4 * OpenH323 Channel Driver for ASTERISK PBX.
6 * For The NuFone Network
8 * This code has been derived from code created by
9 * Michael Manousos and Mark Spencer
11 * This file is part of the chan_h323 driver for Asterisk
13 * chan_h323 is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2 of the License, or
16 * (at your option) any later version.
18 * chan_h323 is distributed WITHOUT ANY WARRANTY; without even
19 * the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
20 * PURPOSE. See the GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
32 #include <asterisk/lock.h>
33 #include <asterisk/logger.h>
34 #include <asterisk/channel.h>
35 #include <asterisk/channel_pvt.h>
36 #include <asterisk/config.h>
37 #include <asterisk/module.h>
38 #include <asterisk/pbx.h>
39 #include <asterisk/options.h>
40 #include <asterisk/lock.h>
41 #include <asterisk/sched.h>
42 #include <asterisk/io.h>
43 #include <asterisk/rtp.h>
44 #include <asterisk/acl.h>
45 #include <asterisk/callerid.h>
46 #include <asterisk/cli.h>
47 #include <asterisk/dsp.h>
48 #include <sys/socket.h>
55 #include <sys/signal.h>
56 #include <netinet/ip.h>
59 #include "chan_h323.h"
61 /** String variables required by ASTERISK */
62 static char *type = "H323";
63 static char *desc = "The NuFone Network's Open H.323 Channel Driver";
64 static char *tdesc = "The NuFone Network's Open H.323 Channel Driver";
65 static char *config = "h323.conf";
67 static char default_context[AST_MAX_EXTENSION];
69 /** H.323 configuration values */
70 static char gatekeeper[100];
71 static int gatekeeper_disable = 1;
72 static int gatekeeper_discover = 0;
73 static int manual = 0;
75 static int port = 1720;
77 static int gkroute = 0;
79 /* Just about everybody seems to support ulaw, so make it a nice default */
80 static int capability = AST_FORMAT_ULAW;
85 static int dtmfmode = H323_DTMF_RFC2833;
87 static char secret[50];
89 /** Private structure of a OpenH323 channel */
91 pthread_mutex_t lock; /* Channel private lock */
92 call_options_t call_opt; /* Options to be used during call setup */
93 int alreadygone; /* Whether or not we've already been destroyed by or peer */
94 int needdestroy; /* if we need to be destroyed */
95 call_details_t cd; /* Call details */
96 struct ast_channel *owner; /* Who owns us */
97 int capability; /* Special capability */
98 int nonCodecCapability;
99 int outgoing; /* Outgoing or incoming call? */
100 int nat; /* Are we talking to a NAT EP?*/
101 int bridge; /* Determine of we should native bridge or not*/
102 char exten[AST_MAX_EXTENSION]; /* Requested extension */
103 char context[AST_MAX_EXTENSION]; /* Context where to start */
104 char username[81]; /* H.323 alias using this channel */
105 char accountcode[256]; /* Account code */
106 int amaflags; /* AMA Flags */
107 char callerid[80]; /* Caller*ID if available */
108 struct ast_rtp *rtp; /* RTP Session */
110 struct ast_dsp *vad; /* Used for in-band DTMF detection */
111 struct oh323_pvt *next; /* Next channel in list */
114 static struct ast_user_list {
115 struct oh323_user *users;
116 pthread_mutex_t lock;
117 } userl = { NULL, AST_MUTEX_INITIALIZER };
119 static struct ast_peer_list {
120 struct oh323_peer *peers;
121 pthread_mutex_t lock;
122 } peerl = { NULL, AST_MUTEX_INITIALIZER };
124 static struct ast_alias_list {
125 struct oh323_alias *aliases;
126 pthread_mutex_t lock;
127 } aliasl = { NULL, AST_MUTEX_INITIALIZER };
129 /** Asterisk RTP stuff*/
