fc051d46645443e85083d04f76cca7fe48f1033d
[asterisk/asterisk.git] / channels / chan_sip.c
1 /*
2  * Asterisk -- A telephony toolkit for Linux.
3  *
4  * Implementation of Session Initiation Protocol
5  * 
6  * Copyright (C) 1999, Mark Spencer
7  *
8  * Mark Spencer <markster@linux-support.net>
9  *
10  * This program is free software, distributed under the terms of
11  * the GNU General Public License
12  */
13
14 #include <stdio.h>
15 #include <ctype.h>
16 #include <pthread.h>
17 #include <string.h>
18 #include <asterisk/lock.h>
19 #include <asterisk/channel.h>
20 #include <asterisk/channel_pvt.h>
21 #include <asterisk/config.h>
22 #include <asterisk/logger.h>
23 #include <asterisk/module.h>
24 #include <asterisk/pbx.h>
25 #include <asterisk/options.h>
26 #include <asterisk/lock.h>
27 #include <asterisk/sched.h>
28 #include <asterisk/io.h>
29 #include <asterisk/rtp.h>
30 #include <asterisk/acl.h>
31 #include <asterisk/callerid.h>
32 #include <asterisk/cli.h>
33 #include <asterisk/md5.h>
34 #include <asterisk/app.h>
35 #include <asterisk/musiconhold.h>
36 #include <asterisk/dsp.h>
37 #include <asterisk/parking.h>
38 #include <asterisk/acl.h>
39 #include <asterisk/srv.h>
40 #include <asterisk/astdb.h>
41 #include <asterisk/causes.h>
42 #include <sys/socket.h>
43 #include <sys/ioctl.h>
44 #include <net/if.h>
45 #include <errno.h>
46 #include <unistd.h>
47 #include <stdlib.h>
48 #include <fcntl.h>
49 #include <netdb.h>
50 #include <arpa/inet.h>
51 #include <sys/signal.h>
52 #include <netinet/in_systm.h>
53 #include <netinet/ip.h>
54
55 #ifndef IPTOS_MINCOST
56 #define IPTOS_MINCOST 0x02
57 #endif
58
59 /* #define VOCAL_DATA_HACK */
60
61 #define SIPDUMPER
62 #define DEFAULT_DEFAULT_EXPIRY  120
63 #define DEFAULT_MAX_EXPIRY      3600
64 #define EXPIRY_GUARD_SECS       15
65
66 #define CALLERID_UNKNOWN        "Unknown"
67
68 #define SIP_DTMF_RFC2833        (1 << 0)
69 #define SIP_DTMF_INBAND         (1 << 1)
70 #define SIP_DTMF_INFO           (1 << 2)
71
72 static int max_expiry = DEFAULT_MAX_EXPIRY;
73 static int default_expiry = DEFAULT_DEFAULT_EXPIRY;
74
75 #define DEFAULT_MAXMS           2000            /* Must be faster than 2 seconds by default */
76 #define DEFAULT_FREQ_OK         60 * 1000               /* How often to check for the host to be up */
77 #define DEFAULT_FREQ_NOTOK      10 * 1000               /* How often to check, if the host is down... */
78
79 #define DEFAULT_RETRANS         1000                    /* How frequently to retransmit */
80 #define MAX_RETRANS                     5                               /* Try only 5 times for retransmissions */
81
82 static char *desc = "Session Initiation Protocol (SIP)";
83 static char *type = "sip";
84 static char *tdesc = "Session Initiation Protocol (SIP)";
85 static char *config = "sip.conf";
86
87 #define DEFAULT_SIP_PORT        5060    /* From RFC 2543 */
88 #define SIP_MAX_PACKET  1500            /* Also from RFC 2543, should sub headers tho */
89
90 #define ALLOWED_METHODS "INVITE, ACK, CANCEL, OPTIONS, BYE, REFER"
91
92 static char context[AST_MAX_EXTENSION] = "default";
93
94 static char language[MAX_LANGUAGE] = "";
95
96 static char callerid[AST_MAX_EXTENSION] = "asterisk";
97
98 static char fromdomain[AST_MAX_EXTENSION] = "";
99
100 static char notifymime[AST_MAX_EXTENSION] = "application/simple-message-summary";
101
102 static int srvlookup = 0;
103
104 static int pedanticsipchecking = 0;
105
106 static int autocreatepeer = 0;
107
108 static int usecnt =0;
109 static ast_mutex_t usecnt_lock = AST_MUTEX_INITIALIZER;
110
111 /* Protect the interface list (of sip_pvt's) */
112 static ast_mutex_t iflock = AST_MUTEX_INITIALIZER;
113
114 /* Protect the monitoring thread, so only one process can kill or start it, and not
115    when it's doing something critical. */
116 static ast_mutex_t netlock = AST_MUTEX_INITIALIZER;
117
118 static ast_mutex_t monlock = AST_MUTEX_INITIALIZER;
119
120 /* This is the thread for the monitor which checks for input on the channels
121    which are not currently in use.  */
122 static pthread_t monitor_thread = 0;
123
124 static int restart_monitor(void);
125
126 /* Codecs that we support by default: */
127 static int capability = AST_FORMAT_ULAW | AST_FORMAT_ALAW | AST_FORMAT_GSM | AST_FORMAT_H263;
128 static int noncodeccapability = AST_RTP_DTMF;
129
130 static char ourhost[256];
131 static struct in_addr __ourip;
132 static int ourport;
133
134 static int sipdebug = 0;
135
136 static int tos = 0;
137
138 static int videosupport = 0;
139
140 static int globaldtmfmode = SIP_DTMF_RFC2833;
141
142 /* Expire slowly */
143 static int expiry = 900;
144
145 static struct sched_context *sched;
146 static struct io_context *io;
147 /* The private structures of the  sip channels are linked for
148    selecting outgoing channels */
149    
150 #define SIP_MAX_HEADERS         64
151 #define SIP_MAX_LINES           64
152
153 #define DEC_IN_USE      0
154 #define INC_IN_USE      1
155 #define DEC_OUT_USE     2
156 #define INC_OUT_USE     3
157
158 static struct sip_codec_pref {
159         int codec;
160         struct sip_codec_pref *next;
161 } *prefs;
162
163 struct sip_request {
164   char *rlPart1; /* SIP Method Name or "SIP/2.0" protocol version */
165   char *rlPart2; /* The Request URI or Response Status */
166         int len;
167         int headers;                                    /* SIP Headers */
168         char *header[SIP_MAX_HEADERS];
169         int lines;                                              /* SDP Content */
170         char *line[SIP_MAX_LINES];
171         char data[SIP_MAX_PACKET];
172 };
173
174 struct sip_pkt;
175
176 struct sip_route {
177         struct sip_route *next;
178         char hop[0];
179 };
180
181 static struct sip_pvt {
182         ast_mutex_t lock;                               /* Channel private lock */
183         char callid[80];                                        /* Global CallID */
184         char randdata[80];      /* Random data */
185         unsigned int ocseq;                                     /* Current outgoing seqno */
186         unsigned int icseq;                                     /* Current incoming seqno */
187         unsigned int callgroup;
188         unsigned int pickupgroup;
189         int lastinvite;                                         /* Last Cseq of invite */
190         int alreadygone;                                        /* Whether or not we've already been destroyed by or peer */
191         int needdestroy;                                        /* if we need to be destroyed */
192         int capability;                                         /* Special capability */
193         int jointcapability;                            /* Supported capability at both ends */
194         int noncodeccapability;
195         int outgoing;                                           /* Outgoing or incoming call? */
196         int authtries;                                          /* Times we've tried to authenticate */
197         int insecure;                                           /* Don't check source port/ip */
198         int expiry;                                             /* How long we take to expire */
199         int branch;                                                     /* One random number */
200         int canreinvite;                                        /* Do we support reinvite */
201         int ringing;                                            /* Have sent 180 ringing */
202         int progress;                                           /* Have sent 183 message progress */
203         int tag;                                                        /* Another random number */
204         int nat;                                                        /* Whether to try to support NAT */
205         int sessionid;                                          /* SDP Session ID */
206         int sessionversion;                                     /* SDP Session Version */
207         struct sockaddr_in sa;                          /* Our peer */
208         struct sockaddr_in redirip;                     /* Where our RTP should be going if not to us */
209         struct sockaddr_in vredirip;            /* Where our Video RTP should be going if not to us */
210         struct sockaddr_in recv;                        /* Received as */
211         struct in_addr ourip;                           /* Our IP */
212         struct ast_channel *owner;                      /* Who owns us */
213         char exten[AST_MAX_EXTENSION];          /* Extention where to start */
214         char refer_to[AST_MAX_EXTENSION];       /* Place to store REFER-TO extension */
215         char referred_by[AST_MAX_EXTENSION];/* Place to store REFERRED-BY extension */
216         char refer_contact[AST_MAX_EXTENSION];/* Place to store Contact info from a REFER extension */
217         struct sip_pvt *refer_call;                     /* Call we are referring */
218         struct sip_route *route;                        /* Head of linked list of routing steps (fm Record-Route) */
219         char remote_party_id[256];
220         char from[256];
221         char context[AST_MAX_EXTENSION];
222         char fromdomain[AST_MAX_EXTENSION];     /* Domain to show in the from field */
223         char fromuser[AST_MAX_EXTENSION];       /* Domain to show in the user field */
224         char tohost[AST_MAX_EXTENSION];         /* Host we should put in the "to" field */
225         char language[MAX_LANGUAGE];
226         char rdnis[256];                                /* Referring DNIS */
227         char theirtag[256];                             /* Their tag */
228         char username[256];
229         char peername[256];
230         char uri[256];                                  /* Original requested URI */
231         char peersecret[256];
232         char peermd5secret[256];
233         char callerid[256];                                     /* Caller*ID */
234         int restrictcid;                        /* hide presentation from remote user */
235         char via[256];
236         char accountcode[20];                           /* Account code */
237         char our_contact[256];                          /* Our contact header */
238         char realm[256];                                /* Authorization realm */
239         char nonce[256];                                /* Authorization nonce */
240         char domain[256];                               /* Authorization nonce */
241         char lastmsg[256];                              /* Last Message sent/received */
242         int amaflags;                                           /* AMA Flags */
243         int pendinginvite;                                      /* Any pending invite */
244         int pendingbye;                                         /* Need to send bye after we ack? */
245         int gotrefer;                                           /* Got a refer? */
246         struct sip_request initreq;                     /* Initial request */
247         
248         int maxtime;                                            /* Max time for first response */
249         int initid;                                                     /* Auto-congest ID if appropriate */
250         int autokillid;                                         /* Auto-kill ID */
251
252         int subscribed;
253         int stateid;
254         int dialogver;
255         
256         int dtmfmode;
257         struct ast_dsp *vad;
258         
259         struct sip_peer *peerpoke;                      /* If this calls is to poke a peer, which one */
260         struct sip_registry *registry;                  /* If this is a REGISTER call, to which registry */
261         struct ast_rtp *rtp;                            /* RTP Session */
262         struct ast_rtp *vrtp;                           /* Video RTP session */
263         struct sip_pkt *packets;                        /* Packets scheduled for re-transmission */
264         struct sip_pvt *next;
265 } *iflist = NULL;
266
267 struct sip_pkt {
268         struct sip_pkt *next;                           /* Next packet */
269         int retrans;                                            /* Retransmission number */
270         int seqno;                                                      /* Sequence number */
271         int resp;                                                       /* non-zero if this is a response packet (e.g. 200 OK) */
272         struct sip_pvt *owner;                          /* Owner call */
273         int retransid;                                          /* Retransmission ID */
274         int packetlen;                                          /* Length of packet */
275         char data[0];
276 };      
277
278 struct sip_user {
279         /* Users who can access various contexts */
280         char name[80];
281         char secret[80];
282         char md5secret[80];
283         char context[80];
284         char callerid[80];
285         char methods[80];
286         char accountcode[20];
287         char language[MAX_LANGUAGE];
288         unsigned int callgroup;
289         unsigned int pickupgroup;
290         int nat;
291         int hascallerid;
292         int amaflags;
293         int insecure;
294         int canreinvite;
295         int capability;
296         int dtmfmode;
297         int inUse;
298         int incominglimit;
299         int outUse;
300         int outgoinglimit;
301         int restrictcid;
302         struct ast_ha *ha;
303         struct sip_user *next;
304 };
305
306 struct sip_peer {
307         char name[80];
308         char secret[80];
309         char md5secret[80];
310         char context[80];               /* JK02: peers need context too to allow parking etc */
311         char methods[80];
312         char username[80];
313         char tohost[80];
314         char fromuser[80];
315         char fromdomain[80];
316         char mailbox[AST_MAX_EXTENSION];
317         int lastmsgssent;
318         time_t  lastmsgcheck;
319         int dynamic;
320         int expire;
321         int expiry;
322         int capability;
323         int insecure;
324         int nat;
325         int canreinvite;
326         unsigned int callgroup;
327         unsigned int pickupgroup;
328         int dtmfmode;
329         struct sockaddr_in addr;
330         struct in_addr mask;
331
332         /* Qualification */
333         struct sip_pvt *call;           /* Call pointer */
334         int pokeexpire;                         /* When to expire poke */
335         int lastms;                                     /* How long last response took (in ms), or -1 for no response */
336         int maxms;                                      /* Max ms we will accept for the host to be up, 0 to not monitor */
337         struct timeval ps;                      /* Ping send time */
338         
339         struct sockaddr_in defaddr;
340         struct ast_ha *ha;
341         int delme;
342         int selfdestruct;
343         int lastmsg;
344         struct sip_peer *next;
345 };
346
347 static struct ast_user_list {
348         struct sip_user *users;
349         ast_mutex_t lock;
350 } userl = { NULL, AST_MUTEX_INITIALIZER };
351
352 static struct ast_peer_list {
353         struct sip_peer *peers;
354         ast_mutex_t lock;
355 } peerl = { NULL, AST_MUTEX_INITIALIZER };
356
357
358 #define REG_STATE_UNREGISTERED 0
359 #define REG_STATE_REGSENT          1
360 #define REG_STATE_AUTHSENT         2
361 #define REG_STATE_REGISTERED   3
362 #define REG_STATE_REJECTED         4
363 #define REG_STATE_TIMEOUT          5
364 #define REG_STATE_NOAUTH           6
365
366 struct sip_registry {
367         ast_mutex_t lock;                               /* Channel private lock */
368         struct sockaddr_in addr;                /* Who we connect to for registration purposes */
369         char username[80];                              /* Who we are registering as */
370         char authuser[80];                              /* Who we *authenticate* as */
371         char hostname[80];
372         char secret[80];                        /* Password or key name in []'s */      
373         char md5secret[80];
374         char contact[80];                       /* Contact extension */
375         char random[80];
376         int expire;                                     /* Sched ID of expiration */
377         int timeout;                                    /* sched id of sip_reg_timeout */
378         int refresh;                                    /* How often to refresh */
379         struct sip_pvt *call;                           /* create a sip_pvt structure for each outbound "registration call" in progress */
380         int regstate;
381         int callid_valid;               /* 0 means we haven't chosen callid for this registry yet. */
382         char callid[80];                /* Global CallID for this registry */
383         unsigned int ocseq;             /* Sequence number we got to for REGISTERs for this registry */
384         struct sockaddr_in us;                  /* Who the server thinks we are */
385         struct sip_registry *next;
386 };
387
388 #define REINVITE_INVITE         1
389 #define REINVITE_UPDATE         2
390
391 static int sip_do_register(struct sip_registry *r);
392 static struct sip_registry *registrations;
393
394 static int sipsock  = -1;
395 static int globalnat = 0;
396 static int globalcanreinvite = REINVITE_INVITE;
397 static int use_external_ip = 0;
398
399 static struct sockaddr_in bindaddr;
400
401 static struct ast_frame  *sip_read(struct ast_channel *ast);
402 static int transmit_response(struct sip_pvt *p, char *msg, struct sip_request *req);
403 static int transmit_response_with_sdp(struct sip_pvt *p, char *msg, struct sip_request *req, int retrans);
404 static int transmit_response_with_auth(struct sip_pvt *p, char *msg, struct sip_request *req, char *rand, int reliable);
405 static int transmit_request(struct sip_pvt *p, char *msg, int inc, int reliable);
406 static int transmit_request_with_auth(struct sip_pvt *p, char *msg, int inc, int reliable);
407 static int transmit_invite(struct sip_pvt *p, char *msg, int sendsdp, char *auth, char *authheader, char *vxml_url,char *distinctive_ring, int init);
408 static int transmit_reinvite_with_sdp(struct sip_pvt *p, struct ast_rtp *rtp, struct ast_rtp *vrtp);
409 static int transmit_info_with_digit(struct sip_pvt *p, char digit);
410 static int transmit_message_with_text(struct sip_pvt *p, char *text);
411 static int transmit_refer(struct sip_pvt *p, char *dest);
412 static struct sip_peer *temp_peer(char *name);
413 static int do_proxy_auth(struct sip_pvt *p, struct sip_request *req, char *header, char *respheader, char *msg, int init);
414 static char *getsipuri(char *header);
415 static void free_old_route(struct sip_route *route);
416 static int build_reply_digest(struct sip_pvt *p, char *orig_header, char *digest, int digest_len);
417 static int find_user(struct sip_pvt *fup, int event);
418 static void prune_peers(void);
419
