp_new_with_bindaddr(sched, io, 1, 0, bindaddr.sin_addr);
3214 if (!p->rtp || (ast_test_flag(&p->flags[1], SIP_PAGE2_VIDEOSUPPORT) && !p->vrtp)) {
3215 ast_log(LOG_WARNING, "Unable to create RTP audio %s session: %s\n",
3216 ast_test_flag(&p->flags[1], SIP_PAGE2_VIDEOSUPPORT) ? "and video" : "", strerror(errno));
3217 ast_mutex_destroy(&p->lock);
3219 ast_variables_destroy(p->chanvars);
3225 ast_rtp_settos(p->rtp, global_tos_audio);
3227 ast_rtp_settos(p->vrtp, global_tos_video);
3228 p->rtptimeout = global_rtptimeout;
3229 p->rtpholdtimeout = global_rtpholdtimeout;
3230 p->rtpkeepalive = global_rtpkeepalive;
3231 p->maxcallbitrate = default_maxcallbitrate;
3234 if (useglobal_nat && sin) {
3236 /* Setup NAT structure according to global settings if we have an address */
3237 ast_copy_flags(&p->flags[0], &global_flags[0], SIP_NAT);
3239 natflags = ast_test_flag(&p->flags[0], SIP_NAT) & SIP_NAT_ROUTE;
3241 ast_rtp_setnat(p->rtp, natflags);
3243 ast_rtp_setnat(p->vrtp, natflags);
3246 if (p->method != SIP_REGISTER)
3247 ast_string_field_set(p, fromdomain, default_fromdomain);
3250 build_callid_pvt(p);
3252 ast_string_field_set(p, callid, callid);
3253 /* Assign default music on hold class */
3254 ast_string_field_set(p, musicclass, default_musicclass);
3255 p->capability = global_capability;
3256 if ((ast_test_flag(&p->flags[0], SIP_DTMF) == SIP_DTMF_RFC2833) ||
3257 (ast_test_flag(&p->flags[0], SIP_DTMF) == SIP_DTMF_AUTO))
3258 p->noncodeccapability |= AST_RTP_DTMF;
3259 ast_string_field_set(p, context, default_context);
3261 /* Add to active dialog list */
3262 ast_mutex_lock(&iflock);
3265 ast_mutex_unlock(&iflock);
3267 ast_log(LOG_DEBUG, "Allocating new SIP dialog for %s - %s (%s)\n", callid ? callid : "(No Call-ID)", sip_methods[intended_method].text, p->rtp ? "With RTP" : "No RTP");
3271 /*! \brief Connect incoming SIP message to current dialog or create new dialog structure
3272 Called by handle_request, sipsock_read */
3273 static struct sip_pvt *find_call(struct sip_request *req, struct sockaddr_in *sin, const int intended_method)
3276 char *tag = ""; /* note, tag is never NULL */
3279 const char *callid = get_header(req, "Call-ID");
3281 if (pedanticsipchecking) {
3282 /* In principle Call-ID's uniquely identify a call, but with a forking SIP proxy
3283 we need more to identify a branch - so we have to check branch, from
3284 and to tags to identify a call leg.
3285 For Asterisk to behave correctly, you need to turn on pedanticsipchecking
3288 if (gettag(req, "To", totag, sizeof(totag)))
3289 ast_set_flag(req, SIP_PKT_WITH_TOTAG); /* Used in handle_request/response */
3290 gettag(req, "From", fromtag, sizeof(fromtag));
3292 tag = (req->method == SIP_RESPONSE) ? totag : fromtag;
3294 if (option_debug > 4 )
3295 ast_log(LOG_DEBUG, "= Looking for Call ID: %s (Checking %s) --From tag %s --To-tag %s \n", callid, req->method==SIP_RESPONSE ? "To" : "From", fromtag, totag);
3298 ast_mutex_lock(&iflock);
3299 for (p = iflist; p; p = p->next) {
3300 /* In pedantic, we do not want packets with bad syntax to be connected to a PVT */
3302 if (req->method == SIP_REGISTER)
3303 found = (!strcmp(p->callid, callid));
3305 found = (!strcmp(p->callid, callid) &&
3306 (!pedanticsipchecking || !tag || ast_strlen_zero(p->theirtag) || !strcmp(p->theirtag, tag))) ;
3308 if (option_debug > 4)
3309 ast_log(LOG_DEBUG, "= %s Their Call ID: %s Their Tag %s Our tag: %s\n", found ? "Found" : "No match", p->callid, p->theirtag, p->tag);
3311 /* If we get a new request within an existing to-tag - check the to tag as well */