130 static struct sched_context *sched;
131 static struct io_context *io;
133 /** Protect the interface list (of oh323_pvt's) */
134 static pthread_mutex_t iflock = AST_MUTEX_INITIALIZER;
136 /** Usage counter and associated lock */
137 static int usecnt =0;
138 static pthread_mutex_t usecnt_lock = AST_MUTEX_INITIALIZER;
140 /* Protect the monitoring thread, so only one process can kill or start it, and not
141 when it's doing something critical. */
142 static pthread_mutex_t monlock = AST_MUTEX_INITIALIZER;
144 /* This is the thread for the monitor which checks for input on the channels
145 which are not currently in use. */
146 static pthread_t monitor_thread = 0;
148 static int restart_monitor(void);
150 static void __oh323_destroy(struct oh323_pvt *p)
152 struct oh323_pvt *cur, *prev = NULL;
155 ast_rtp_destroy(p->rtp);
158 /* Unlink us from the owner if we have one */
160 ast_pthread_mutex_lock(&p->owner->lock);
161 ast_log(LOG_DEBUG, "Detaching from %s\n", p->owner->name);
162 p->owner->pvt->pvt = NULL;
163 ast_pthread_mutex_unlock(&p->owner->lock);
169 prev->next = cur->next;
178 ast_log(LOG_WARNING, "%p is not in list?!?! \n", cur);
183 static void oh323_destroy(struct oh323_pvt *p)
185 ast_pthread_mutex_lock(&iflock);
187 ast_pthread_mutex_unlock(&iflock);
190 static struct oh323_alias *build_alias(char *name, struct ast_variable *v)
192 struct oh323_alias *alias;
194 alias = (struct oh323_alias *)malloc(sizeof(struct oh323_alias));
197 memset(alias, 0, sizeof(struct oh323_alias));
198 strncpy(alias->name, name, sizeof(alias->name)-1);
201 if (!strcasecmp(v->name, "e164")) {
202 strncpy(alias->e164, v->value, sizeof(alias->e164)-1);
203 } else if (!strcasecmp(v->name, "prefix")) {
204 strncpy(alias->prefix, v->value, sizeof(alias->prefix)-1);
205 } else if (!strcasecmp(v->name, "context")) {
206 strncpy(alias->context, v->value, sizeof(alias->context)-1);
207 } else if (!strcasecmp(v->name, "secret")) {
208 strncpy(alias->prefix, v->value, sizeof(alias->secret)-1);
216 static struct oh323_user *build_user(char *name, struct ast_variable *v)
218 struct oh323_user *user;
221 user = (struct oh323_user *)malloc(sizeof(struct oh323_user));
223 memset(user, 0, sizeof(struct oh323_user));
224 strncpy(user->name, name, sizeof(user->name)-1);
226 /* set the usage flag to a sane starting value*/
228 /* Assume we can native bridge */
232 if (!strcasecmp(v->name, "context")) {
233 strncpy(user->context, v->value, sizeof(user->context)-1);
234 } else if (!strcasecmp(v->name, "bridge")) {
235 user->bridge = ast_true(v->value);
236 } else if (!strcasecmp(v->name, "noFastStart")) {
237 user->noFastStart = ast_true(v->value);
238 } else if (!strcasecmp(v->name, "noH245Tunneling")) {
239 user->noH245Tunneling = ast_true(v->value);
240 } else if (!strcasecmp(v->name, "noSilenceSuppression")) {
241 user->noSilenceSuppression = ast_true(v->value);
242 } else if (!strcasecmp(v->name, "secret")) {
243 strncpy(user->secret, v->value, sizeof(user->secret)-1);
244 } else if (!strcasecmp(v->name, "accountcode")) {
245 strncpy(user->accountcode, v->value, sizeof(user->accountcode)-1);
246 } else if (!strcasecmp(v->name, "incominglimit")) {
247 user->incominglimit = atoi(v->value);
248 if (user->incominglimit < 0)
249 user->incominglimit = 0;
250 } else if (!strcasecmp(v->name, "host")) {
251 if (!strcasecmp(v->value, "dynamic")) {
252 ast_log(LOG_ERROR, "Dynamic host configuration not implemented, yet!\n");