420 static int __sip_xmit(struct sip_pvt *p, char *data, int len)
421 {
422         int res;
423         if (p->nat)
424             res=sendto(sipsock, data, len, 0, (struct sockaddr *)&p->recv, sizeof(struct sockaddr_in));
425         else
426             res=sendto(sipsock, data, len, 0, (struct sockaddr *)&p->sa, sizeof(struct sockaddr_in));
427         if (res != len) {
428                 ast_log(LOG_WARNING, "sip_xmit of %p (len %d) to %s returned %d: %s\n", data, len, inet_ntoa(p->sa.sin_addr), res, strerror(errno));
429         }
430         return res;
431 }
432
433 static void sip_destroy(struct sip_pvt *p);
434
435 static int ast_sip_ouraddrfor(struct in_addr *them, struct in_addr *us)
436 {
437         if (use_external_ip) {
438                 return -1;
439         } else {
440                 if (bindaddr.sin_addr.s_addr)
441                         memcpy(us, &bindaddr.sin_addr, sizeof(struct in_addr));
442                 else
443                         return ast_ouraddrfor(them, us);
444                 }
445         return 0;
446 }
447
448 static int retrans_pkt(void *data)
449 {
450         struct sip_pkt *pkt=data;
451         int res = 0;
452         ast_mutex_lock(&pkt->owner->lock);
453         if (pkt->retrans < MAX_RETRANS) {
454                 pkt->retrans++;
455                 if (sipdebug) {
456                         if (pkt->owner->nat)
457                                 ast_verbose("Retransmitting #%d (NAT):\n%s\n to %s:%d\n", pkt->retrans, pkt->data, inet_ntoa(pkt->owner->recv.sin_addr), ntohs(pkt->owner->recv.sin_port));
458                         else
459                                 ast_verbose("Retransmitting #%d (no NAT):\n%s\n to %s:%d\n", pkt->retrans, pkt->data, inet_ntoa(pkt->owner->sa.sin_addr), ntohs(pkt->owner->sa.sin_port));
460                 }
461                 __sip_xmit(pkt->owner, pkt->data, pkt->packetlen);
462                 res = 1;
463         } else {
464                 ast_log(LOG_WARNING, "Maximum retries exceeded on call %s for seqno %d (%s)\n", pkt->owner->callid, pkt->seqno, pkt->resp ? "Response" : "Request");
465                 pkt->retransid = -1;
466                 while(pkt->owner->owner && ast_mutex_trylock(&pkt->owner->owner->lock)) {
467                         ast_mutex_unlock(&pkt->owner->lock);
468                         usleep(1);
469                         ast_mutex_lock(&pkt->owner->lock);
470                 }
471                 if (pkt->owner->owner) {
472                         /* XXX Potential deadlocK?? XXX */
473                         ast_queue_hangup(pkt->owner->owner, 0);
474                         ast_mutex_unlock(&pkt->owner->owner->lock);
475                 } else {
476                         /* If no owner, destroy now */
477                         pkt->owner->needdestroy = 1;
478                 }
479         }
480         if (pkt)
481                 ast_mutex_unlock(&pkt->owner->lock);
482         return res;
483 }
484
485 static int __sip_reliable_xmit(struct sip_pvt *p, int seqno, int resp, char *data, int len)
486 {
487         struct sip_pkt *pkt;
488         pkt = malloc(sizeof(struct sip_pkt) + len);
489         if (!pkt)
490                 return -1;
491         memset(pkt, 0, sizeof(struct sip_pkt));
492         memcpy(pkt->data, data, len);
493         pkt->packetlen = len;
494         pkt->next = p->packets;
495         pkt->owner = p;
496         pkt->seqno = seqno;
497         pkt->resp = resp;
498         /* Schedule retransmission */
499         pkt->retransid = ast_sched_add(sched, DEFAULT_RETRANS, retrans_pkt, pkt);
500         pkt->next = p->packets;
501         p->packets = pkt;
502         __sip_xmit(pkt->owner, pkt->data, pkt->packetlen);
503         if (!strncasecmp(pkt->data, "INVITE", 6)) {
504                 /* Note this is a pending invite */
505                 p->pendinginvite = seqno;
506         }
507         return 0;
508 }
509
510 static int __sip_autodestruct(void *data)
511 {
512         struct sip_pvt *p = data;
513         p->autokillid = -1;
514         ast_log(LOG_DEBUG, "Auto destroying call '%s'\n", p->callid);
515         if (p->owner) {
516                 ast_log(LOG_WARNING, "Autodestruct on call '%s' with owner in place\n", p->callid);
517                 ast_queue_hangup(p->owner, 0);
518         } else {
519                 sip_destroy(p);
520         }
521         return 0;
522 }
523
524 static int sip_scheddestroy(struct sip_pvt *p, int ms)
525 {
526         if (p->autokillid > -1)
527                 ast_sched_del(sched, p->autokillid);
528         p->autokillid = ast_sched_add(sched, ms, __sip_autodestruct, p);
529         return 0;
530 }
531
532 static int sip_cancel_destroy(struct sip_pvt *p)
533 {
534         if (p->autokillid > -1)
535                 ast_sched_del(sched, p->autokillid);
536         p->autokillid = -1;
537         return 0;
538 }
539
540 static int __sip_ack(struct sip_pvt *p, int seqno, int resp)
541 {
542         struct sip_pkt *cur, *prev = NULL;
543         int res = -1;
544         int resetinvite = 0;
545         cur = p->packets;
546         while(cur) {
547                 if ((cur->seqno == seqno) && (cur->resp == resp)) {
548                         if (!resp && (seqno == p->pendinginvite)) {
549                                 ast_log(LOG_DEBUG, "Acked pending invite %d\n", p->pendinginvite);
550                                 p->pendinginvite = 0;
551                                 resetinvite = 1;
552                         }
553                         /* this is our baby */
554                         if (prev)
555                                 prev->next = cur->next;
556                         else
557                                 p->packets = cur->next;
558                         if (cur->retransid > -1)
559                                 ast_sched_del(sched, cur->retransid);
560                         free(cur);
561                         res = 0;
562                         break;
563                 }
564                 prev = cur;
565                 cur = cur->next;
566         }
567         ast_log(LOG_DEBUG, "Stopping retransmission on '%s' of %s %d: %s\n", p->callid, resp ? "Response" : "Request", seqno, res ? "Not Found" : "Found");
568         return res;
569 }
570
571 static int __sip_semi_ack(struct sip_pvt *p, int seqno, int resp)
572 {
573         struct sip_pkt *cur;
574         int res = -1;
575         cur = p->packets;
576         while(cur) {
577                 if ((cur->seqno == seqno) && (cur->resp == resp)) {
578                         /* this is our baby */
579                         if (cur->retransid > -1)
580                                 ast_sched_del(sched, cur->retransid);
581                         cur->retransid = -1;
582                         res = 0;
583                         break;
584                 }
585                 cur = cur->next;
586         }
587         ast_log(LOG_DEBUG, "(Provisional) Stopping retransmission (but retaining packet) on '%s' %s %d: %s\n", p->callid, resp ? "Response" : "Request", seqno, res ? "Not Found" : "Found");
588         return res;
589 }
590
591 static int send_response(struct sip_pvt *p, struct sip_request *req, int reliable, int seqno)
592 {
593         int res;
594         if (sipdebug) {
595                 if (p->nat)
596                         ast_verbose("%sTransmitting (NAT):\n%s\n to %s:%d\n", reliable ? "Reliably " : "", req->data, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
597                 else
598                         ast_verbose("%sTransmitting (no NAT):\n%s\n to %s:%d\n", reliable ? "Reliably " : "", req->data, inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
599         }
600         if (reliable)
601                 res = __sip_reliable_xmit(p, seqno, 1, req->data, req->len);
602         else
603                 res = __sip_xmit(p, req->data, req->len);
604         if (res > 0)
605                 res = 0;
606         return res;
607 }
608
609 static int send_request(struct sip_pvt *p, struct sip_request *req, int reliable, int seqno)
610 {
611         int res;
612         if (sipdebug) {
613                 if (p->nat)
614                         ast_verbose("%sTransmitting:\n%s (NAT) to %s:%d\n", reliable ? "Reliably " : "", req->data, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
615                 else
616                         ast_verbose("%sTransmitting:\n%s (no NAT) to %s:%d\n", reliable ? "Reliably " : "", req->data, inet_ntoa(p->sa.sin_addr), ntohs(p->sa.sin_port));
617         }
618         if (reliable)
619                 res = __sip_reliable_xmit(p, seqno, 0, req->data, req->len);
620         else
621                 res = __sip_xmit(p, req->data, req->len);
622         return res;
623 }
624
625 static char *ditch_braces(char *tmp)
626 {
627         char *c = tmp;
628         char *n;
629         c = tmp;
630         if ((n = strchr(tmp, '<')) ) {
631                 c = n + 1;
632                 while(*c && *c != '>') c++;
633                 if (*c != '>') {
634                         ast_log(LOG_WARNING, "No closing brace in '%s'\n", tmp);
635                 } else {
636                         *c = '\0';
637                 }
638                 return n+1;
639         }
640         return c;
641 }
642
643 static int sip_sendtext(struct ast_channel *ast, char *text)
644 {
645         struct sip_pvt *p = ast->pvt->pvt;
646         if (sipdebug) 
647                 ast_verbose("Sending text %s on %s\n", text, ast->name);
648         if (!p)
649                 return -1;
650         if (!text || !strlen(text))
651                 return 0;
652         if (sipdebug)
653                 ast_verbose("Really sending text %s on %s\n", text, ast->name);
654         transmit_message_with_text(p, text);
655         return 0;       
656 }
657
658 static int create_addr(struct sip_pvt *r, char *peer)
659 {
660         struct hostent *hp;
661         struct sip_peer *p;
662         int found=0;
663         char *port;
664         int portno;
665         char host[256], *hostn;
666
667         r->sa.sin_family = AF_INET;
668         ast_mutex_lock(&peerl.lock);
669         p = peerl.peers;
670         while(p) {
671                 if (!strcasecmp(p->name, peer)) {
672                         found++;
673                         r->capability = p->capability;
674                         r->nat = p->nat;
675                         if (r->rtp) {
676                                 ast_log(LOG_DEBUG, "Setting NAT on RTP to %d\n", r->nat);
677                                 ast_rtp_setnat(r->rtp, r->nat);
678                         }
679                         if (r->vrtp) {
680                                 ast_log(LOG_DEBUG, "Setting NAT on VRTP to %d\n", r->nat);
681                                 ast_rtp_setnat(r->vrtp, r->nat);
682                         }
683                         strncpy(r->peername, p->username, sizeof(r->peername)-1);
684                         strncpy(r->peersecret, p->secret, sizeof(r->peersecret)-1);
685                         strncpy(r->peermd5secret, p->md5secret, sizeof(r->peermd5secret)-1);
686                         strncpy(r->username, p->username, sizeof(r->username)-1);
687                         strncpy(r->tohost, p->tohost, sizeof(r->tohost)-1);
688                         if (!strlen(r->tohost)) {
689                                 if (p->addr.sin_addr.s_addr)
690                                         snprintf(r->tohost, sizeof(r->tohost), inet_ntoa(p->addr.sin_addr));
691                                 else
692                                         snprintf(r->tohost, sizeof(r->tohost), inet_ntoa(p->defaddr.sin_addr));
693                         }
694                         if (strlen(p->fromdomain))
695                                 strncpy(r->fromdomain, p->fromdomain, sizeof(r->fromdomain)-1);
696                         if (strlen(p->fromuser))
697                                 strncpy(r->fromuser, p->fromuser, sizeof(r->fromuser)-1);
698                         r->insecure = p->insecure;
699                         r->canreinvite = p->canreinvite;
700                         r->maxtime = p->maxms;
701                         r->callgroup = p->callgroup;
702                         r->pickupgroup = p->pickupgroup;
703                         if (p->dtmfmode) {
704                                 r->dtmfmode = p->dtmfmode;
705                                 if (r->dtmfmode & SIP_DTMF_RFC2833)
706                                         r->noncodeccapability |= AST_RTP_DTMF;
707                                 else
708                                         r->noncodeccapability &= ~AST_RTP_DTMF;
709                         }
710                         strncpy(r->context, p->context,sizeof(r->context)-1);
711                         if ((p->addr.sin_addr.s_addr || p->defaddr.sin_addr.s_addr) &&
712                                 (!p->maxms || ((p->lastms > 0)  && (p->lastms <= p->maxms)))) {
713                                 if (p->addr.sin_addr.s_addr) {
714                                         r->sa.sin_addr = p->addr.sin_addr;
715                                         r->sa.sin_port = p->addr.sin_port;
716                                 } else {
717                                         r->sa.sin_addr = p->defaddr.sin_addr;
718                                         r->sa.sin_port = p->defaddr.sin_port;
719                                 }
720                                 memcpy(&r->recv, &r->sa, sizeof(r->recv));
721                                 break;
722                         }
723                 }
724                 p = p->next;
725         }
726         ast_mutex_unlock(&peerl.lock);
727         if (!p && !found) {
728                 if ((port=strchr(peer, ':'))) {
729                         *port='\0';
730                         port++;
731                 }
732                 hostn = peer;
733                 if (port)
734                         portno = atoi(port);
735                 else
736                         portno = DEFAULT_SIP_PORT;
737                 if (srvlookup) {
738                         char service[256];
739                         int tportno;
740                         int ret;
741                         snprintf(service, sizeof(service), "_sip._udp.%s", peer);
742                         ret = ast_get_srv(NULL, host, sizeof(host), &tportno, service);
743                         if (ret > 0) {
744                                 hostn = host;
745                                 portno = tportno;
746                         }
747                 }
748                 hp = gethostbyname(hostn);
749                 if (hp) {
750                         strncpy(r->tohost, peer, sizeof(r->tohost) - 1);
751                         memcpy(&r->sa.sin_addr, hp->h_addr, sizeof(r->sa.sin_addr));
752                         r->sa.sin_port = htons(portno);
753                         memcpy(&r->recv, &r->sa, sizeof(r->recv));
754                         return 0;
755                 } else {
756                         ast_log(LOG_WARNING, "No such host: %s\n", peer);
757                         return -1;
758                 }
759         } else if (!p)
760                 return -1;
761         else
762                 return 0;
763 }
764
765 static int auto_congest(void *nothing)
766 {
767         struct sip_pvt *p = nothing;
768         ast_mutex_lock(&p->lock);
769         p->initid = -1;
770         if (p->owner) {
771                 if (!ast_mutex_trylock(&p->owner->lock)) {
772                         ast_log(LOG_NOTICE, "Auto-congesting %s\n", p->owner->name);
773                         ast_queue_control(p->owner, AST_CONTROL_CONGESTION, 0);
774                         ast_mutex_unlock(&p->owner->lock);
775                 }
776         }
777         ast_mutex_unlock(&p->lock);
778         return 0;
779 }
780
781 static void sip_prefs_free(void)
782 {
783         struct sip_codec_pref *cur, *next;
784         cur = prefs;
785         while(cur) {
786                 next = cur->next;
787                 free(cur);
788                 cur = next;
789         }
790         prefs = NULL;
791 }
792
793 static void sip_pref_remove(int format)
794 {
795         struct sip_codec_pref *cur, *prev=NULL;
796         cur = prefs;
797         while(cur) {
798                 if (cur->codec == format) {
799                         if (prev)
800                                 prev->next = cur->next;
801                         else
802                                 prefs = cur->next;
803                         free(cur);
804                         return;
805                 }
806                 prev = cur;
807                 cur = cur->next;
808         }
809 }
810
811 static int sip_pref_append(int format)
812 {
813         struct sip_codec_pref *cur, *tmp;
814         sip_pref_remove(format);
815         tmp = (struct sip_codec_pref *)malloc(sizeof(struct sip_codec_pref));
816         if (!tmp)
817                 return -1;
818         memset(tmp, 0, sizeof(struct sip_codec_pref));
819         tmp->codec = format;
820         if (prefs) {
821                 cur = prefs;
822                 while(cur->next)
823                         cur = cur->next;
824                 cur->next = tmp;
825         } else
826                 prefs = tmp;
827         return 0;
828 }
829
830 static int sip_codec_choose(int formats)
831 {
832         struct sip_codec_pref *cur;
833         formats &= (AST_FORMAT_MAX_AUDIO - 1);
834         cur = prefs;
835         while(cur) {
836                 if (formats & cur->codec)
837                         return cur->codec;
838                 cur = cur->next;
839         }
840         return ast_best_codec(formats);
841 }
842
843 static int sip_call(struct ast_channel *ast, char *dest, int timeout)
844 {
845         int res;
846         struct sip_pvt *p;
847         char *vxml_url = NULL;
848         char *distinctive_ring = NULL;
849         struct varshead *headp;
850         struct ast_var_t *current;
851         
852         p = ast->pvt->pvt;
853         if ((ast->_state != AST_STATE_DOWN) && (ast->_state != AST_STATE_RESERVED)) {
854                 ast_log(LOG_WARNING, "sip_call called on %s, neither down nor reserved\n", ast->name);
855                 return -1;
856         }
857         /* Check whether there is vxml_url, distinctive ring variables */
858
859         headp=&ast->varshead;
860         AST_LIST_TRAVERSE(headp,current,entries) {
861                 /* Check whether there is a VXML_URL variable */
862                 if (strcasecmp(ast_var_name(current),"VXML_URL")==0)
863                 {
864                         vxml_url = ast_var_value(current);
865                         break;
866                 }
867                 /* Check whether there is a ALERT_INFO variable */
868                 if (strcasecmp(ast_var_name(current),"ALERT_INFO")==0)
869                 {
870                         distinctive_ring = ast_var_value(current);
871                         break;
872                 }
873         }
874         