3312 if (pedanticsipchecking && found && req->method != SIP_RESPONSE) { /* SIP Request */
3313 if (p->tag[0] == '\0' && totag[0]) {
3314 /* We have no to tag, but they have. Wrong dialog */
3316 } else if (totag[0]) { /* Both have tags, compare them */
3317 if (strcmp(totag, p->tag)) {
3318 found = FALSE; /* This is not our packet */
3321 if (!found && option_debug > 4)
3322 ast_log(LOG_DEBUG, "= Being pedantic: This is not our match on request: Call ID: %s Ourtag <null> Totag %s Method %s\n", p->callid, totag, sip_methods[req->method].text);
3327 /* Found the call */
3328 ast_mutex_lock(&p->lock);
3329 ast_mutex_unlock(&iflock);
3333 ast_mutex_unlock(&iflock);
3334 /* Allocate new call */
3335 if ((p = sip_alloc(callid, sin, 1, intended_method)))
3336 ast_mutex_lock(&p->lock);
3340 /*! \brief Parse register=> line in sip.conf and add to registry */
3341 static int sip_register(char *value, int lineno)
3343 struct sip_registry *reg;
3345 char *username=NULL, *hostname=NULL, *secret=NULL, *authuser=NULL;
3352 ast_copy_string(copy, value, sizeof(copy));
3355 hostname = strrchr(stringp, '@');
3358 if (ast_strlen_zero(username) || ast_strlen_zero(hostname)) {
3359 ast_log(LOG_WARNING, "Format for registration is user[:secret[:authuser]]@host[:port][/contact] at line %d\n", lineno);
3363 username = strsep(&stringp, ":");
3365 secret = strsep(&stringp, ":");
3367 authuser = strsep(&stringp, ":");
3370 hostname = strsep(&stringp, "/");
3372 contact = strsep(&stringp, "/");
3373 if (ast_strlen_zero(contact))
3376 hostname = strsep(&stringp, ":");
3377 porta = strsep(&stringp, ":");
3379 if (porta && !atoi(porta)) {
3380 ast_log(LOG_WARNING, "%s is not a valid port number at line %d\n", porta, lineno);
3383 if (!(reg = ast_calloc(1, sizeof(*reg)))) {
3384 ast_log(LOG_ERROR, "Out of memory. Can't allocate SIP registry entry\n");
3388 if (ast_string_field_init(reg, 256)) {
3389 ast_log(LOG_ERROR, "Out of memory. Can't allocate SIP registry strings\n");
3396 ast_string_field_set(reg, contact, contact);
3398 ast_string_field_set(reg, username, username);
3400 ast_string_field_set(reg, hostname, hostname);
3402 ast_string_field_set(reg, authuser, authuser);
3404 ast_string_field_set(reg, secret, secret);
3407 reg->refresh = default_expiry;
3408 reg->portno = porta ? atoi(porta) : 0;
3409 reg->callid_valid = FALSE;
3410 reg->ocseq = INITIAL_CSEQ;
3411 ASTOBJ_CONTAINER_LINK(®l, reg); /* Add the new registry entry to the list */
3412 ASTOBJ_UNREF(reg,sip_registry_destroy);
3416 /*! \brief Parse multiline SIP headers into one header
3417 This is enabled if pedanticsipchecking is enabled */
3418 static int lws2sws(char *msgbuf, int len)
3424 /* Eliminate all CRs */
3425 if (msgbuf[h] == '\r') {
3429 /* Check for end-of-line */
3430 if (msgbuf[h] == '\n') {
3431 /* Check for end-of-message */
3434 /* Check for a continuation line */
3435 if (msgbuf[h + 1] == ' ' || msgbuf[h + 1] == '\t') {
3436 /* Merge continuation line */
3440 /* Propagate LF and start new line */
3441 msgbuf[t++] = msgbuf[h++];
3445 if (msgbuf[h] == ' ' || msgbuf[h] == '\t') {
3450 msgbuf[t++] = msgbuf[h++];
3454 msgbuf[t++] = msgbuf[h++];
3462 /*! \brief Parse a SIP message */
3463 static void parse_request(struct sip_request *req)
3465 /* Divide fields by NULL's */
3471 /* First header starts immediately */
3475 /* We've got a new header */
3478 if (sipdebug && option_debug > 3)
3479 ast_log(LOG_DEBUG, "Header %d: %s (%d)\n", f, req->header[f], (int) strlen(req->header[f]));
3480 if (ast_strlen_zero(req->header[f])) {
3481 /* Line by itself means we're now in content */