255 } else if (ast_get_ip(&user->addr, v->value)) {
259 /* Let us know we need to use ip authentication */
261 } else if (!strcasecmp(v->name, "amaflags")) {
262 format = ast_cdr_amaflags2int(v->value);
264 ast_log(LOG_WARNING, "Invalid AMA Flags: %s at line %d\n", v->value, v->lineno);
266 user->amaflags = format;
276 static struct oh323_peer *build_peer(char *name, struct ast_variable *v)
278 struct oh323_peer *peer;
279 struct oh323_peer *prev;
283 ast_pthread_mutex_lock(&peerl.lock);
287 if (!strcasecmp(peer->name, name)) {
296 /* Already in the list, remove it and it will be added back (or FREE'd) */
298 prev->next = peer->next;
300 peerl.peers = peer->next;
302 ast_pthread_mutex_unlock(&peerl.lock);
304 ast_pthread_mutex_unlock(&peerl.lock);
305 peer = malloc(sizeof(struct oh323_peer));
306 memset(peer, 0, sizeof(struct oh323_peer));
310 strncpy(peer->name, name, sizeof(peer->name)-1);
313 /* set the usage flag to a sane starting value*/
317 if (!strcasecmp(v->name, "context")) {
318 strncpy(peer->context, v->value, sizeof(peer->context)-1);
319 } else if (!strcasecmp(v->name, "bridge")) {
320 peer->bridge = ast_true(v->value);
321 } else if (!strcasecmp(v->name, "noFastStart")) {
322 peer->noFastStart = ast_true(v->value);
323 } else if (!strcasecmp(v->name, "noH245Tunneling")) {
324 peer->noH245Tunneling = ast_true(v->value);
325 } else if (!strcasecmp(v->name, "noSilenceSuppression")) {
326 peer->noSilenceSuppression = ast_true(v->value);
327 } else if (!strcasecmp(v->name, "outgoinglimit")) {
328 peer->outgoinglimit = atoi(v->value);
329 if (peer->outgoinglimit > 0)
330 peer->outgoinglimit = 0;
331 } else if (!strcasecmp(v->name, "host")) {
332 if (!strcasecmp(v->value, "dynamic")) {
333 ast_log(LOG_ERROR, "Dynamic host configuration not implemented, yet!\n");
337 if (ast_get_ip(&peer->addr, v->value)) {
351 * Send (play) the specified digit to the channel.
354 static int oh323_digit(struct ast_channel *c, char digit)
356 struct oh323_pvt *p = c->pvt->pvt;
357 if (p && p->rtp && (p->dtmfmode & H323_DTMF_RFC2833)) {
358 ast_rtp_senddigit(p->rtp, digit);
360 /* If in-band DTMF is desired, send that */
361 if (p->dtmfmode & H323_DTMF_INBAND)
362 h323_send_tone(p->cd.call_token, digit);
368 * Make a call over the specified channel to the specified
369 * destination. This function will parse the destination string
370 * and determine the address-number to call.
371 * Return -1 on error, 0 on success.
373 static int oh323_call(struct ast_channel *c, char *dest, int timeout)
376 struct oh323_pvt *p = c->pvt->pvt;
377 char called_addr[256];
380 ast_log(LOG_DEBUG, "dest=%s, timeout=%d.\n", dest, timeout);
382 if ((c->_state != AST_STATE_DOWN) && (c->_state != AST_STATE_RESERVED)) {
383 ast_log(LOG_WARNING, "Line is already in use (%s)\n", c->name);
387 /* set the connect port */
388 p->call_opt.port = port;
393 /* Clear the call token */
394 if ((p->cd).call_token == NULL)
395 (p->cd).call_token = (char *)malloc(128);
397 memset((char *)(p->cd).call_token, 0, 128);
399 if (p->cd.call_token == NULL) {
400 ast_log(LOG_ERROR, "Not enough memory.\n");
404 /* Build the address to call */
405 memset(called_addr, 0, sizeof(dest));
406 memcpy(called_addr, dest, sizeof(called_addr));
408 res = h323_make_call(called_addr, &(p->cd), p->call_opt);
411 printf("h323_make_call failed\n");
415 ast_setstate(c, AST_STATE_RINGING);
420 static int oh323_answer(struct ast_channel *c)
424 struct oh323_pvt *p = c->pvt->pvt;