875         res = 0;
876         p->outgoing = 1;
877         ast_log(LOG_DEBUG, "Outgoing Call for %s\n", p->username);
878         res = find_user(p,INC_OUT_USE);
879         if ( res != -1 ) {
880                 p->restrictcid = ast->restrictcid;
881                 p->jointcapability = p->capability;
882                 transmit_invite(p, "INVITE", 1, NULL, NULL, vxml_url,distinctive_ring, 1);
883                 if (p->maxtime) {
884                         /* Initialize auto-congest time */
885                         p->initid = ast_sched_add(sched, p->maxtime * 4, auto_congest, p);
886                 }
887         }
888         return res;
889 }
890
891 static void __sip_destroy(struct sip_pvt *p, int lockowner)
892 {
893         struct sip_pvt *cur, *prev = NULL;
894         struct sip_pkt *cp;
895         if (sipdebug)
896                 ast_log(LOG_DEBUG, "Destorying call '%s'\n", p->callid);
897         if (p->stateid > -1)
898                 ast_extension_state_del(p->stateid, NULL);
899         if (p->initid > -1)
900                 ast_sched_del(sched, p->initid);
901         if (p->autokillid > -1)
902                 ast_sched_del(sched, p->autokillid);
903
904         if (p->rtp) {
905                 ast_rtp_destroy(p->rtp);
906         }
907         if (p->vrtp) {
908                 ast_rtp_destroy(p->vrtp);
909         }
910         if (p->route) {
911                 free_old_route(p->route);
912                 p->route = NULL;
913         }
914         if (p->registry) {
915                 /* Carefully unlink from registry */
916                 struct sip_registry *reg;
917                 reg = registrations;
918                 while(reg) {
919                         if ((reg == p->registry) && (p->registry->call == p))
920                                 p->registry->call=NULL;
921                         reg = reg->next;
922                 }
923         }
924         /* Unlink us from the owner if we have one */
925         if (p->owner) {
926                 if (lockowner)
927                         ast_mutex_lock(&p->owner->lock);
928                 ast_log(LOG_DEBUG, "Detaching from %s\n", p->owner->name);
929                 p->owner->pvt->pvt = NULL;
930                 if (lockowner)
931                         ast_mutex_unlock(&p->owner->lock);
932         }
933         cur = iflist;
934         while(cur) {
935                 if (cur == p) {
936                         if (prev)
937                                 prev->next = cur->next;
938                         else
939                                 iflist = cur->next;
940                         break;
941                 }
942                 prev = cur;
943                 cur = cur->next;
944         }
945         if (!cur) {
946                 ast_log(LOG_WARNING, "%p is not in list?!?! \n", cur);
947         } else {
948                 if (p->initid > -1)
949                         ast_sched_del(sched, p->initid);
950                 while((cp = p->packets)) {
951                         p->packets = p->packets->next;
952                         if (cp->retransid > -1)
953                                 ast_sched_del(sched, cp->retransid);
954                         free(cp);
955                 }
956                 free(p);
957         }
958 }
959
960 static int find_user(struct sip_pvt *fup, int event)
961 {
962         char name[256] = "";
963         struct sip_user *u;
964         strncpy(name, fup->username, sizeof(name) - 1);
965         ast_mutex_lock(&userl.lock);
966         u = userl.users;
967         while(u) {
968                 if (!strcasecmp(u->name, name)) {
969                         break;
970                 }
971                 u = u->next;
972         }
973         if (!u) {
974                 ast_log(LOG_DEBUG, "%s is not a local user\n", name);
975                 ast_mutex_unlock(&userl.lock);
976                 return 0;
977         }
978         switch(event) {
979                 /* incoming and outgoing affects the inUse counter */
980                 case DEC_OUT_USE:
981                 case DEC_IN_USE:
982                         if ( u->inUse > 0 ) {
983                                 u->inUse--;
984                         } else {
985                                 u->inUse = 0;
986                         }
987                         break;
988                 case INC_IN_USE:
989                 case INC_OUT_USE:
990                         if (u->incominglimit > 0 ) {
991                                 if (u->inUse >= u->incominglimit) {
992                                         ast_log(LOG_ERROR, "Call from user '%s' rejected due to usage limit of %d\n", u->name, u->incominglimit);
993                                         ast_mutex_unlock(&userl.lock);
994                                         /* inc inUse as well */
995                                         if ( event == INC_OUT_USE ) {
996                                                 u->inUse++;
997                                         }
998                                         return -1; 
999                                 }
1000                         }
1001                         u->inUse++;
1002                         ast_log(LOG_DEBUG, "Call from user '%s' is %d out of %d\n", u->name, u->inUse, u->incominglimit);
1003                         break;
1004                 /* we don't use these anymore
1005                 case DEC_OUT_USE:
1006                         if ( u->outUse > 0 ) {
1007                                 u->outUse--;
1008                         } else {
1009                                 u->outUse = 0;
1010                         }
1011                         break;
1012                 case INC_OUT_USE:
1013                         if ( u->outgoinglimit > 0 ) {
1014                                 if ( u->outUse >= u->outgoinglimit ) {
1015                                         ast_log(LOG_ERROR, "Outgoing call from user '%s' rejected due to usage limit of %d\n", u->name, u->outgoinglimit);
1016                                         ast_mutex_unlock(&userl.lock);
1017                                         return -1;
1018                                 }
1019                         }
1020                         u->outUse++;
1021                         break;
1022                 */
1023                 default:
1024                         ast_log(LOG_ERROR, "find_user(%s,%d) called with no event!\n",u->name,event);
1025         }
1026         ast_mutex_unlock(&userl.lock);
1027         return 0;
1028 }
1029
1030 static void sip_destroy(struct sip_pvt *p)
1031 {
1032         ast_mutex_lock(&iflock);
1033         __sip_destroy(p, 1);
1034         ast_mutex_unlock(&iflock);
1035 }
1036
1037 static int transmit_response_reliable(struct sip_pvt *p, char *msg, struct sip_request *req);
1038
1039 static int hangup_sip2cause(int cause)
1040 {
1041         switch(cause)
1042         {
1043                 case 486:
1044                         return AST_CAUSE_BUSY;
1045                 default:
1046                         return AST_CAUSE_NORMAL;
1047         }
1048         /* Never reached */
1049         return 0;
1050 }
1051
1052 static char *hangup_cause2sip(int cause)
1053 {
1054         switch(cause)
1055         {
1056                 case AST_CAUSE_BUSY:
1057                         return "486 Busy";
1058                 default:
1059                         return NULL;
1060         }
1061         /* Never reached */
1062         return 0;
1063 }
1064
1065 static int sip_hangup(struct ast_channel *ast)
1066 {
1067         struct sip_pvt *p = ast->pvt->pvt;
1068         int needcancel = 0;
1069         int needdestroy = 0;
1070         if (option_debug)
1071                 ast_log(LOG_DEBUG, "sip_hangup(%s)\n", ast->name);
1072         if (!ast->pvt->pvt) {
1073                 ast_log(LOG_DEBUG, "Asked to hangup channel not connected\n");
1074                 return 0;
1075         }
1076         ast_mutex_lock(&p->lock);
1077         if ( p->outgoing ) {
1078                 ast_log(LOG_DEBUG, "find_user(%s) - decrement outUse counter\n", p->username);
1079                 find_user(p, DEC_OUT_USE);
1080         } else {
1081                 ast_log(LOG_DEBUG, "find_user(%s) - decrement inUse counter\n", p->username);
1082                 find_user(p, DEC_IN_USE);
1083         }
1084         /* Determine how to disconnect */
1085         if (p->owner != ast) {
1086                 ast_log(LOG_WARNING, "Huh?  We aren't the owner?\n");
1087                 ast_mutex_unlock(&p->lock);
1088                 return 0;
1089         }
1090         if (!ast || (ast->_state != AST_STATE_UP))
1091                 needcancel = 1;
1092         /* Disconnect */
1093         p = ast->pvt->pvt;
1094         if (p->vad) {
1095             ast_dsp_free(p->vad);
1096         }
1097         p->owner = NULL;
1098         ast->pvt->pvt = NULL;
1099
1100         ast_mutex_lock(&usecnt_lock);
1101         usecnt--;
1102         ast_mutex_unlock(&usecnt_lock);
1103         ast_update_use_count();
1104
1105         needdestroy = 1;
1106         /* Start the process if it's not already started */
1107         if (!p->alreadygone && strlen(p->initreq.data)) {
1108                 if (needcancel) {
1109                         if (p->outgoing) {
1110                                 transmit_request_with_auth(p, "CANCEL", p->ocseq, 1);
1111                                 /* Actually don't destroy us yet, wait for the 487 on our original 
1112                                    INVITE, but do set an autodestruct just in case. */
1113                                 needdestroy = 0;
1114                                 sip_scheddestroy(p, 15000);
1115                                 if ( p->initid != -1 ) {
1116                                         /* channel still up - reverse dec of inUse counter
1117                                            only if the channel is not auto-congested */
1118                                         if ( p->outgoing ) {
1119                                                 find_user(p, INC_OUT_USE);
1120                                         }
1121                                         else {
1122                                                 find_user(p, INC_IN_USE);
1123                                         }
1124                                 }
1125                         } else {
1126                                 char *res;
1127                                 if (ast->hangupcause && ((res = hangup_cause2sip(ast->hangupcause)))) {
1128                                         transmit_response_reliable(p, res, &p->initreq);
1129                                 } else 
1130                                         transmit_response_reliable(p, "403 Forbidden", &p->initreq);
1131                         }
1132                 } else {
1133                         if (!p->pendinginvite) {
1134                                 /* Send a hangup */
1135                                 transmit_request_with_auth(p, "BYE", 0, 1);
1136                         } else {
1137                                 /* Note we will need a BYE when this all settles out
1138                                    but we can't send one while we have "INVITE" outstanding. */
1139                                 p->pendingbye = 1;
1140                         }
1141                 }
1142         }
1143         p->needdestroy = needdestroy;
1144         ast_mutex_unlock(&p->lock);
1145         return 0;
1146 }
1147
1148 static int sip_answer(struct ast_channel *ast)
1149 {
1150         int res = 0,fmt;
1151         char *codec;
1152         struct sip_pvt *p = ast->pvt->pvt;
1153
1154         
1155         if (ast->_state != AST_STATE_UP) {
1156         
1157         
1158         
1159                 codec=pbx_builtin_getvar_helper(p->owner,"SIP_CODEC");
1160                 if (codec) {
1161                         fmt=ast_getformatbyname(codec);
1162                         if (fmt) {
1163                                 ast_log(LOG_NOTICE, "Changing codec to '%s' for this call because of ${SIP_CODEC) variable\n",codec);
1164                                 p->jointcapability=fmt;
1165                         } else ast_log(LOG_NOTICE, "Ignoring ${SIP_CODEC} variable because of unrecognized/not configured codec (check allow/disallow in sip.conf): %s\n",codec);
1166                 }
1167
1168                 ast_setstate(ast, AST_STATE_UP);
1169                 if (option_debug)
1170                         ast_log(LOG_DEBUG, "sip_answer(%s)\n", ast->name);
1171                 res = transmit_response_with_sdp(p, "200 OK", &p->initreq, 1);
1172         }
1173         return res;
1174 }
1175
1176 static int sip_write(struct ast_channel *ast, struct ast_frame *frame)
1177 {
1178         struct sip_pvt *p = ast->pvt->pvt;
1179         int res = 0;
1180         if (frame->frametype == AST_FRAME_VOICE) {
1181                 if (!(frame->subclass & ast->nativeformats)) {
1182                         ast_log(LOG_WARNING, "Asked to transmit frame type %d, while native formats is %d (read/write = %d/%d)\n",
1183                                 frame->subclass, ast->nativeformats, ast->readformat, ast->writeformat);
1184                         return -1;
1185                 }
1186                 if (p) {
1187                         ast_mutex_lock(&p->lock);
1188                         if (p->rtp) {
1189                                 if ((ast->_state != AST_STATE_UP) && !p->progress && !p->outgoing) {
1190                                         transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, 0);
1191                                         p->progress = 1;
1192                                 }
1193                                 res =  ast_rtp_write(p->rtp, frame);
1194                         }
1195                         ast_mutex_unlock(&p->lock);
1196                 }
1197         } else if (frame->frametype == AST_FRAME_VIDEO) {
1198                 if (p) {
1199                         ast_mutex_lock(&p->lock);
1200                         if (p->vrtp) {
1201                                 if ((ast->_state != AST_STATE_UP) && !p->progress && !p->outgoing) {
1202                                         transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, 0);
1203                                         p->progress = 1;
1204                                 }
1205                                 res =  ast_rtp_write(p->vrtp, frame);
1206                         }
1207                         ast_mutex_unlock(&p->lock);
1208                 }
1209         } else if (frame->frametype == AST_FRAME_IMAGE) {
1210                 return 0;
1211         } else {
1212                 ast_log(LOG_WARNING, "Can't send %d type frames with SIP write\n", frame->frametype);
1213                 return 0;
1214         }
1215
1216         return res;
1217 }
1218
1219 static int sip_fixup(struct ast_channel *oldchan, struct ast_channel *newchan)
1220 {
1221         struct sip_pvt *p = newchan->pvt->pvt;
1222         ast_mutex_lock(&p->lock);
1223         if (p->owner != oldchan) {
1224                 ast_log(LOG_WARNING, "old channel wasn't %p but was %p\n", oldchan, p->owner);
1225                 ast_mutex_unlock(&p->lock);
1226                 return -1;
1227         }
1228         p->owner = newchan;
1229         ast_mutex_unlock(&p->lock);
1230         return 0;
1231 }
1232
1233 static int sip_senddigit(struct ast_channel *ast, char digit)
1234 {
1235         struct sip_pvt *p = ast->pvt->pvt;
1236         if (p && (p->dtmfmode & SIP_DTMF_INFO)) {
1237                 transmit_info_with_digit(p, digit);
1238         }
1239         if (p && p->rtp && (p->dtmfmode & SIP_DTMF_RFC2833)) {
1240                 ast_rtp_senddigit(p->rtp, digit);
1241         }
1242         /* If in-band DTMF is desired, send that */
1243         if (p->dtmfmode & SIP_DTMF_INBAND)
1244                 return -1;
1245         return 0;
1246 }
1247
1248 static int sip_transfer(struct ast_channel *ast, char *dest)
1249 {
1250         struct sip_pvt *p = ast->pvt->pvt;
1251         int res;
1252         res = transmit_refer(p, dest);
1253         return res;
1254 }
1255
1256 static int sip_indicate(struct ast_channel *ast, int condition)
1257 {
1258         struct sip_pvt *p = ast->pvt->pvt;
1259         switch(condition) {
1260         case AST_CONTROL_RINGING:
1261                 if (ast->_state == AST_STATE_RING) {
1262                         if (!p->progress && !p->ringing) {
1263                                 transmit_response(p, "180 Ringing", &p->initreq);
1264                                 p->ringing = 1;
1265                                 break;
1266                         } else {
1267                                 /* Oops, we've sent progress tones.  Let Asterisk do it instead */
1268                         }
1269                 }
1270                 return -1;
1271         case AST_CONTROL_BUSY:
1272                 if (ast->_state != AST_STATE_UP) {
1273                         transmit_response(p, "486 Busy Here", &p->initreq);
1274                         p->alreadygone = 1;
1275                         ast_softhangup_nolock(ast, AST_SOFTHANGUP_DEV);
1276                         break;
1277                 }
1278                 return -1;
1279         case AST_CONTROL_CONGESTION:
1280                 if (ast->_state != AST_STATE_UP) {
1281                         transmit_response(p, "503 Service Unavailable", &p->initreq);
1282                         p->alreadygone = 1;
1283                         ast_softhangup_nolock(ast, AST_SOFTHANGUP_DEV);
1284                         break;
1285                 }
1286                 return -1;
1287         case AST_CONTROL_PROGRESS:
1288                 if ((ast->_state != AST_STATE_UP) && !p->progress && !p->outgoing) {
1289                         transmit_response_with_sdp(p, "183 Session Progress", &p->initreq, 0);
1290                         p->progress = 1;
1291                         break;
1292                 }
1293                 return -1;
1294         case -1:
1295                 return -1;
1296         default:
1297                 ast_log(LOG_WARNING, "Don't know how to indicate condition %d\n", condition);
1298                 return -1;
1299         }
1300         return 0;
1301 }
1302
1303
1304
1305 static struct ast_channel *sip_new(struct sip_pvt *i, int state, char *title)
1306 {
1307         struct ast_channel *tmp;
1308         int fmt;
1309         tmp = ast_channel_alloc(1);
1310         if (tmp) {
1311                 /* Select our native format based on codec preference until we receive
1312                    something from another device to the contrary. */
1313                 if (i->jointcapability)
1314                         tmp->nativeformats = sip_codec_choose(i->jointcapability);
1315                 else if (i->capability)
1316                         tmp->nativeformats = sip_codec_choose(i->capability);
1317                 else
1318                         tmp->nativeformats = sip_codec_choose(capability);