426 res = h323_answering_call(p->cd.call_token, 0);
428 if (c->_state != AST_STATE_UP)
429 ast_setstate(c, AST_STATE_UP);
434 static int oh323_hangup(struct ast_channel *c)
436 struct oh323_pvt *p = c->pvt->pvt;
439 ast_log(LOG_DEBUG, "oh323_hangup(%s)\n", c->name);
441 ast_log(LOG_DEBUG, "Asked to hangup channel not connected\n");
444 ast_pthread_mutex_lock(&p->lock);
445 /* Determine how to disconnect */
447 ast_log(LOG_WARNING, "Huh? We aren't the owner?\n");
448 ast_pthread_mutex_unlock(&p->lock);
451 if (!c || (c->_state != AST_STATE_UP))
456 /* Free dsp used for in-band DTMF detection */
458 ast_dsp_free(p->vad);
464 /* Start the process if it's not already started */
465 if (!p->alreadygone) {
466 if (h323_clear_call((p->cd).call_token))
467 ast_log(LOG_DEBUG, "ClearCall failed.\n");
472 ast_pthread_mutex_unlock(&p->lock);
476 static struct ast_frame *oh323_rtp_read(struct oh323_pvt *p)
478 /* Retrieve audio/etc from channel. Assumes p->lock is already held. */
480 static struct ast_frame null_frame = { AST_FRAME_NULL, };
481 f = ast_rtp_read(p->rtp);
482 /* Don't send RFC2833 if we're not supposed to */
483 if (f && (f->frametype == AST_FRAME_DTMF) && !(p->dtmfmode & H323_DTMF_RFC2833))
486 /* We already hold the channel lock */
487 if (f->frametype == AST_FRAME_VOICE) {
488 if (f->subclass != p->owner->nativeformats) {
489 ast_log(LOG_DEBUG, "Oooh, format changed to %d\n", f->subclass);
490 p->owner->nativeformats = f->subclass;
491 ast_set_read_format(p->owner, p->owner->readformat);
492 ast_set_write_format(p->owner, p->owner->writeformat);
495 /* Do in-band DTMF detection */
496 if (p->dtmfmode & H323_DTMF_INBAND) {
497 f = ast_dsp_process(p->owner,p->vad,f,0);
498 if (f->frametype == AST_FRAME_DTMF)
499 ast_log(LOG_DEBUG, "Got in-band digit %c.\n", f->subclass);
509 static struct ast_frame *oh323_read(struct ast_channel *c)
511 struct ast_frame *fr;
512 struct oh323_pvt *p = c->pvt->pvt;
513 ast_pthread_mutex_lock(&p->lock);
514 fr = oh323_rtp_read(p);
515 ast_pthread_mutex_unlock(&p->lock);
519 static int oh323_write(struct ast_channel *c, struct ast_frame *frame)
521 struct oh323_pvt *p = c->pvt->pvt;
523 if (frame->frametype != AST_FRAME_VOICE) {
524 if (frame->frametype == AST_FRAME_IMAGE)
527 ast_log(LOG_WARNING, "Can't send %d type frames with H323 write\n", frame->frametype);
531 if (!(frame->subclass & c->nativeformats)) {
532 ast_log(LOG_WARNING, "Asked to transmit frame type %d, while native formats is %d (read/write = %d/%d)\n",
533 frame->subclass, c->nativeformats, c->readformat, c->writeformat);
538 ast_pthread_mutex_lock(&p->lock);
540 res = ast_rtp_write(p->rtp, frame);
542 ast_pthread_mutex_unlock(&p->lock);
547 /** FIXME: Can I acutally use this or does Open H.323 take care of everything? */
548 static int oh323_indicate(struct ast_channel *c, int condition)
551 struct oh323_pvt *p = c->pvt->pvt;
554 case AST_CONTROL_RINGING:
555 if (c->_state == AST_STATE_RING) {
556 // transmit_response(p, "180 Ringing", &p->initreq);
560 case AST_CONTROL_BUSY:
561 if (c->_state != AST_STATE_UP) {
562 // transmit_response(p, "600 Busy everywhere", &p->initreq);
564 ast_softhangup(c, AST_SOFTHANGUP_DEV);
568 case AST_CONTROL_CONGESTION:
569 if (c->_state != AST_STATE_UP) {
570 // transmit_response(p, "486 Busy here", &p->initreq);
572 ast_softhangup(c, AST_SOFTHANGUP_DEV);
579 ast_log(LOG_WARNING, "Don't know how to indicate condition %d\n", condition);
585 // FIXME: WTF is this? Do I need this???