1319                 fmt = ast_best_codec(tmp->nativeformats);
1320                 if (title)
1321                         snprintf(tmp->name, sizeof(tmp->name), "SIP/%s-%04x", title, rand() & 0xffff);
1322                 else
1323                         if (strchr(i->fromdomain,':'))
1324                         {
1325                                 snprintf(tmp->name, sizeof(tmp->name), "SIP/%s-%08x", strchr(i->fromdomain,':')+1, (int)(i));
1326                         }
1327                         else
1328                         {
1329                                 snprintf(tmp->name, sizeof(tmp->name), "SIP/%s-%08x", i->fromdomain, (int)(i));
1330                         }
1331                 tmp->type = type;
1332                 if (i->dtmfmode & SIP_DTMF_INBAND) {
1333                     i->vad = ast_dsp_new();
1334                     ast_dsp_set_features(i->vad, DSP_FEATURE_DTMF_DETECT);
1335                 }
1336                 tmp->fds[0] = ast_rtp_fd(i->rtp);
1337                 tmp->fds[1] = ast_rtcp_fd(i->rtp);
1338                 if (i->vrtp) {
1339                         tmp->fds[2] = ast_rtp_fd(i->vrtp);
1340                         tmp->fds[3] = ast_rtcp_fd(i->vrtp);
1341                 }
1342                 ast_setstate(tmp, state);
1343                 if (state == AST_STATE_RING)
1344                         tmp->rings = 1;
1345                 tmp->adsicpe = AST_ADSI_UNAVAILABLE;
1346                 tmp->writeformat = fmt;
1347                 tmp->pvt->rawwriteformat = fmt;
1348                 tmp->readformat = fmt;
1349                 tmp->pvt->rawreadformat = fmt;
1350                 tmp->pvt->pvt = i;
1351                 tmp->pvt->send_text = sip_sendtext;
1352                 tmp->pvt->call = sip_call;
1353                 tmp->pvt->hangup = sip_hangup;
1354                 tmp->pvt->answer = sip_answer;
1355                 tmp->pvt->read = sip_read;
1356                 tmp->pvt->write = sip_write;
1357                 tmp->pvt->write_video = sip_write;
1358                 tmp->pvt->indicate = sip_indicate;
1359                 tmp->pvt->transfer = sip_transfer;
1360                 tmp->pvt->fixup = sip_fixup;
1361                 tmp->pvt->send_digit = sip_senddigit;
1362
1363                 tmp->pvt->bridge = ast_rtp_bridge;
1364
1365                 tmp->callgroup = i->callgroup;
1366                 tmp->pickupgroup = i->pickupgroup;
1367                 tmp->restrictcid = i->restrictcid;
1368                 if (strlen(i->accountcode))
1369                         strncpy(tmp->accountcode, i->accountcode, sizeof(tmp->accountcode)-1);
1370                 if (i->amaflags)
1371                         tmp->amaflags = i->amaflags;
1372                 if (strlen(i->language))
1373                         strncpy(tmp->language, i->language, sizeof(tmp->language)-1);
1374                 i->owner = tmp;
1375                 ast_mutex_lock(&usecnt_lock);
1376                 usecnt++;
1377                 ast_mutex_unlock(&usecnt_lock);
1378                 strncpy(tmp->context, i->context, sizeof(tmp->context)-1);
1379                 strncpy(tmp->exten, i->exten, sizeof(tmp->exten)-1);
1380                 if (strlen(i->callerid))
1381                         tmp->callerid = strdup(i->callerid);
1382                 if (strlen(i->rdnis))
1383                         tmp->rdnis = strdup(i->rdnis);
1384                 tmp->priority = 1;
1385                 if (strlen(i->domain)) {
1386                         pbx_builtin_setvar_helper(tmp, "SIPDOMAIN", i->domain);
1387                 }
1388                                                 
1389                 if (state != AST_STATE_DOWN) {
1390                         if (ast_pbx_start(tmp)) {
1391                                 ast_log(LOG_WARNING, "Unable to start PBX on %s\n", tmp->name);
1392                                 ast_hangup(tmp);
1393                                 tmp = NULL;
1394                         }
1395                 }
1396         } else
1397                 ast_log(LOG_WARNING, "Unable to allocate channel structure\n");
1398         return tmp;
1399 }
1400
1401 static struct cfalias {
1402         char *fullname;
1403         char *shortname;
1404 } aliases[] = {
1405         { "Content-Type", "c" },
1406         { "Content-Encoding", "e" },
1407         { "From", "f" },
1408         { "Call-ID", "i" },
1409         { "Contact", "m" },
1410         { "Content-Length", "l" },
1411         { "Subject", "s" },
1412         { "To", "t" },
1413         { "Via", "v" },
1414 };
1415
1416 static char* get_sdp_by_line(char* line, char *name, int nameLen) {
1417   if (strncasecmp(line, name, nameLen) == 0 && line[nameLen] == '=') {
1418     char* r = line + nameLen + 1;
1419     while (*r && (*r < 33)) ++r;
1420     return r;
1421   }
1422
1423   return "";
1424 }
1425
1426 static char *get_sdp(struct sip_request *req, char *name) {
1427   int x;
1428   int len = strlen(name);
1429   char *r;
1430
1431   for (x=0; x<req->lines; x++) {
1432     r = get_sdp_by_line(req->line[x], name, len);
1433     if (r[0] != '\0') return r;
1434   }
1435   return "";
1436 }
1437
1438 static void sdpLineNum_iterator_init(int* iterator) {
1439   *iterator = 0;
1440 }
1441
1442 static char* get_sdp_iterate(int* iterator,
1443                              struct sip_request *req, char *name) {
1444   int len = strlen(name);
1445   char *r;
1446   while (*iterator < req->lines) {
1447     r = get_sdp_by_line(req->line[(*iterator)++], name, len);
1448     if (r[0] != '\0') return r;
1449   }
1450   return "";
1451 }
1452
1453 static char *__get_header(struct sip_request *req, char *name, int *start)
1454 {
1455         int x;
1456         int len = strlen(name);
1457         char *r;
1458         for (x=*start;x<req->headers;x++) {
1459                 if (!strncasecmp(req->header[x], name, len) && 
1460                                 (req->header[x][len] == ':')) {
1461                                         r = req->header[x] + len + 1;
1462                                         while(*r && (*r < 33))
1463                                                         r++;
1464                                         *start = x+1;
1465                                         return r;
1466                 }
1467         }
1468         /* Try aliases */
1469         for (x=0;x<sizeof(aliases) / sizeof(aliases[0]); x++) 
1470                 if (!strcasecmp(aliases[x].fullname, name))
1471                         return __get_header(req, aliases[x].shortname, start);
1472
1473         /* Don't return NULL, so get_header is always a valid pointer */
1474         return "";
1475 }
1476
1477 static char *get_header(struct sip_request *req, char *name)
1478 {
1479         int start = 0;
1480         return __get_header(req, name, &start);
1481 }
1482
1483 static struct ast_frame *sip_rtp_read(struct ast_channel *ast, struct sip_pvt *p)
1484 {
1485         /* Retrieve audio/etc from channel.  Assumes p->lock is already held. */
1486         struct ast_frame *f;
1487         static struct ast_frame null_frame = { AST_FRAME_NULL, };
1488         switch(ast->fdno) {
1489         case 0:
1490                 f = ast_rtp_read(p->rtp);
1491                 break;
1492         case 1:
1493                 f = ast_rtcp_read(p->rtp);
1494                 break;
1495         case 2:
1496                 f = ast_rtp_read(p->vrtp);
1497                 break;
1498         case 3:
1499                 f = ast_rtcp_read(p->vrtp);
1500                 break;
1501         default:
1502                 f = &null_frame;
1503         }
1504         /* Don't send RFC2833 if we're not supposed to */
1505         if (f && (f->frametype == AST_FRAME_DTMF) && !(p->dtmfmode & SIP_DTMF_RFC2833))
1506                 return &null_frame;
1507         if (p->owner) {
1508                 /* We already hold the channel lock */
1509                 if (f->frametype == AST_FRAME_VOICE) {
1510                         if (f->subclass != p->owner->nativeformats) {
1511                                 ast_log(LOG_DEBUG, "Oooh, format changed to %d\n", f->subclass);
1512                                 p->owner->nativeformats = f->subclass;
1513                                 ast_set_read_format(p->owner, p->owner->readformat);
1514                                 ast_set_write_format(p->owner, p->owner->writeformat);
1515                         }
1516             if (p->dtmfmode & SIP_DTMF_INBAND) {
1517                    f = ast_dsp_process(p->owner,p->vad,f,0);
1518             }
1519                 }
1520         }
1521         return f;
1522 }
1523
1524 static struct ast_frame *sip_read(struct ast_channel *ast)
1525 {
1526         struct ast_frame *fr;
1527         struct sip_pvt *p = ast->pvt->pvt;
1528         ast_mutex_lock(&p->lock);
1529         fr = sip_rtp_read(ast, p);
1530         ast_mutex_unlock(&p->lock);
1531         return fr;
1532 }
1533
1534 static void build_callid(char *callid, int len, struct in_addr ourip)
1535 {
1536         int res;
1537         int val;
1538         int x;
1539         for (x=0;x<4;x++) {
1540                 val = rand();
1541                 res = snprintf(callid, len, "%08x", val);
1542                 len -= res;
1543                 callid += res;
1544         }
1545         /* It's not important that we really use our right IP here... */
1546         snprintf(callid, len, "@%s", inet_ntoa(ourip));
1547 }
1548
1549 static struct sip_pvt *sip_alloc(char *callid, struct sockaddr_in *sin, int useglobalnat)
1550 {
1551         struct sip_pvt *p;
1552
1553         p = malloc(sizeof(struct sip_pvt));
1554         if (!p)
1555                 return NULL;
1556         /* Keep track of stuff */
1557         memset(p, 0, sizeof(struct sip_pvt));
1558         p->initid = -1;
1559         p->autokillid = -1;
1560         p->stateid = -1;
1561         p->rtp = ast_rtp_new(sched, io, 1, 0);
1562         if (videosupport)
1563                 p->vrtp = ast_rtp_new(sched, io, 1, 0);
1564         p->branch = rand();     
1565         p->tag = rand();
1566         
1567         /* Start with 101 instead of 1 */
1568         p->ocseq = 101;
1569         if (!p->rtp) {
1570                 ast_log(LOG_WARNING, "Unable to create RTP session: %s\n", strerror(errno));
1571                 free(p);
1572                 return NULL;
1573         }
1574         ast_rtp_settos(p->rtp, tos);
1575         if (p->vrtp)
1576                 ast_rtp_settos(p->vrtp, tos);
1577         if (useglobalnat && sin) {
1578                 /* Setup NAT structure according to global settings if we have an address */
1579                 p->nat = globalnat;
1580                 memcpy(&p->recv, sin, sizeof(p->recv));
1581                 ast_rtp_setnat(p->rtp, p->nat);
1582                 if (p->vrtp)
1583                         ast_rtp_setnat(p->vrtp, p->nat);
1584         }
1585         ast_mutex_init(&p->lock);
1586
1587         if (sin) {
1588                 memcpy(&p->sa, sin, sizeof(p->sa));
1589                 if (ast_sip_ouraddrfor(&p->sa.sin_addr,&p->ourip))
1590                         memcpy(&p->ourip, &__ourip, sizeof(p->ourip));
1591         } else {
1592                 memcpy(&p->ourip, &__ourip, sizeof(p->ourip));
1593         }
1594         /* z9hG4bK is a magic cookie.  See RFC 3261 section 8.1.1.7 */
1595         snprintf(p->via, sizeof(p->via), "SIP/2.0/UDP %s:%d;branch=z9hG4bK%08x", inet_ntoa(p->ourip), ourport, p->branch);
1596         if (!callid)
1597                 build_callid(p->callid, sizeof(p->callid), p->ourip);
1598         else
1599                 strncpy(p->callid, callid, sizeof(p->callid) - 1);
1600         /* Assume reinvite OK and via INVITE */
1601         p->canreinvite = globalcanreinvite;
1602         p->dtmfmode = globaldtmfmode;
1603         p->capability = capability;
1604         if (p->dtmfmode & SIP_DTMF_RFC2833)
1605                 p->noncodeccapability |= AST_RTP_DTMF;
1606         strncpy(p->context, context, sizeof(p->context) - 1);
1607         strncpy(p->fromdomain, fromdomain, sizeof(p->fromdomain) - 1);
1608         /* Add to list */
1609         ast_mutex_lock(&iflock);
1610         p->next = iflist;
1611         iflist = p;
1612         ast_mutex_unlock(&iflock);
1613         if (option_debug)
1614                 ast_log(LOG_DEBUG, "Allocating new SIP call for %s\n", callid);
1615         return p;
1616 }
1617
1618 static struct sip_pvt *find_call(struct sip_request *req, struct sockaddr_in *sin)
1619 {
1620         struct sip_pvt *p;
1621         char *callid;
1622         char tmp[256] = "";
1623         char *cmd;
1624         char *tag = "", *c;
1625         int themisfrom;
1626         callid = get_header(req, "Call-ID");
1627
1628         if (pedanticsipchecking) {
1629                 /* In principle Call-ID's uniquely identify a call, however some vendors
1630                    (i.e. Pingtel) send multiple calls with the same Call-ID and different
1631                    tags in order to simplify billing.  The RFC does state that we have to
1632                    compare tags in addition to the call-id, but this generate substantially
1633                    more overhead which is totally unnecessary for the vast majority of sane
1634                    SIP implementations, and thus Asterisk does not enable this behavior
1635                    by default. Short version: You'll need this option to support conferencing
1636                    on the pingtel */
1637                 strncpy(tmp, req->header[0], sizeof(tmp) - 1);
1638                 cmd = tmp;
1639                 c = strchr(tmp, ' ');
1640                 if (c)
1641                         *c = '\0';
1642                 if (!strcasecmp(cmd, "SIP/2.0")) {
1643                         themisfrom = 0;
1644                 } else {
1645                         themisfrom = 1;
1646                 }
1647                 if (themisfrom)
1648                         strncpy(tmp, get_header(req, "From"), sizeof(tmp) - 1);
1649                 else
1650                         strncpy(tmp, get_header(req, "To"), sizeof(tmp) - 1);
1651                 tag = strstr(tmp, "tag=");
1652                 if (tag) {
1653                         tag += 4;
1654                         c = strchr(tag, ';');
1655                         if (c)
1656                                 *c = '\0';
1657                 }
1658                         
1659         }
1660                 
1661         if (!strlen(callid)) {
1662                 ast_log(LOG_WARNING, "Call missing call ID from '%s'\n", inet_ntoa(sin->sin_addr));
1663                 return NULL;
1664         }
1665         ast_mutex_lock(&iflock);
1666         p = iflist;
1667         while(p) {
1668                 if (!strcmp(p->callid, callid) && 
1669                         (!pedanticsipchecking || !tag || !strlen(p->theirtag) || !strcmp(p->theirtag, tag))) {
1670                         /* Found the call */
1671                         ast_mutex_lock(&p->lock);
1672                         ast_mutex_unlock(&iflock);
1673                         return p;
1674                 }
1675                 p = p->next;
1676         }
1677         ast_mutex_unlock(&iflock);
1678         p = sip_alloc(callid, sin, 1);
1679         if (p)
1680                 ast_mutex_lock(&p->lock);
1681         return p;
1682 }
1683
1684 static int sip_register(char *value, int lineno)
1685 {
1686         struct sip_registry *reg;
1687         char copy[256] = "";
1688         char *username=NULL, *hostname=NULL, *secret=NULL, *authuser=NULL;
1689         char *porta=NULL;
1690         char *contact=NULL;
1691         char *stringp=NULL;
1692         
1693         struct hostent *hp;
1694         if (!value)
1695                 return -1;
1696         strncpy(copy, value, sizeof(copy)-1);
1697         stringp=copy;
1698         username = stringp;
1699         hostname = strrchr(stringp, '@');
1700         if (hostname) {
1701                 *hostname = '\0';
1702                 hostname++;
1703         }
1704         if (!username || !strlen(username) || !hostname || !strlen(hostname)) {
1705                 ast_log(LOG_WARNING, "Format for registration is user[:secret[:authuser]]@host[:port][/contact] at line %d", lineno);
1706                 return -1;
1707         }
1708         stringp=username;
1709         username = strsep(&stringp, ":");
1710         if (username) {
1711                 secret = strsep(&stringp, ":");
1712                 if (secret) 
1713                         authuser = strsep(&stringp, ":");
1714         }
1715         stringp = hostname;
1716         hostname = strsep(&stringp, "/");
1717         if (hostname) 
1718                 contact = strsep(&stringp, "/");
1719         if (!contact || !strlen(contact))
1720                 contact = "s";
1721         stringp=hostname;
1722         hostname = strsep(&stringp, ":");
1723         porta = strsep(&stringp, ":");
1724         
1725         if (porta && !atoi(porta)) {
1726                 ast_log(LOG_WARNING, "%s is not a valid port number at line %d\n", porta, lineno);
1727                 return -1;
1728         }
1729         hp = gethostbyname(hostname);
1730         if (!hp) {
1731                 ast_log(LOG_WARNING, "Host '%s' not found at line %d\n", hostname, lineno);
1732                 return -1;
1733         }
1734         reg = malloc(sizeof(struct sip_registry));
1735         if (reg) {
1736                 memset(reg, 0, sizeof(struct sip_registry));
1737                 strncpy(reg->contact, contact, sizeof(reg->contact) - 1);
1738                 if (username)
1739                         strncpy(reg->username, username, sizeof(reg->username)-1);
1740                 if (hostname)
1741                         strncpy(reg->hostname, hostname, sizeof(reg->hostname)-1);
1742                 if (authuser)
1743                         strncpy(reg->authuser, authuser, sizeof(reg->authuser)-1);
1744                 if (secret)
1745                         strncpy(reg->secret, secret, sizeof(reg->secret)-1);
1746                 reg->expire = -1;
1747                 reg->timeout =  -1;
1748                 reg->refresh = default_expiry;
1749                 reg->addr.sin_family = AF_INET;
1750                 memcpy(&reg->addr.sin_addr, hp->h_addr, sizeof(&reg->addr.sin_addr));
1751                 reg->addr.sin_port = porta ? htons(atoi(porta)) : htons(DEFAULT_SIP_PORT);
1752                 reg->next = registrations;
1753                 reg->callid_valid = 0;
1754                 reg->ocseq = 101;
1755                 registrations = reg;
1756         } else {
1757                 ast_log(LOG_ERROR, "Out of memory\n");
1758                 return -1;
1759         }
1760         return 0;
1761 }
1762
1763 static void parse(struct sip_request *req)
1764 {
1765         /* Divide fields by NULL's */
1766         char *c;
1767         int f = 0;
1768         c = req->data;
1769
1770         /* First header starts immediately */
1771         req->header[f] = c;
1772         while(*c) {
1773                 if (*c == '\n') {
1774                         /* We've got a new header */
1775                         *c = 0;
1776
1777 #if 0
1778                         printf("Header: %s (%d)\n", req->header[f], strlen(req->header[f]));
1779 #endif                  
1780                         if (!strlen(req->header[f])) {
1781                                 /* Line by itself means we're now in content */
1782                                 c++;
1783                                 break;
1784                         }
1785                         if (f >= SIP_MAX_HEADERS - 1) {
1786                                 ast_log(LOG_WARNING, "Too many SIP headers...\n");
1787                         } else
1788                                 f++;
1789                         req->header[f] = c + 1;
1790                 } else if (*c == '\r') {
1791                         /* Ignore but eliminate \r's */
1792                         *c = 0;
1793                 }
1794                 c++;
1795         }
1796         /* Check for last header */
1797         if (strlen(req->header[f])) 
1798                 f++;
1799         req->headers = f;
1800         /* Now we process any mime content */
1801         f = 0;
1802         req->line[f] = c;
1803         while(*c) {
1804                 if (*c == '\n') {
1805                         /* We've got a new line */
1806                         *c = 0;
1807 #if 0
1808                         printf("Line: %s (%d)\n", req->line[f], strlen(req->line[f]));
1809 #endif                  
1810                         if (f >= SIP_MAX_LINES - 1) {
1811                                 ast_log(LOG_WARNING, "Too many SDP lines...\n");
1812                         } else
1813                                 f++;
1814                         req->line[f] = c + 1;
1815                 } else if (*c == '\r') {
1816                         /* Ignore and eliminate \r's */
1817                         *c = 0;
1818                 }
1819                 c++;
1820         }
1821         /* Check for last line */
1822         if (strlen(req->line[f])) 
1823                 f++;
1824         req->lines = f;
1825         if (sipdebug)
1826                 ast_verbose("%d headers, %d lines\n", req->headers, req->lines);
1827         if (*c) 
1828                 ast_log(LOG_WARNING, "Odd content, extra stuff left over ('%s')\n", c);
1829 }
1830
1831 static int process_sdp(struct sip_pvt *p, struct sip_request *req)
1832 {
1833         char *m;
1834         char *c;
1835         char *a;
1836         char host[258];
1837         int len = -1;
1838         int portno=0;
1839         int vportno=0;
1840         int peercapability, peernoncodeccapability;
1841         int vpeercapability=0, vpeernoncodeccapability=0;
1842         struct sockaddr_in sin;
1843         char *codecs;
1844         struct hostent *hp;
1845         int codec;
1846         int iterator;
1847         int sendonly = 0;
1848         int x;
1849
1850         /* Get codec and RTP info from SDP */
1851         if (strcasecmp(get_header(req, "Content-Type"), "application/sdp")) {
1852                 ast_log(LOG_NOTICE, "Content is '%s', not 'application/sdp'\n", get_header(req, "Content-Type"));
1853                 return -1;
1854         }
1855         m = get_sdp(req, "m");
1856         c = get_sdp(req, "c");
1857         if (!strlen(m) || !strlen(c)) {
1858                 ast_log(LOG_WARNING, "Insufficient information for SDP (m = '%s', c = '%s')\n", m, c);
1859                 return -1;
1860         }
1861         if (sscanf(c, "IN IP4 %256s", host) != 1) {
1862                 ast_log(LOG_WARNING, "Invalid host in c= line, '%s'\n", c);
1863                 return -1;
1864         }
1865         /* XXX This could block for a long time, and block the main thread! XXX */
1866         hp = gethostbyname(host);
1867         if (!hp) {
1868                 ast_log(LOG_WARNING, "Unable to lookup host in c= line, '%s'\n", c);
1869                 return -1;
1870         }
1871         sdpLineNum_iterator_init(&iterator);
1872         while ((m = get_sdp_iterate(&iterator, req, "m"))[0] != '\0') {
1873                 if ((sscanf(m, "audio %d RTP/AVP %n", &x, &len) == 1)) {
1874                         portno = x;
1875                         // Scan through the RTP payload types specified in a "m=" line:
1876                         ast_rtp_pt_clear(p->rtp);
1877                         codecs = m + len;
1878                         while(strlen(codecs)) {
1879                                 if (sscanf(codecs, "%d%n", &codec, &len) != 1) {
1880                                         ast_log(LOG_WARNING, "Error in codec string '%s'\n", codecs);
1881                                         return -1;
1882                                 }
1883                                 if (sipdebug)
1884                                         ast_verbose("Found audio format %s\n", ast_getformatname(codec));
1885                                 ast_rtp_set_m_type(p->rtp, codec);
1886                                 codecs += len;
1887                                 /* Skip over any whitespace */
1888                                 while(*codecs && (*codecs < 33)) codecs++;
1889                         }
1890                 }
1891                 if (p->vrtp && (sscanf(m, "video %d RTP/AVP %n", &x, &len) == 1)) {
1892                         vportno = x;
1893                         // Scan through the RTP payload types specified in a "m=" line:
1894                         ast_rtp_pt_clear(p->vrtp);
1895                         codecs = m + len;
1896                         while(strlen(codecs)) {
1897                                 if (sscanf(codecs, "%d%n", &codec, &len) != 1) {
1898                                         ast_log(LOG_WARNING, "Error in codec string '%s'\n", codecs);
1899                                         return -1;
1900                                 }
1901                                 if (sipdebug)
1902                                         ast_verbose("Found video format %s\n", ast_getformatname(codec));
1903                                 ast_rtp_set_m_type(p->vrtp, codec);
1904                                 codecs += len;
1905                                 /* Skip over any whitespace */
1906                                 while(*codecs && (*codecs < 33)) codecs++;
1907                         }
1908                 }
1909         }
1910         sin.sin_family = AF_INET;
1911         memcpy(&sin.sin_addr, hp->h_addr, sizeof(sin.sin_addr));
1912         /* Setup audio port number */
1913         sin.sin_port = htons(portno);
1914         if (p->rtp && sin.sin_port)
1915                 ast_rtp_set_peer(p->rtp, &sin);
1916         /* Setup video port number */
1917         sin.sin_port = htons(vportno);
1918         if (p->vrtp && sin.sin_port)
1919                 ast_rtp_set_peer(p->vrtp, &sin);
1920 #if 0
1921         printf("Peer RTP is at port %s:%d\n", inet_ntoa(sin.sin_addr), ntohs(sin.sin_port));
1922 #endif  
1923         // Next, scan through each "a=rtpmap:" line, noting each
1924         // specified RTP payload type (with corresponding MIME subtype):
1925         sdpLineNum_iterator_init(&iterator);
1926         while ((a = get_sdp_iterate(&iterator, req, "a"))[0] != '\0') {
1927       char* mimeSubtype = ast_strdupa(a); // ensures we have enough space
1928           if (!strcasecmp(a, "sendonly")) {
1929                 sendonly=1;
1930                 continue;
1931           }
1932           if (!strcasecmp(a, "sendrecv")) {
1933                 sendonly=0;
1934           }
1935           if (sscanf(a, "rtpmap: %u %[^/]/", &codec, mimeSubtype) != 2) continue;
1936           if (sipdebug)
1937                 ast_verbose("Found description format %s\n", mimeSubtype);
1938           // Note: should really look at the 'freq' and '#chans' params too
1939           ast_rtp_set_rtpmap_type(p->rtp, codec, "audio", mimeSubtype);
1940           if (p->vrtp)
1941                   ast_rtp_set_rtpmap_type(p->vrtp, codec, "video", mimeSubtype);
1942         }
1943
1944         // Now gather all of the codecs that were asked for:
1945         ast_rtp_get_current_formats(p->rtp,
1946                                 &peercapability, &peernoncodeccapability);
1947         if (p->vrtp)
1948                 ast_rtp_get_current_formats(p->vrtp,
1949                                 &vpeercapability, &vpeernoncodeccapability);
1950         p->jointcapability = p->capability & (peercapability | vpeercapability);
1951         p->noncodeccapability = noncodeccapability & (peernoncodeccapability | vpeernoncodeccapability);
1952         
1953         if (sipdebug) {
1954                 ast_verbose("Capabilities: us - %d, them - %d/%d, combined - %d\n",
1955                             p->capability, peercapability, vpeercapability, p->jointcapability);
1956                 ast_verbose("Non-codec capabilities: us - %d, them - %d, combined - %d\n",
1957                             noncodeccapability, peernoncodeccapability,
1958                             p->noncodeccapability);
1959         }
1960         if (!p->jointcapability) {
1961                 ast_log(LOG_WARNING, "No compatible codecs!\n");
1962                 return -1;
1963         }
1964         if (p->owner) {
1965                 if (!(p->owner->nativeformats & p->jointcapability)) {
1966                         ast_log(LOG_DEBUG, "Oooh, we need to change our formats since our peer supports only %d and not %d\n", p->jointcapability, p->owner->nativeformats);
1967                         p->owner->nativeformats = sip_codec_choose(p->jointcapability);
1968                         ast_set_read_format(p->owner, p->owner->readformat);
1969                         ast_set_write_format(p->owner, p->owner->writeformat);
1970                 }
1971                 if (p->owner->bridge) {
1972                         /* Turn on/off music on hold if we are holding/unholding */
1973                         if (sin.sin_addr.s_addr && !sendonly) {
1974                                 ast_moh_stop(p->owner->bridge);
1975                         } else {
1976                                 ast_moh_start(p->owner->bridge, NULL);
1977                         }
1978                 }
1979         }
1980         return 0;
1981         
1982 }
1983
1984 static int add_header(struct sip_request *req, char *var, char *value)
1985 {
1986         if (req->len >= sizeof(req->data) - 4) {
1987                 ast_log(LOG_WARNING, "Out of space, can't add anymore (%s:%s)\n", var, value);
1988                 return -1;
1989         }
1990         if (req->lines) {
1991                 ast_log(LOG_WARNING, "Can't add more headers when lines have been added\n");
1992                 return -1;
1993         }
1994         req->header[req->headers] = req->data + req->len;
1995         snprintf(req->header[req->headers], sizeof(req->data) - req->len - 4, "%s: %s\r\n", var, value);
1996         req->len += strlen(req->header[req->headers]);
1997         if (req->headers < SIP_MAX_HEADERS)
1998                 req->headers++;
1999         else {
2000                 ast_log(LOG_WARNING, "Out of header space\n");
2001                 return -1;
2002         }
2003         return 0;       
2004 }
2005
2006 static int add_blank_header(struct sip_request *req)
2007 {
2008         if (req->len >= sizeof(req->data) - 4) {
2009                 ast_log(LOG_WARNING, "Out of space, can't add anymore\n");
2010                 return -1;
2011         }
2012         if (req->lines) {
2013                 ast_log(LOG_WARNING, "Can't add more headers when lines have been added\n");
2014                 return -1;
2015         }
2016         req->header[req->headers] = req->data + req->len;
2017         snprintf(req->header[req->headers], sizeof(req->data) - req->len, "\r\n");
2018         req->len += strlen(req->header[req->headers]);
2019         if (req->headers < SIP_MAX_HEADERS)
2020                 req->headers++;
2021         else {
2022                 ast_log(LOG_WARNING, "Out of header space\n");
2023                 return -1;
2024         }
2025         return 0;       
2026 }
2027
2028 static int add_line(struct sip_request *req, char *line)
2029 {
2030         if (req->len >= sizeof(req->data) - 4) {
2031                 ast_log(LOG_WARNING, "Out of space, can't add anymore\n");
2032                 return -1;
2033         }
2034         if (!req->lines) {
2035                 /* Add extra empty return */
2036                 snprintf(req->data + req->len, sizeof(req->data) - req->len, "\r\n");
2037                 req->len += strlen(req->data + req->len);
2038         }
2039         req->line[req->lines] = req->data + req->len;
2040         snprintf(req->line[req->lines], sizeof(req->data) - req->len, "%s", line);
2041         req->len += strlen(req->line[req->lines]);
2042         if (req->lines < SIP_MAX_LINES)
2043                 req->lines++;
2044         else {
2045                 ast_log(LOG_WARNING, "Out of line space\n");
2046                 return -1;
2047         }
2048         return 0;       
2049 }
2050
2051 static int copy_header(struct sip_request *req, struct sip_request *orig, char *field)
2052 {
2053         char *tmp;
2054         tmp = get_header(orig, field);
2055         if (strlen(tmp)) {
2056                 /* Add what we're responding to */
2057                 return add_header(req, field, tmp);
2058         }
2059         ast_log(LOG_NOTICE, "No field '%s' present to copy\n", field);
2060         return -1;
2061 }
2062
2063 static int copy_all_header(struct sip_request *req, struct sip_request *orig, char *field)
2064 {
2065         char *tmp;
2066         int start = 0;
2067         int copied = 0;
2068         for (;;) {
2069                 tmp = __get_header(orig, field, &start);
2070                 if (strlen(tmp)) {
2071                         /* Add what we're responding to */
2072                         add_header(req, field, tmp);
2073                         copied++;
2074                 } else
2075                         break;
2076         }
2077         return copied ? 0 : -1;
2078 }
2079
2080 static int copy_via_headers(struct sip_pvt *p, struct sip_request *req, struct sip_request *orig, char *field)
2081 {
2082         char *tmp;
2083         int start = 0;
2084         int copied = 0;
2085         char new[256];
2086         for (;;) {
2087                 tmp = __get_header(orig, field, &start);
2088                 if (strlen(tmp)) {
2089                         if (!copied && p->nat) {
2090 #ifdef THE_SIP_AUTHORS_CAN_SUCK_MY_GONADS
2091                                 /* SLD: FIXME: Nice try, but the received= should not have a port */
2092                                 /* SLD: FIXME: See RFC2543 BNF in Section 6.40.5 */
2093                                 /* MAS: Yup, RFC says you can't do it.  No way to indicate PAT...
2094                                    good job fellas. */
2095                                 if (ntohs(p->recv.sin_port) != DEFAULT_SIP_PORT)
2096                                         snprintf(new, sizeof(new), "%s;received=%s:%d", tmp, inet_ntoa(p->recv.sin_addr), ntohs(p->recv.sin_port));
2097                                 else
2098 #endif                          
2099                                         snprintf(new, sizeof(new), "%s;received=%s", tmp, inet_ntoa(p->recv.sin_addr));
2100                                 add_header(req, field, new);
2101                         } else {
2102                                 /* Add what we're responding to */
2103                                 add_header(req, field, tmp);
2104                         }
2105                         copied++;
2106                 } else
2107                         break;
2108         }
2109         if (!copied) {
2110                 ast_log(LOG_NOTICE, "No field '%s' present to copy\n", field);
2111                 return -1;
2112         }
2113         return 0;
2114 }
2115
2116 /* Add Route: header into request per learned route */
2117 static void add_route(struct sip_request *req, struct sip_route *route)
2118 {
2119         char r[256], *p;
2120         int n, rem = 255; /* sizeof(r)-1: Room for terminating 0 */
2121
2122         if (!route) return;
2123
2124         p = r;
2125         while (route) {
2126                 n = strlen(route->hop);
2127                 if ((n+3)>rem) break;
2128                 if (p != r) {
2129                         *p++ = ',';
2130                         --rem;
2131                 }
2132                 *p++ = '<';
2133                 strcpy(p, route->hop);  p += n;
2134                 *p++ = '>';
2135                 rem -= (n+2);
2136                 route = route->next;
2137         }
2138         *p = '\0';
2139         add_header(req, "Route", r);
2140 }
2141
2142 static void set_destination(struct sip_pvt *p, char *uri)
2143 {
2144         char *h, *maddr, hostname[256];
2145         int port, hn;
2146         struct hostent *hp;
2147
2148         /* Parse uri to h (host) and port - uri is already just the part inside the <> */
2149         /* general form we are expecting is sip[s]:username[:password]@host[:port][;...] */
2150
2151         if (sipdebug)
2152                 ast_verbose("set_destination: Parsing <%s> for address/port to send to\n", uri);
2153
2154         /* Find and parse hostname */
2155         h = strchr(uri, '@');
2156         if (h)
2157                 ++h;
2158         else {
2159                 h = uri;
2160                 if (strncmp(h, "sip:", 4) == 0)
2161                         h += 4;
2162                 else if (strncmp(h, "sips:", 5) == 0)
2163                         h += 5;
2164         }
2165         hn = strcspn(h, ":;>");
2166         if (hn>255) hn=255;
2167         strncpy(hostname, h, hn);  hostname[hn] = '\0';
2168         h+=hn;
2169
2170         /* Is "port" present? if not default to 5060 */
2171         if (*h == ':') {
2172                 /* Parse port */
2173                 ++h;
2174                 port = strtol(h, &h, 10);
2175         }
2176         else
2177                 port = 5060;
2178
2179         /* Got the hostname:port - but maybe there's a "maddr=" to override address? */
2180         maddr = strstr(h, "maddr=");
2181         if (maddr) {
2182                 maddr += 6;
2183                 hn = strspn(maddr, "0123456789.");
2184                 if (hn>255) hn=255;
2185                 strncpy(hostname, maddr, hn);  hostname[hn] = '\0';
2186         }
2187         
2188         hp = gethostbyname(hostname);
2189         if (hp == NULL)  {
2190                 ast_log(LOG_WARNING, "Can't find address for host '%s'\n", hostname);
2191                 return;
2192         }
2193         p->sa.sin_family = AF_INET;
2194         memcpy(&p->sa.sin_addr, hp->h_addr, sizeof(p->sa.sin_addr));
2195         p->sa.sin_port = htons(port);
2196         if (sipdebug)
2197                 ast_verbose("set_destination: set destination to %s, port %d\n", inet_ntoa(p->sa.sin_addr), port);
2198 }
2199
2200 static int init_resp(struct sip_request *req, char *resp, struct sip_request *orig)