586 static int oh323_fixup(struct ast_channel *oldchan, struct ast_channel *newchan)
588 struct oh323_pvt *p = newchan->pvt->pvt;
590 ast_pthread_mutex_lock(&p->lock);
591 if (p->owner != oldchan) {
592 ast_log(LOG_WARNING, "old channel wasn't %p but was %p\n", oldchan, p->owner);
596 ast_pthread_mutex_unlock(&p->lock);
600 static struct ast_channel *oh323_new(struct oh323_pvt *i, int state, const char *host)
602 struct ast_channel *tmp;
604 tmp = ast_channel_alloc(1);
608 snprintf(tmp->name, sizeof(tmp->name)-1, "H323/%s", host);
609 tmp->nativeformats = i->capability;
610 if (!tmp->nativeformats)
611 tmp->nativeformats = capability;
612 fmt = ast_best_codec(tmp->nativeformats);
614 tmp->fds[0] = ast_rtp_fd(i->rtp);
615 ast_setstate(tmp, state);
617 if (state == AST_STATE_RING)
620 tmp->writeformat = fmt;
621 tmp->pvt->rawwriteformat = fmt;
622 tmp->readformat = fmt;
623 tmp->pvt->rawreadformat = fmt;
625 /* Allocate dsp for in-band DTMF support */
626 if (i->dtmfmode & H323_DTMF_INBAND) {
627 i->vad = ast_dsp_new();
628 ast_dsp_set_features(i->vad, DSP_FEATURE_DTMF_DETECT);
631 /* Register the OpenH323 channel's functions. */
633 tmp->pvt->send_digit = oh323_digit;
634 tmp->pvt->call = oh323_call;
635 tmp->pvt->hangup = oh323_hangup;
636 tmp->pvt->answer = oh323_answer;
637 tmp->pvt->read = oh323_read;
638 tmp->pvt->write = oh323_write;
639 tmp->pvt->indicate = oh323_indicate;
640 tmp->pvt->fixup = oh323_fixup;
641 // tmp->pvt->bridge = ast_rtp_bridge;
643 /* Set the owner of this channel */
646 ast_pthread_mutex_lock(&usecnt_lock);
648 ast_pthread_mutex_unlock(&usecnt_lock);
649 ast_update_use_count();
650 strncpy(tmp->context, i->context, sizeof(tmp->context)-1);
651 strncpy(tmp->exten, i->exten, sizeof(tmp->exten)-1);
653 if (strlen(i->callerid))
654 tmp->callerid = strdup(i->callerid);
655 if (state != AST_STATE_DOWN) {
656 if (ast_pbx_start(tmp)) {
657 ast_log(LOG_WARNING, "Unable to start PBX on %s\n", tmp->name);
663 ast_log(LOG_WARNING, "Unable to allocate channel structure\n");
667 static struct oh323_pvt *oh323_alloc(int callid)
671 p = malloc(sizeof(struct oh323_pvt));
673 ast_log(LOG_ERROR, "Couldn't allocate private structure. This is bad\n");
677 /* Keep track of stuff */
678 memset(p, 0, sizeof(struct oh323_pvt));
679 p->rtp = ast_rtp_new(NULL, NULL);
681 ast_log(LOG_WARNING, "Unable to create RTP session: %s\n", strerror(errno));
685 ast_rtp_settos(p->rtp, tos);
686 ast_pthread_mutex_init(&p->lock);
688 p->cd.call_reference = callid;
691 p->dtmfmode = dtmfmode;
692 if (p->dtmfmode & H323_DTMF_RFC2833)
693 p->nonCodecCapability |= AST_RTP_DTMF;
695 /* Add to interface list */
696 ast_pthread_mutex_lock(&iflock);
699 ast_pthread_mutex_unlock(&iflock);
703 static struct oh323_pvt *find_call(int call_reference)
707 ast_pthread_mutex_lock(&iflock);
711 if (p->cd.call_reference == call_reference) {
713 ast_pthread_mutex_unlock(&iflock);
718 ast_pthread_mutex_unlock(&iflock);