2201 {
2202         /* Initialize a response */
2203         if (req->headers || req->len) {
2204                 ast_log(LOG_WARNING, "Request already initialized?!?\n");
2205                 return -1;
2206         }
2207         req->header[req->headers] = req->data + req->len;
2208         snprintf(req->header[req->headers], sizeof(req->data) - req->len, "SIP/2.0 %s\r\n", resp);
2209         req->len += strlen(req->header[req->headers]);
2210         if (req->headers < SIP_MAX_HEADERS)
2211                 req->headers++;
2212         else
2213                 ast_log(LOG_WARNING, "Out of header space\n");
2214         return 0;
2215 }
2216
2217 static int init_req(struct sip_request *req, char *resp, char *recip)
2218 {
2219         /* Initialize a response */
2220         if (req->headers || req->len) {
2221                 ast_log(LOG_WARNING, "Request already initialized?!?\n");
2222                 return -1;
2223         }
2224         req->header[req->headers] = req->data + req->len;
2225         snprintf(req->header[req->headers], sizeof(req->data) - req->len, "%s %s SIP/2.0\r\n", resp, recip);
2226         req->len += strlen(req->header[req->headers]);
2227         if (req->headers < SIP_MAX_HEADERS)
2228                 req->headers++;
2229         else
2230                 ast_log(LOG_WARNING, "Out of header space\n");
2231         return 0;
2232 }
2233
2234 static int respprep(struct sip_request *resp, struct sip_pvt *p, char *msg, struct sip_request *req)
2235 {
2236         char newto[256] = "", *ot;
2237         memset(resp, 0, sizeof(*resp));
2238         init_resp(resp, msg, req);
2239         copy_via_headers(p, resp, req, "Via");
2240         if (msg[0] == '2') copy_all_header(resp, req, "Record-Route");
2241         copy_header(resp, req, "From");
2242         ot = get_header(req, "To");
2243         if (!strstr(ot, "tag=")) {
2244                 /* Add the proper tag if we don't have it already.  If they have specified
2245                    their tag, use it.  Otherwise, use our own tag */
2246                 if (strlen(p->theirtag) && p->outgoing)
2247                         snprintf(newto, sizeof(newto), "%s;tag=%s", ot, p->theirtag);
2248                 else if (p->tag && !p->outgoing)
2249                         snprintf(newto, sizeof(newto), "%s;tag=as%08x", ot, p->tag);
2250                 else
2251                         strncpy(newto, ot, sizeof(newto) - 1);
2252                 ot = newto;
2253         }
2254         add_header(resp, "To", ot);
2255         copy_header(resp, req, "Call-ID");
2256         copy_header(resp, req, "CSeq");
2257         add_header(resp, "User-Agent", "Asterisk PBX");
2258         add_header(resp, "Allow", ALLOWED_METHODS);
2259         if (p->expiry) {
2260                 /* For registration responses, we also need expiry and
2261                    contact info */
2262                 char contact[256];
2263                 char tmp[256];
2264                 snprintf(contact, sizeof(contact), "%s;expires=%d", p->our_contact, p->expiry);
2265                 snprintf(tmp, sizeof(tmp), "%d", p->expiry);
2266                 add_header(resp, "Expires", tmp);
2267                 add_header(resp, "Contact", contact);
2268         } else {
2269                 add_header(resp, "Contact", p->our_contact);
2270         }
2271         return 0;
2272 }
2273
2274 static int reqprep(struct sip_request *req, struct sip_pvt *p, char *msg, int seqno)
2275 {
2276         struct sip_request *orig = &p->initreq;
2277         char stripped[80] ="";
2278         char tmp[80];
2279         char newto[256];
2280         char *c, *n;
2281         char *ot, *of;
2282
2283         memset(req, 0, sizeof(struct sip_request));
2284         
2285         snprintf(p->lastmsg, sizeof(p->lastmsg), "Tx: %s", msg);
2286         
2287         if (!seqno) {
2288                 p->ocseq++;
2289                 seqno = p->ocseq;
2290         }
2291
2292         if (strlen(p->uri)) {
2293                 c = p->uri;
2294         } else {
2295                 if (p->outgoing)
2296                         strncpy(stripped, get_header(orig, "To"), sizeof(stripped) - 1);
2297                 else
2298                         strncpy(stripped, get_header(orig, "From"), sizeof(stripped) - 1);
2299                 
2300                 c = strchr(stripped, '<');
2301                 if (c) 
2302                         c++;
2303                 else
2304                         c = stripped;
2305                 n = strchr(c, '>');
2306                 if (n)
2307                         *n = '\0';
2308                 n = strchr(c, ';');
2309                 if (n)
2310                         *n = '\0';
2311         }       
2312         init_req(req, msg, c);
2313
2314         snprintf(tmp, sizeof(tmp), "%d %s", seqno, msg);
2315
2316         add_header(req, "Via", p->via);
2317         if (p->route) {
2318                 set_destination(p, p->route->hop);
2319                 add_route(req, p->route->next);
2320         }
2321
2322         ot = get_header(orig, "To");
2323         of = get_header(orig, "From");
2324
2325         /* Add tag *unless* this is a CANCEL, in which case we need to send it exactly
2326            as our original request, including tag (or presumably lack thereof) */
2327         if (!strstr(ot, "tag=") && strcasecmp(msg, "CANCEL")) {
2328                 /* Add the proper tag if we don't have it already.  If they have specified
2329                    their tag, use it.  Otherwise, use our own tag */
2330                 if (p->outgoing && strlen(p->theirtag))
2331                         snprintf(newto, sizeof(newto), "%s;tag=%s", ot, p->theirtag);
2332                 else if (!p->outgoing)
2333                         snprintf(newto, sizeof(newto), "%s;tag=as%08x", ot, p->tag);
2334                 else
2335                         snprintf(newto, sizeof(newto), "%s", ot);
2336                 ot = newto;
2337         }
2338
2339         if (p->outgoing) {
2340                 add_header(req, "From", of);
2341                 add_header(req, "To", ot);
2342         } else {
2343                 add_header(req, "From", ot);
2344                 add_header(req, "To", of);
2345         }
2346         add_header(req, "Contact", p->our_contact);
2347         copy_header(req, orig, "Call-ID");
2348         add_header(req, "CSeq", tmp);
2349
2350         add_header(req, "User-Agent", "Asterisk PBX");
2351         return 0;
2352 }
2353
2354 static int __transmit_response(struct sip_pvt *p, char *msg, struct sip_request *req, int reliable)
2355 {
2356         struct sip_request resp;
2357         int seqno = 0;
2358         if (reliable && (sscanf(get_header(req, "CSeq"), "%i ", &seqno) != 1)) {
2359                 ast_log(LOG_WARNING, "Unable to determine sequence number from '%s'\n", get_header(req, "CSeq"));
2360                 return -1;
2361         }
2362         respprep(&resp, p, msg, req);
2363         add_header(&resp, "Content-Length", "0");
2364         add_blank_header(&resp);
2365         return send_response(p, &resp, reliable, seqno);
2366 }
2367
2368 static int transmit_response(struct sip_pvt *p, char *msg, struct sip_request *req) 
2369 {
2370         return __transmit_response(p, msg, req, 0);
2371 }
2372 static int transmit_response_reliable(struct sip_pvt *p, char *msg, struct sip_request *req)
2373 {
2374         return __transmit_response(p, msg, req, 1);
2375 }
2376
2377 static void append_date(struct sip_request *req)
2378 {
2379         char tmpdat[256];
2380         struct tm tm;
2381         time_t t;
2382         time(&t);
2383         gmtime_r(&t, &tm);
2384         strftime(tmpdat, sizeof(tmpdat), "%a, %d %b %Y %T GMT", &tm);
2385         add_header(req, "Date", tmpdat);
2386 }
2387
2388 static int transmit_response_with_date(struct sip_pvt *p, char *msg, struct sip_request *req)
2389 {
2390         struct sip_request resp;
2391         respprep(&resp, p, msg, req);
2392         append_date(&resp);
2393         add_header(&resp, "Content-Length", "0");
2394         add_blank_header(&resp);
2395         return send_response(p, &resp, 0, 0);
2396 }
2397
2398 static int transmit_response_with_allow(struct sip_pvt *p, char *msg, struct sip_request *req)
2399 {
2400         struct sip_request resp;
2401         respprep(&resp, p, msg, req);
2402         add_header(&resp, "Accept", "application/sdp");
2403         add_header(&resp, "Content-Length", "0");
2404         add_blank_header(&resp);
2405         return send_response(p, &resp, 0, 0);
2406 }
2407
2408 static int transmit_response_with_auth(struct sip_pvt *p, char *msg, struct sip_request *req, char *randdata, int reliable)
2409 {
2410         struct sip_request resp;
2411         char tmp[256];
2412         int seqno = 0;
2413         if (reliable && (sscanf(get_header(req, "CSeq"), "%i ", &seqno) != 1)) {
2414                 ast_log(LOG_WARNING, "Unable to determine sequence number from '%s'\n", get_header(req, "CSeq"));
2415                 return -1;
2416         }
2417         snprintf(tmp, sizeof(tmp), "Digest realm=\"asterisk\", nonce=\"%s\"", randdata);
2418         respprep(&resp, p, msg, req);
2419         add_header(&resp, "Proxy-Authenticate", tmp);
2420         add_header(&resp, "Content-Length", "0");
2421         add_blank_header(&resp);
2422         return send_response(p, &resp, reliable, seqno);
2423 }
2424
2425 static int add_text(struct sip_request *req, char *text)
2426 {
2427         /* XXX Convert \n's to \r\n's XXX */
2428         int len = strlen(text);
2429         char clen[256];
2430         snprintf(clen, sizeof(clen), "%d", len);
2431         add_header(req, "Content-Type", "text/plain");
2432         add_header(req, "Content-Length", clen);
2433         add_line(req, text);
2434         return 0;
2435 }
2436
2437 static int add_digit(struct sip_request *req, char digit)
2438 {
2439         char tmp[256];
2440         int len;
2441         char clen[256];
2442         snprintf(tmp, sizeof(tmp), "Signal=%c\r\nDuration=250\r\n", digit);
2443         len = strlen(tmp);
2444         snprintf(clen, sizeof(clen), "%d", len);
2445         add_header(req, "Content-Type", "application/dtmf-relay");
2446         add_header(req, "Content-Length", clen);
2447         add_line(req, tmp);
2448         return 0;
2449 }
2450
2451 static int add_sdp(struct sip_request *resp, struct sip_pvt *p, struct ast_rtp *rtp, struct ast_rtp *vrtp)
2452 {
2453         int len;
2454         int codec;
2455         int alreadysent = 0;
2456         char costr[80];
2457         struct sockaddr_in sin;
2458         struct sockaddr_in vsin;
2459         struct sip_codec_pref *cur;
2460         char v[256];
2461         char s[256];
2462         char o[256];
2463         char c[256];
2464         char t[256];
2465         char m[256];
2466         char m2[256];
2467         char a[1024] = "";
2468         char a2[1024] = "";
2469         int x;
2470         struct sockaddr_in dest;
2471         struct sockaddr_in vdest;
2472         /* XXX We break with the "recommendation" and send our IP, in order that our
2473                peer doesn't have to gethostbyname() us XXX */
2474         len = 0;
2475         if (!p->rtp) {
2476                 ast_log(LOG_WARNING, "No way to add SDP without an RTP structure\n");
2477                 return -1;
2478         }
2479         if (!p->sessionid) {
2480                 p->sessionid = getpid();
2481                 p->sessionversion = p->sessionid;
2482         } else
2483                 p->sessionversion++;
2484         ast_rtp_get_us(p->rtp, &sin);
2485         if (p->vrtp)
2486                 ast_rtp_get_us(p->vrtp, &vsin);
2487
2488         if (p->redirip.sin_addr.s_addr) {
2489                 dest.sin_port = p->redirip.sin_port;
2490                 dest.sin_addr = p->redirip.sin_addr;
2491         } else if (rtp) {
2492                 ast_rtp_get_peer(rtp, &dest);
2493         } else {
2494                 dest.sin_addr = p->ourip;
2495                 dest.sin_port = sin.sin_port;
2496         }
2497
2498         /* Determine video destination */
2499         if (p->vrtp) {
2500                 if (p->vredirip.sin_addr.s_addr) {
2501                         vdest.sin_port = p->vredirip.sin_port;
2502                         vdest.sin_addr = p->vredirip.sin_addr;
2503                 } else if (vrtp) {
2504                         ast_rtp_get_peer(vrtp, &vdest);
2505                 } else {
2506                         vdest.sin_addr = p->ourip;
2507                         vdest.sin_port = vsin.sin_port;
2508                 }
2509         }
2510         if (sipdebug)
2511                 ast_verbose("We're at %s port %d\n", inet_ntoa(p->ourip), ntohs(sin.sin_port)); 
2512         if (sipdebug && p->vrtp)
2513                 ast_verbose("Video is at %s port %d\n", inet_ntoa(p->ourip), ntohs(vsin.sin_port));     
2514         snprintf(v, sizeof(v), "v=0\r\n");
2515         snprintf(o, sizeof(o), "o=root %d %d IN IP4 %s\r\n", p->sessionid, p->sessionversion, inet_ntoa(dest.sin_addr));
2516         snprintf(s, sizeof(s), "s=session\r\n");
2517         snprintf(c, sizeof(c), "c=IN IP4 %s\r\n", inet_ntoa(dest.sin_addr));
2518         snprintf(t, sizeof(t), "t=0 0\r\n");
2519         snprintf(m, sizeof(m), "m=audio %d RTP/AVP", ntohs(dest.sin_port));
2520         snprintf(m2, sizeof(m2), "m=video %d RTP/AVP", ntohs(vdest.sin_port));
2521         /* Start by sending our preferred codecs */
2522         cur = prefs;
2523         while(cur) {
2524                 if (p->jointcapability & cur->codec) {
2525                         if (sipdebug)
2526                                 ast_verbose("Answering with preferred capability %d\n", cur->codec);
2527                         codec = ast_rtp_lookup_code(p->rtp, 1, cur->codec);
2528                         if (codec > -1) {
2529                                 snprintf(costr, sizeof(costr), " %d", codec);
2530                                 if (cur->codec < AST_FORMAT_MAX_AUDIO) {
2531                                         strcat(m, costr);
2532                                         snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/8000\r\n", codec, ast_rtp_lookup_mime_subtype(1, cur->codec));
2533                                         strcat(a, costr);
2534                                 } else {
2535                                         strcat(m2, costr);
2536                                         snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/90000\r\n", codec, ast_rtp_lookup_mime_subtype(1, cur->codec));
2537                                         strcat(a2, costr);
2538                                 }
2539                         }
2540                 }
2541                 alreadysent |= cur->codec;
2542                 cur = cur->next;
2543         }
2544         /* Now send any other common codecs, and non-codec formats: */
2545         for (x = 1; x <= AST_FORMAT_MAX_AUDIO; x <<= 1) {
2546                 if ((p->jointcapability & x) && !(alreadysent & x)) {
2547                         if (sipdebug)
2548                                 ast_verbose("Answering with capability %d\n", x);       
2549                         codec = ast_rtp_lookup_code(p->rtp, 1, x);
2550                         if (codec > -1) {
2551                                 snprintf(costr, sizeof(costr), " %d", codec);
2552                                 if (x < AST_FORMAT_MAX_AUDIO) {
2553                                         strcat(m, costr);
2554                                         snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/8000\r\n", codec, ast_rtp_lookup_mime_subtype(1, x));
2555                                         strcat(a, costr);
2556                                 } else {
2557                                         strcat(m2, costr);
2558                                         snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/90000\r\n", codec, ast_rtp_lookup_mime_subtype(1, x));
2559                                         strcat(a2, costr);
2560                                 }
2561                         }
2562                 }
2563         }
2564         for (x = 1; x <= AST_RTP_MAX; x <<= 1) {
2565                 if (p->noncodeccapability & x) {
2566                         if (sipdebug)
2567                                 ast_verbose("Answering with non-codec capability %d\n", x);
2568                         codec = ast_rtp_lookup_code(p->rtp, 0, x);
2569                         if (codec > -1) {
2570                                 snprintf(costr, sizeof(costr), " %d", codec);
2571                                 strcat(m, costr);
2572                                 snprintf(costr, sizeof(costr), "a=rtpmap:%d %s/8000\r\n", codec, ast_rtp_lookup_mime_subtype(0, x));
2573                                 strcat(a, costr);
2574                                 if (x == AST_RTP_DTMF) {
2575                                   /* Indicate we support DTMF...  Not sure about 16, but MSN supports it so dang it, we will too... */
2576                                   snprintf(costr, sizeof costr, "a=fmtp:%d 0-16\r\n",
2577                                            codec);
2578                                   strcat(a, costr);
2579                                 }
2580                         }
2581                 }
2582         }
2583         strcat(m, "\r\n");
2584         strcat(m2, "\r\n");
2585         len = strlen(v) + strlen(s) + strlen(o) + strlen(c) + strlen(t) + strlen(m) + strlen(a);
2586         if (p->vrtp)
2587                 len += strlen(m2) + strlen(a2);
2588         snprintf(costr, sizeof(costr), "%d", len);
2589         add_header(resp, "Content-Type", "application/sdp");
2590         add_header(resp, "Content-Length", costr);
2591         add_line(resp, v);
2592         add_line(resp, o);
2593         add_line(resp, s);
2594         add_line(resp, c);
2595         add_line(resp, t);
2596         add_line(resp, m);
2597         add_line(resp, a);
2598         if (p->vrtp) {
2599                 add_line(resp, m2);
2600                 add_line(resp, a2);
2601         }
2602         return 0;
2603 }
2604
2605 static void copy_request(struct sip_request *dst,struct sip_request *src)
2606 {
2607         long offset;
2608         int x;
2609         offset = ((void *)dst) - ((void *)src);
2610         /* First copy stuff */
2611         memcpy(dst, src, sizeof(*dst));
2612         /* Now fix pointer arithmetic */
2613         for (x=0;x<src->headers;x++)
2614                 dst->header[x] += offset;
2615         for (x=0;x<src->lines;x++)
2616                 dst->line[x] += offset;
2617 }
2618
2619 static int transmit_response_with_sdp(struct sip_pvt *p, char *msg, struct sip_request *req, int retrans)
2620 {
2621         struct sip_request resp;
2622         int seqno;
2623         if (sscanf(get_header(req, "CSeq"), "%i ", &seqno) != 1) {
2624                 ast_log(LOG_WARNING, "Unable to get seqno from '%s'\n", get_header(req, "CSeq"));
2625                 return -1;
2626         }
2627         respprep(&resp, p, msg, req);
2628         add_sdp(&resp, p, NULL, NULL);
2629         return send_response(p, &resp, retrans, seqno);
2630 }
2631
2632 static int determine_firstline_parts( struct sip_request *req ) {
2633
2634   char *e, *cmd;
2635   int len;
2636   
2637   cmd= req->header[0];
2638   while(*cmd && (*cmd < 33)) {
2639     cmd++;
2640   }
2641   if (!*cmd) {
2642     return -1;
2643   }
2644   e= cmd;
2645   while(*e && (*e > 32)) {
2646     e++;
2647   }
2648   /* Get the command */
2649   if (*e) {
2650     *e = '\0';
2651     e++;
2652   }
2653   req->rlPart1= cmd;
2654   while( *e && ( *e < 33 ) ) {
2655     e++; 
2656   }
2657   if( !*e ) {
2658     return -1;
2659   }
2660     
2661   if ( !strcasecmp(cmd, "SIP/2.0") ) {
2662     /* We have a response */
2663     req->rlPart2= e;
2664     len= strlen( req->rlPart2 );
2665     if( len < 2 ) { return -1; }
2666     e+= len - 1;
2667     while( *e && *e<33 ) {
2668       e--; 
2669     }
2670     *(++e)= '\0';
2671   } else {
2672     /* We have a request */
2673     if( *e == '<' ) { 
2674       e++;
2675       if( !*e ) { return -1; }  
2676     }
2677     req->rlPart2= e;
2678     if( ( e= strrchr( req->rlPart2, 'S' ) ) == NULL ) {
2679       return -1;
2680     }
2681     while( isspace( *(--e) ) ) {}
2682     if( *e == '>' ) {
2683       *e= '\0';
2684     } else {
2685       *(++e)= '\0';
2686     }
2687   }
2688   return 1;
2689 }
2690
2691 static int transmit_reinvite_with_sdp(struct sip_pvt *p, struct ast_rtp *rtp, struct ast_rtp *vrtp)
2692 {
2693         struct sip_request req;
2694         if (p->canreinvite == REINVITE_UPDATE)
2695                 reqprep(&req, p, "UPDATE", 0);
2696         else
2697                 reqprep(&req, p, "INVITE", 0);
2698         add_header(&req, "Allow", ALLOWED_METHODS);
2699         add_sdp(&req, p, rtp, vrtp);
2700         /* Use this as the basis */
2701         copy_request(&p->initreq, &req);
2702         parse(&p->initreq);
2703         determine_firstline_parts(&p->initreq);
2704         p->lastinvite = p->ocseq;
2705         p->outgoing = 1;
2706         return send_request(p, &req, 1, p->ocseq);
2707 }
2708
2709 static void extract_uri(struct sip_pvt *p, struct sip_request *req)
2710 {
2711         char stripped[256]="";
2712         char *c, *n;
2713         strncpy(stripped, get_header(req, "Contact"), sizeof(stripped) - 1);
2714         c = strchr(stripped, '<');
2715         if (c) 
2716                 c++;
2717         else
2718                 c = stripped;
2719         n = strchr(c, '>');
2720         if (n)
2721                 *n = '\0';
2722         n = strchr(c, ';');
2723         if (n)
2724                 *n = '\0';
2725         if (c && strlen(c))
2726                 strncpy(p->uri, c, sizeof(p->uri) - 1);
2727 }
2728
2729 static void build_contact(struct sip_pvt *p)
2730 {
2731         /* Construct Contact: header */
2732         if (ourport != 5060)
2733                 snprintf(p->our_contact, sizeof(p->our_contact), "<sip:%s@%s:%d>", p->exten, inet_ntoa(p->ourip), ourport);
2734         else
2735                 snprintf(p->our_contact, sizeof(p->our_contact), "<sip:%s@%s>", p->exten, inet_ntoa(p->ourip));
2736 }
2737
2738 static void initreqprep(struct sip_request *req, struct sip_pvt *p, char *cmd, char *vxml_url)
2739 {
2740         char invite[256];
2741         char from[256];
2742         char to[256];
2743         char tmp[80];
2744         char cid[256];
2745         char *l = callerid, *n=NULL;
2746
2747         snprintf(p->lastmsg, sizeof(p->lastmsg), "Init: %s", cmd);
2748
2749         if (p->owner && p->owner->callerid) {
2750                 strcpy(cid, p->owner->callerid);
2751                 ast_callerid_parse(cid, &n, &l);
2752                 if (l) 
2753                         ast_shrink_phone_number(l);
2754                 if (!l || !ast_isphonenumber(l))
2755                                 l = callerid;
2756         }
2757         /* if user want's his callerid restricted */
2758         if (p->restrictcid)
2759                 l = CALLERID_UNKNOWN;
2760         if (!n || !strlen(n))
2761                 n = l;
2762         /* Allow user to be overridden */
2763         if (strlen(p->fromuser))
2764                 l = p->fromuser;
2765
2766         if ((ourport != 5060) && !strlen(p->fromdomain))
2767                 snprintf(from, sizeof(from), "\"%s\" <sip:%s@%s:%d>;tag=as%08x", n, l, strlen(p->fromdomain) ? p->fromdomain : inet_ntoa(p->ourip), ourport, p->tag);
2768         else
2769                 snprintf(from, sizeof(from), "\"%s\" <sip:%s@%s>;tag=as%08x", n, l, strlen(p->fromdomain) ? p->fromdomain : inet_ntoa(p->ourip), p->tag);
2770
2771         if (strlen(p->username)) {
2772                 if (ntohs(p->sa.sin_port) != DEFAULT_SIP_PORT) {
2773                         snprintf(invite, sizeof(invite), "sip:%s@%s:%d",p->username, p->tohost, ntohs(p->sa.sin_port));
2774                 } else {
2775                         snprintf(invite, sizeof(invite), "sip:%s@%s",p->username, p->tohost);
2776                 }
2777         } else if (ntohs(p->sa.sin_port) != DEFAULT_SIP_PORT) {
2778                 snprintf(invite, sizeof(invite), "sip:%s:%d", p->tohost, ntohs(p->sa.sin_port));
2779         } else {
2780                 snprintf(invite, sizeof(invite), "sip:%s", p->tohost);
2781         }
2782         strncpy(p->uri, invite, sizeof(p->uri) - 1);
2783         /* If there is a VXML URL append it to the SIP URL */
2784         if (vxml_url)
2785         {
2786                 snprintf(to, sizeof(to), "<%s>;%s", invite, vxml_url);
2787         }
2788         else
2789         {
2790                 snprintf(to, sizeof(to), "<%s>", invite );
2791         }
2792         memset(req, 0, sizeof(struct sip_request));
2793         init_req(req, cmd, invite);
2794         snprintf(tmp, sizeof(tmp), "%d %s", ++p->ocseq, cmd);
2795
2796         add_header(req, "Via", p->via);
2797         /* SLD: FIXME?: do Route: here too?  I think not cos this is the first request.
2798          * OTOH, then we won't have anything in p->route anyway */
2799         add_header(req, "From", from);
2800         strncpy(p->exten, l, sizeof(p->exten) - 1);
2801         build_contact(p);
2802         add_header(req, "To", to);
2803         add_header(req, "Contact", p->our_contact);
2804         add_header(req, "Call-ID", p->callid);
2805         add_header(req, "CSeq", tmp);
2806         add_header(req, "User-Agent", "Asterisk PBX");
2807 }
2808
2809 static int transmit_invite(struct sip_pvt *p, char *cmd, int sdp, char *auth, char *authheader, char *vxml_url, char *distinctive_ring, int init)
2810 {
2811         struct sip_request req;
2812         
2813         if (init)
2814                 initreqprep(&req, p, cmd, vxml_url);
2815         else
2816                 reqprep(&req, p, cmd, 0);
2817                 
2818         if (auth)
2819                 add_header(&req, authheader, auth);
2820         append_date(&req);
2821         if (!strcasecmp(cmd, "REFER")) {
2822                 if (strlen(p->refer_to))
2823                         add_header(&req, "Refer-To", p->refer_to);
2824                 if (strlen(p->referred_by))
2825                         add_header(&req, "Referred-By", p->referred_by);
2826         }
2827         
2828         if (distinctive_ring)
2829         {
2830                 add_header(&req, "Alert-info",distinctive_ring);
2831         }
2832         add_header(&req, "Allow", ALLOWED_METHODS);
2833         if (sdp) {
2834                 add_sdp(&req, p, NULL, NULL);
2835         } else {
2836                 add_header(&req, "Content-Length", "0");
2837                 add_blank_header(&req);
2838         }
2839
2840         if (!p->initreq.headers) {
2841                 /* Use this as the basis */
2842                 copy_request(&p->initreq, &req);
2843                 parse(&p->initreq);
2844                 determine_firstline_parts(&p->initreq);
2845         }
2846         p->lastinvite = p->ocseq;
2847         return send_request(p, &req, 1, p->ocseq);
2848 }
2849
2850 static int transmit_state_notify(struct sip_pvt *p, int state, int full)
2851 {
2852         char tmp[2000];
2853         char from[256], to[256];
2854         char *t, *c, *a;
2855         char *mfrom, *mto;
2856         struct sip_request req;
2857         char clen[20];
2858         
2859         strncpy(from, get_header(&p->initreq, "From"), sizeof(from)-1);
2860
2861         c = ditch_braces(from);
2862         if (strncmp(c, "sip:", 4)) {
2863                 ast_log(LOG_WARNING, "Huh?  Not a SIP header (%s)?\n", c);
2864                 return -1;
2865         }
2866         if ((a = strchr(c, ';'))) {
2867                 *a = '\0';
2868         }
2869         mfrom = c;
2870                 
2871         reqprep(&req, p, "NOTIFY", 0);
2872
2873         if (p->subscribed == 1) {
2874             strncpy(to, get_header(&p->initreq, "To"), sizeof(to)-1);
2875
2876             c = ditch_braces(to);
2877             if (strncmp(c, "sip:", 4)) {
2878                 ast_log(LOG_WARNING, "Huh?  Not a SIP header (%s)?\n", c);
2879                 return -1;
2880             }
2881             if ((a = strchr(c, ';'))) {
2882                 *a = '\0';
2883             }
2884             mto = c;
2885
2886             add_header(&req, "Content-Type", "application/xpidf+xml");
2887
2888             if ((state==AST_EXTENSION_UNAVAILABLE) || (state==AST_EXTENSION_BUSY))
2889                 state = 2;
2890             else if (state==AST_EXTENSION_INUSE)
2891                 state = 1;
2892             else
2893                 state = 0;
2894             
2895             t = tmp;            
2896             sprintf(t, "<?xml version=\"1.0\"?>\n");
2897             t = tmp + strlen(tmp);
2898             sprintf(t, "<!DOCTYPE presence PUBLIC \"-//IETF//DTD RFCxxxx XPIDF 1.0//EN\" \"xpidf.dtd\">\n");
2899             t = tmp + strlen(tmp);
2900             sprintf(t, "<presence>\n");
2901             t = tmp + strlen(tmp);
2902             sprintf(t, "<presentity uri=\"%s;method=SUBSCRIBE\" />\n", mfrom);
2903             t = tmp + strlen(tmp);
2904             sprintf(t, "<atom id=\"%s\">\n", p->exten);
2905             t = tmp + strlen(tmp);
2906             sprintf(t, "<address uri=\"%s;user=ip\" priority=\"0,800000\">\n", mto);
2907             t = tmp + strlen(tmp);
2908             sprintf(t, "<status status=\"%s\" />\n", !state ? "open" : (state==1) ? "inuse" : "closed");
2909             t = tmp + strlen(tmp);
2910             sprintf(t, "<msnsubstatus substatus=\"%s\" />\n", !state ? "online" : (state==1) ? "onthephone" : "offline");
2911             t = tmp + strlen(tmp);
2912             sprintf(t, "</address>\n</atom>\n</presence>\n");           
2913         } else {
2914             add_header(&req, "Event", "dialog");
2915             add_header(&req, "Content-Type", "application/dialog-info+xml");
2916         
2917             t = tmp;            
2918             sprintf(t, "<?xml version=\"1.0\"?>\n");
2919             t = tmp + strlen(tmp);
2920             sprintf(t, "<dialog-info xmlns=\"urn:ietf:params:xml:ns:dialog-info\" version=\"%d\" state=\"%s\" entity=\"%s\">\n", p->dialogver++, full ? "full":"partial", mfrom);
2921             t = tmp + strlen(tmp);
2922             sprintf(t, "<dialog id=\"%s\">\n", p->exten);
2923             t = tmp + strlen(tmp);
2924             sprintf(t, "<state>%s</state>\n", state ? "confirmed" : "terminated");
2925             t = tmp + strlen(tmp);
2926             sprintf(t, "</dialog>\n</dialog-info>\n");  
2927         }
2928
2929         snprintf(clen, sizeof(clen), "%d", strlen(tmp));
2930         add_header(&req, "Content-Length", clen);
2931         add_line(&req, tmp);
2932
2933         return send_request(p, &req, 1, p->ocseq);
2934 }
2935
2936 static int transmit_notify(struct sip_pvt *p, int newmsgs, int oldmsgs)
2937 {
2938         struct sip_request req;
2939         char tmp[256];
2940         char tmp2[256];
2941         char clen[20];
2942         initreqprep(&req, p, "NOTIFY", NULL);
2943         add_header(&req, "Event", "message-summary");
2944         add_header(&req, "Content-Type", notifymime);
2945
2946         snprintf(tmp, sizeof(tmp), "Messages-Waiting: %s\n", newmsgs ? "yes" : "no");
2947         snprintf(tmp2, sizeof(tmp2), "Voicemail: %d/%d\n", newmsgs, oldmsgs);
2948         snprintf(clen, sizeof(clen), "%d", strlen(tmp) + strlen(tmp2));
2949         add_header(&req, "Content-Length", clen);
2950         add_line(&req, tmp);
2951         add_line(&req, tmp2);
2952
2953         if (!p->initreq.headers) {
2954                 /* Use this as the basis */
2955                 copy_request(&p->initreq, &req);
2956                 parse(&p->initreq);
2957                 determine_firstline_parts(&p->initreq);
2958         }
2959
2960         return send_request(p, &req, 1, p->ocseq);
2961 }
2962
2963 static int transmit_register(struct sip_registry *r, char *cmd, char *auth, char *authheader);
2964
2965 static int sip_reregister(void *data) 
2966 {
2967         /* if we are here, we know that we need to reregister. */
2968         struct sip_registry *r=(struct sip_registry *)data;
2969         r->expire = -1;
2970         sip_do_register(r);
2971         return 0;
2972 }
2973
2974
2975 static int sip_do_register(struct sip_registry *r)
2976 {
2977         int res;
2978         ast_mutex_lock(&r->lock);
2979         res=transmit_register(r, "REGISTER", NULL, NULL);
2980         ast_mutex_unlock(&r->lock);
2981         return res;
2982 }
2983
2984 static int sip_reg_timeout(void *data)
2985 {
2986         /* if we are here, our registration timed out, so we'll just do it over */
2987         struct sip_registry *r=data;
2988         struct sip_pvt *p;
2989         int res;
2990         ast_mutex_lock(&r->lock);
2991         ast_log(LOG_NOTICE, "Registration for '%s@%s' timed out, trying again\n", r->username, inet_ntoa(r->addr.sin_addr)); 
2992         if (r->call) {
2993                 /* Unlink us, destroy old call.  Locking is not relevent here because all this happens
2994                    in the single SIP manager thread. */
2995                 p = r->call;
2996                 p->registry = NULL;
2997                 r->call = NULL;
2998                 p->needdestroy = 1;
2999         }
3000         r->regstate=REG_STATE_UNREGISTERED;
3001         r->timeout = -1;
3002         res=transmit_register(r, "REGISTER", NULL, NULL);
3003         ast_mutex_unlock(&r->lock);
3004         return 0;
3005 }
3006
3007 static int transmit_register(struct sip_registry *r, char *cmd, char *auth, char *authheader)
3008 {
3009         struct sip_request req;
3010         char from[256];
3011         char to[256];
3012         char tmp[80];
3013         char via[80];
3014         char addr[80];
3015         struct sip_pvt *p;
3016         /* exit if we are already in process with this registrar ?*/
3017         if ( r == NULL || ((auth==NULL) && (r->regstate==REG_STATE_REGSENT || r->regstate==REG_STATE_AUTHSENT))) {
3018                 ast_log(LOG_NOTICE, "Strange, trying to register when registration already pending\n");
3019                 return 0;
3020         }
3021
3022         if (r->call) {
3023                 if (!auth) {
3024                         ast_log(LOG_WARNING, "Already have a call??\n");
3025                         return 0;
3026                 } else
3027                         p = r->call;
3028         } else {
3029                 if (!r->callid_valid) {
3030                         build_callid(r->callid, sizeof(r->callid), __ourip);
3031                         r->callid_valid = 1;
3032                 }
3033                 p=sip_alloc( r->callid, &r->addr, 0);
3034                 if (!p) {
3035                         ast_log(LOG_WARNING, "Unable to allocate registration call\n");
3036                         return 0;
3037                 }
3038                 p->outgoing = 1;
3039                 r->call=p;
3040                 p->registry=r;
3041                 strncpy(p->peersecret, r->secret, sizeof(p->peersecret)-1);
3042                 strncpy(p->peermd5secret, r->md5secret, sizeof(p->peermd5secret)-1);
3043                 if (strlen(r->authuser))
3044                         strncpy(p->peername, r->authuser, sizeof(p->peername)-1);
3045                 else
3046                         strncpy(p->peername, r->username, sizeof(p->peername)-1);
3047                 strncpy(p->username, r->username, sizeof(p->username)-1);
3048                 strncpy(p->exten, r->contact, sizeof(p->exten) - 1);
3049                 /* Always bind to our IP if specified */
3050                 if (!use_external_ip && bindaddr.sin_addr.s_addr)
3051                         memcpy(&p->ourip, &bindaddr.sin_addr, sizeof(p->ourip));
3052                 build_contact(p);
3053         }
3054
3055         /* set up a timeout */
3056         if (auth==NULL)  {
3057                 if (r->timeout > -1) {
3058                         ast_log(LOG_WARNING, "Still have a timeout, %d\n", r->timeout);
3059                         ast_sched_del(sched, r->timeout);
3060                 }
3061                 r->timeout = ast_sched_add(sched, 20*1000, sip_reg_timeout, r);
3062                 ast_log(LOG_DEBUG, "Scheduled a timeout # %d\n", r->timeout);
3063         }
3064
3065         if (strchr(r->username, '@')) {
3066                 snprintf(from, sizeof(from), "<sip:%s>;tag=as%08x", r->username, p->tag);
3067                 snprintf(to, sizeof(to),     "<sip:%s>", r->username);
3068         } else {
3069                 snprintf(from, sizeof(from), "<sip:%s@%s>;tag=as%08x", r->username, r->hostname, p->tag);
3070                 snprintf(to, sizeof(to),     "<sip:%s@%s>", r->username, r->hostname);
3071         }
3072         
3073         snprintf(addr, sizeof(addr), "sip:%s", r->hostname);
3074         strncpy(p->uri, addr, sizeof(p->uri) - 1);
3075
3076         memset(&req, 0, sizeof(req));
3077         init_req(&req, cmd, addr);
3078
3079         snprintf(tmp, sizeof(tmp), "%u %s", ++r->ocseq, cmd);
3080         p->ocseq = r->ocseq;
3081
3082         /* z9hG4bK is a magic cookie.  See RFC 3261 section 8.1.1.7 */
3083         snprintf(via, sizeof(via), "SIP/2.0/UDP %s:%d;branch=z9hG4bK%08x", inet_ntoa(p->ourip), ourport, p->branch);
3084         add_header(&req, "Via", via);
3085         add_header(&req, "From", from);
3086         add_header(&req, "To", to);
3087         add_header(&req, "Call-ID", p->callid);
3088         add_header(&req, "CSeq", tmp);
3089         add_header(&req, "User-Agent", "Asterisk PBX");
3090         if (auth) 
3091                 add_header(&req, authheader, auth);
3092
3093         snprintf(tmp, sizeof(tmp), "%d", default_expiry);
3094         add_header(&req, "Expires", tmp);
3095         add_header(&req, "Contact", p->our_contact);
3096         add_header(&req, "Event", "registration");
3097         add_header(&req, "Content-length", "0");
3098         add_blank_header(&req);
3099         copy_request(&p->initreq, &req);
3100         parse(&p->initreq);
3101         determine_firstline_parts(&p->initreq);
3102         r->regstate=auth?REG_STATE_AUTHSENT:REG_STATE_REGSENT;
3103         return send_request(p, &req, 1, p->ocseq);
3104 }
3105
3106 static int transmit_message_with_text(struct sip_pvt *p, char *text)
3107 {
3108         struct sip_request req;
3109         reqprep(&req, p, "MESSAGE", 0);
3110         add_text(&req, text);
3111         return send_request(p, &req, 1, p->ocseq);
3112 }
3113
3114 static int transmit_refer(struct sip_pvt *p, char *dest)
3115 {
3116         struct sip_request req;
3117         char from[256];
3118         char *of, *c;
3119         char referto[256];
3120         if (p->outgoing) 
3121                 of = get_header(&p->initreq, "To");
3122         else
3123                 of = get_header(&p->initreq, "From");
3124         strncpy(from, of, sizeof(from) - 1);
3125         of = ditch_braces(from);
3126         strncpy(p->from,of,sizeof(p->from) - 1);
3127         if (strncmp(of, "sip:", 4)) {
3128                 ast_log(LOG_NOTICE, "From address missing 'sip:', using it anyway\n");
3129         } else
3130                 of += 4;
3131         /* Get just the username part */
3132         if ((c = strchr(of, '@'))) {
3133                 *c = '\0';
3134                 c++;
3135         }
3136         if (c) {
3137                 snprintf(referto, sizeof(referto), "<sip:%s@%s>", dest, c);
3138         } else {
3139                 snprintf(referto, sizeof(referto), "<sip:%s>", dest);
3140         }
3141
3142         /* save in case we get 407 challenge */
3143         strncpy(p->refer_to, referto, sizeof(p->refer_to) - 1); 
3144         strncpy(p->referred_by, p->our_contact, sizeof(p->referred_by) - 1); 
3145
3146         reqprep(&req, p, "REFER", 0);
3147         add_header(&req, "Refer-To", referto);
3148         if (strlen(p->our_contact))
3149                 add_header(&req, "Referred-By", p->our_contact);
3150         return send_request(p, &req, 1, p->ocseq);
3151 }
3152
3153 static int transmit_info_with_digit(struct sip_pvt *p, char digit)
3154 {
3155         struct sip_request req;
3156         reqprep(&req, p, "INFO", 0);
3157         add_digit(&req, digit);
3158         return send_request(p, &req, 1, p->ocseq);
3159 }
3160
3161 static int transmit_request(struct sip_pvt *p, char *msg, int seqno, int reliable)
3162 {
3163         struct sip_request resp;
3164         reqprep(&resp, p, msg, seqno);
3165         add_header(&resp, "Content-Length", "0");
3166         add_blank_header(&resp);
3167         return send_request(p, &resp, reliable, seqno ? seqno : p->ocseq);
3168 }
3169
3170 static int transmit_request_with_auth(struct sip_pvt *p, char *msg, int seqno, int reliable)
3171 {
3172         struct sip_request resp;
3173         reqprep(&resp, p, msg, seqno);
3174         if (*p->realm)
3175         {
3176                 char digest[256];
3177                 memset(digest,0,sizeof(digest));
3178                 build_reply_digest(p, msg, digest, sizeof(digest));
3179                 add_header(&resp, "Proxy-Authorization", digest);
3180         }
3181
3182         add_header(&resp, "Content-Length", "0");
3183         add_blank_header(&resp);
3184         return send_request(p, &resp, reliable, seqno ? seqno : p->ocseq);      
3185 }
3186
3187 static int expire_register(void *data)
3188 {
3189         struct sip_peer *p = data;
3190         memset(&p->addr, 0, sizeof(p->addr));
3191         ast_db_del("SIP/Registry", p->name);
3192         p->expire = -1;
3193         ast_device_state_changed("SIP/%s", p->name);
3194         if (p->selfdestruct) {
3195                 p->delme = 1;
3196                 prune_peers();
3197         }
3198         return 0;
3199 }
3200
3201 static int sip_poke_peer(struct sip_peer *peer);
3202
3203 static void reg_source_db(struct sip_peer *p)
3204 {
3205         char data[80];
3206         struct in_addr in;
3207         char *c, *d;
3208         int expiry;
3209         if (!ast_db_get("SIP/Registry", p->name, data, sizeof(data))) {
3210                 c = strchr(data, ':');
3211                 if (c) {
3212                         *c = '\0';
3213                         c++;
3214                         if (inet_aton(data, &in)) {
3215                                 d = strchr(c, ':');
3216                                 if (d) {
3217                                         *d = '\0';
3218                                         d++;
3219                                         ast_verbose(VERBOSE_PREFIX_3 "SIP Seeding '%s' at %s:%d for %d\n", p->name, 
3220                                                 inet_ntoa(in), atoi(c), atoi(d));
3221                                         sip_poke_peer(p);
3222                                         expiry = atoi(d);
3223                                         memset(&p->addr, 0, sizeof(p->addr));
3224                                         p->addr.sin_family = AF_INET;
3225                                         p->addr.sin_addr = in;
3226                                         p->addr.sin_port = htons(atoi(c));
3227                                         if (p->expire > -1)
3228                                                 ast_sched_del(sched, p->expire);
3229                                         p->expire = ast_sched_add(sched, (expiry + 10) * 1000, expire_register, (void *)p);
3230                                 }                                       
3231                                         
3232                         }
3233                 }
3234         }
3235 }
3236
3237 static int parse_contact(struct sip_pvt *pvt, struct sip_peer *p, struct sip_request *req)
3238 {
3239         char contact[80]= ""; 
3240         char data[256];
3241         char *expires = get_header(req, "Expires");
3242         int expiry = atoi(expires);
3243         char *c, *n, *pt;
3244         int port;
3245         struct hostent *hp;
3246         struct sockaddr_in oldsin;
3247         if (!strlen(expires)) {
3248                 expires = strstr(get_header(req, "Contact"), "expires=");
3249                 if (expires) {
3250                         if (sscanf(expires + 8, "%d;", &expiry) != 1)
3251                                 expiry = default_expiry;
3252                 } else {
3253                         /* Nothing has been specified */
3254                         expiry = default_expiry;
3255                 }
3256         }
3257         /* Look for brackets */
3258         strncpy(contact, get_header(req, "Contact"), sizeof(contact) - 1);
3259         c = contact;
3260         
3261         if ((n=strchr(c, '<'))) {
3262                 c = n + 1;
3263                 n = strchr(c, '>');
3264                 /* Lose the part after the > */
3265                 if (n) 
3266                         *n = '\0';
3267         }
3268         if (!strcasecmp(c, "*") || !expiry) {
3269                 /* This means remove all registrations and return OK */
3270                 memset(&p->addr, 0, sizeof(p->addr));
3271                 if (p->expire > -1)
3272                         ast_sched_del(sched, p->expire);
3273                 p->expire = -1;
3274                 ast_db_del("SIP/Registry", p->name);
3275                 if (option_verbose > 2)
3276                         ast_verbose(VERBOSE_PREFIX_3 "Unregistered SIP '%s'\n", p->name);
3277                 return 0;
3278         }
3279         /* Make sure it's a SIP URL */
3280         if (strncasecmp(c, "sip:", 4)) {
3281                 ast_log(LOG_NOTICE, "'%s' is not a valid SIP contact (missing sip:) trying to use anyway\n", c);
3282         } else
3283                 c += 4;
3284         /* Ditch q */
3285         n = strchr(c, ';');
3286         if (n) 
3287                 *n = '\0';
3288         /* Grab host */
3289         n = strchr(c, '@');
3290         if (!n) {
3291                 n = c;
3292                 c = NULL;
3293         } else {
3294                 *n = '\0';
3295                 n++;
3296         }
3297         pt = strchr(n, ':');
3298         if (pt) {
3299                 *pt = '\0';
3300                 pt++;
3301                 port = atoi(pt);
3302         } else
3303                 port = DEFAULT_SIP_PORT;
3304         memcpy(&oldsin, &p->addr, sizeof(oldsin));
3305         if (!p->nat) {
3306                 /* XXX This could block for a long time XXX */
3307                 hp = gethostbyname(n);
3308                 if (!hp)  {
3309                         ast_log(LOG_WARNING, "Invalid host '%s'\n", n);
3310                         return -1;
3311                 }
3312                 p->addr.sin_family = AF_INET;
3313                 memcpy(&p->addr.sin_addr, hp->h_addr, sizeof(p->addr.sin_addr));
3314                 p->addr.sin_port = htons(port);
3315         } else {
3316                 /* Don't trust the contact field.  Just use what they came to us
3317                    with */
3318                 memcpy(&p->addr, &pvt->recv, sizeof(p->addr));
3319         }
3320         if (c)
3321                 strncpy(p->username, c, sizeof(p->username) - 1);
3322         else
3323                 strcpy(p->username, "");
3324         if (p->expire > -1)
3325                 ast_sched_del(sched, p->expire);
3326         if ((expiry < 1) || (expiry > max_expiry))
3327                 expiry = max_expiry;
3328         p->expire = ast_sched_add(sched, (expiry + 10) * 1000, expire_register, p);
3329         pvt->expiry = expiry;
3330         if (inaddrcmp(&p->addr, &oldsin)) {
3331                 sip_poke_peer(p);
3332                 snprintf(data, sizeof(data), "%s:%d:%d", inet_ntoa(p->addr.sin_addr), ntohs(p->addr.sin_port), expiry);
3333                 ast_db_put("SIP/Registry", p->name, data);
3334                 if (option_verbose > 2)
3335                         ast_verbose(VERBOSE_PREFIX_3 "Registered SIP '%s' at %s port %d expires %d\n", p->name, inet_ntoa(p->addr.sin_addr), ntohs(p->addr.sin_port), expiry);
3336         }
3337         return 0;
3338 }
3339
3340 static void free_old_route(struct sip_route *route)
3341 {
3342         struct sip_route *next;
3343         while (route) {
3344                 next = route->next;
3345                 free(route);
3346                 route = next;
3347         }
3348 }
3349
3350 static void list_route(struct sip_route *route)
3351 {
3352         if (!route) {
3353                 ast_verbose("list_route: no route\n");
3354                 return;
3355         }
3356         while (route) {
3357                 ast_verbose("list_route: hop: <%s>\n", route->hop);
3358                 route = route->next;
3359         }
3360 }
3361
3362 static void build_route(struct sip_pvt *p, struct sip_request *req, int backwards)
3363 {
3364         struct sip_route *thishop, *head, *tail;
3365         int start = 0;
3366         int len;
3367         char *rr, *contact, *c;
3368
3369         if (p->route) {
3370                 free_old_route(p->route);
3371                 p->route = NULL;
3372         }
3373         /* We build up head, then assign it to p->route when we're done */
3374         head = NULL;  tail = head;
3375         /* 1st we pass through all the hops in any Record-Route headers */
3376         for (;;) {
3377                 /* Each Record-Route header */
3378                 rr = __get_header(req, "Record-Route", &start);
3379                 if (*rr == '\0') break;
3380                 for (;;) {
3381                         /* Each route entry */
3382                         /* Find < */
3383                         rr = strchr(rr, '<');
3384                         if (!rr) break; /* No more hops */
3385                         ++rr;
3386                         len = strcspn(rr, ">");
3387                         /* Make a struct route */
3388                         thishop = (struct sip_route *)malloc(sizeof(struct sip_route)+len+1);
3389                         if (thishop) {
3390                                 strncpy(thishop->hop, rr, len);
3391                                 thishop->hop[len] = '\0';
3392                                 ast_log(LOG_DEBUG, "build_route: Record-Route hop: <%s>\n", thishop->hop);
3393                                 /* Link in */
3394                                 if (backwards) {
3395                                         /* Link in at head so they end up in reverse order */
3396                                         thishop->next = head;
3397                                         head = thishop;
3398                                         /* If this was the first then it'll be the tail */
3399                                         if (!tail) tail = thishop;
3400                                 } else {
3401                                         thishop->next = NULL;
3402                                         /* Link in at the end */
3403                                         if (tail)
3404                                                 tail->next = thishop;
3405                                         else
3406                                                 head = thishop;
3407                                         tail = thishop;
3408                                 }
3409                         }
3410                         rr += len+1;
3411                 }
3412         }
3413         /* 2nd append the Contact: if there is one */
3414         /* Can be multiple Contact headers, comma separated values - we just take the first */
3415         contact = get_header(req, "Contact");
3416         if (strlen(contact)) {
3417                 ast_log(LOG_DEBUG, "build_route: Contact hop: %s\n", contact);
3418                 /* Look for <: delimited address */
3419                 c = strchr(contact, '<');
3420                 if (c) {
3421                         /* Take to > */
3422                         ++c;
3423                         len = strcspn(c, ">");
3424                 } else {
3425                         /* No <> - just take the lot */
3426                         c = contact; len = strlen(contact);
3427                 }
3428                 thishop = (struct sip_route *)malloc(sizeof(struct sip_route)+len+1);
3429                 if (thishop) {
3430                         strncpy(thishop->hop, c, len);
3431                         thishop->hop[len] = '\0';
3432                         thishop->next = NULL;
3433                         /* Goes at the end */
3434                         if (tail)
3435                                 tail->next = thishop;
3436                         else
3437                                 head = thishop;
3438                 }
3439         }
3440         /* Store as new route */
3441         p->route = head;
3442
3443         /* For debugging dump what we ended up with */
3444         if (sipdebug)
3445                 list_route(p->route);
3446 }
3447
3448 static void md5_hash(char *output, char *input)
3449 {
3450                 struct MD5Context md5;
3451                 unsigned char digest[16];
3452                 char *ptr;
3453                 int x;
3454                 MD5Init(&md5);
3455                 MD5Update(&md5, input, strlen(input));
3456                 MD5Final(digest, &md5);
3457                 ptr = output;
3458                 for (x=0;x<16;x++)
3459                         ptr += sprintf(ptr, "%2.2x", digest[x]);
3460 }
3461
3462 static int check_auth(struct sip_pvt *p, struct sip_request *req, char *randdata, int randlen, char *username, char *secret, char *md5secret, char *method, char *uri, int reliable)
3463 {
3464         int res = -1;
3465         /* Always OK if no secret */
3466         if (!strlen(secret) && !strlen(md5secret))
3467                 return 0;
3468         if (!strlen(randdata) || !strlen(get_header(req, "Proxy-Authorization"))) {
3469                 snprintf(randdata, randlen, "%08x", rand());
3470                 transmit_response_with_auth(p, "407 Proxy Authentication Required", req, randdata, reliable);
3471                 /* Schedule auto destroy in 15 seconds */
3472                 sip_scheddestroy(p, 15000);
3473                 res = 1;
3474         } else {
3475                 /* Whoever came up with the authentication section of SIP can suck my %&#$&* for not putting
3476                    an example in the spec of just what it is you're doing a hash on. */
3477                 char a1[256];
3478                 char a2[256];
3479                 char a1_hash[256];
3480                 char a2_hash[256];
3481                 char resp[256];
3482                 char resp_hash[256];
3483                 char tmp[256] = "";
3484                 char *c;
3485                 char *z;
3486                 char *response ="";
3487                 char *resp_uri ="";
3488
3489                 /* Find their response among the mess that we'r sent for comparison */
3490                 strncpy(tmp, get_header(req, "Proxy-Authorization"), sizeof(tmp) - 1);
3491                 c = tmp;
3492
3493                 while(c) {
3494                         while (*c && (*c < 33)) c++;
3495                         if (!*c)
3496                                 break;
3497                         if (!strncasecmp(c, "response=", strlen("response="))) {
3498                                 c+= strlen("response=");
3499                                 if ((*c == '\"')) {
3500                                         response=++c;
3501                                         if((c = strchr(c,'\"')))
3502                                                 *c = '\0';
3503
3504                                 } else {
3505                                         response=c;
3506                                         if((c = strchr(c,',')))
3507                                                 *c = '\0';
3508                                 }
3509
3510                         } else if (!strncasecmp(c, "uri=", strlen("uri="))) {
3511                                 c+= strlen("uri=");
3512                                 if ((*c == '\"')) {
3513                                         resp_uri=++c;
3514                                         if((c = strchr(c,'\"')))
3515                                                 *c = '\0';
3516                                 } else {
3517                                         resp_uri=c;
3518                                         if((c = strchr(c,',')))
3519                                                 *c = '\0';
3520                                 }
3521
3522                         } else
3523                                 if ((z = strchr(c,' ')) || (z = strchr(c,','))) c=z;
3524                         if (c)
3525                                 c++;
3526                 }
3527                 snprintf(a1, sizeof(a1), "%s:%s:%s", username, "asterisk", secret);
3528                 if(strlen(resp_uri))
3529                         snprintf(a2, sizeof(a2), "%s:%s", method, resp_uri);
3530                 else
3531                         snprintf(a2, sizeof(a2), "%s:%s", method, uri);
3532                 if (strlen(md5secret))
3533                         snprintf(a1_hash, sizeof(a1_hash), "%s", md5secret);
3534                 else