723 static struct ast_channel *oh323_request(char *type, int format, void *data)
728 struct ast_channel *tmpc = NULL;
733 ast_log(LOG_DEBUG, "type=%s, format=%d, data=%s.\n", type, format, (char *)data);
736 format &= capability;
738 ast_log(LOG_NOTICE, "Asked to get a channel of unsupported format '%d'\n", format);
742 strncpy(tmp, dest, sizeof(tmp) - 1);
743 host = strchr(tmp, '@');
756 ast_log(LOG_WARNING, "Unable to build pvt data for '%s'\n", (char *)data);
760 /* Assign a default capability */
761 p->capability = capability;
764 if (p->dtmfmode & H323_DTMF_RFC2833)
765 p->nonCodecCapability |= AST_RTP_DTMF;
767 p->nonCodecCapability &= ~AST_RTP_DTMF;
771 ast_log(LOG_DEBUG, "Host: %s\tUsername: %s\n", host, p->username);
774 strncpy(p->username, ext, sizeof(p->username) - 1);
775 tmpc = oh323_new(p, AST_STATE_DOWN, host);
784 struct oh323_alias *find_alias(const char *source_aliases)
786 struct oh323_alias *a;
792 if (!strcasecmp(a->name, source_aliases)) {
800 struct oh323_user *find_user(const char *source_aliases)
802 struct oh323_user *u;
808 if (!strcasecmp(u->name, source_aliases)) {
817 struct oh323_peer *find_peer(char *dest_peer)
819 struct oh323_peer *p;
824 if (!strcasecmp(p->name, dest_peer)) {
834 * Callback for sending digits from H.323 up to asterisk
837 int send_digit(unsigned call_reference, char digit)
842 ast_log(LOG_DEBUG, "Recieved Digit: %c\n", digit);
843 p = find_call(call_reference);
846 ast_log(LOG_ERROR, "Private structure not found in send_digit.\n");
849 memset(&f, 0, sizeof(f));
850 f.frametype = AST_FRAME_DTMF;
857 f.src = "SEND_DIGIT";
859 return ast_queue_frame(p->owner, &f, 1);
863 * Call-back function that gets called when any H.323 connection is made
865 * Returns the local RTP port
867 int create_connection(unsigned call_reference)
870 struct sockaddr_in us;
872 p = find_call(call_reference);
875 ast_log(LOG_ERROR, "Unable to allocate private structure, this is very bad.\n");
879 /* figure out our local RTP port and tell the H.323 stack about it*/
880 ast_rtp_get_us(p->rtp, &us);
881 return ntohs(us.sin_port);
885 * Call-back function for incoming calls
887 * Returns 1 on success
890 int setup_incoming_call(call_details_t cd)
893 struct oh323_pvt *p = NULL;
894 struct ast_channel *c = NULL;
895 struct oh323_user *user = NULL;
896 struct oh323_alias *alias = NULL;
898 /* allocate the call*/
899 p = oh323_alloc(cd.call_reference);
902 ast_log(LOG_ERROR, "Unable to allocate private structure, this is bad.\n");
906 /* Populate the call details in the private structure */
907 p->cd.call_token = cd.call_token;
908 p->cd.call_source_aliases = cd.call_source_aliases;
909 p->cd.call_dest_alias = cd.call_dest_alias;
910 p->cd.call_source_e164 = cd.call_source_e164;
911 p->cd.call_dest_e164 = cd.call_dest_e164;
914 printf(" == Setting up Call\n");
915 printf(" -- Calling party name: %s\n", p->cd.call_source_aliases);
916 printf(" -- Calling party number: %s\n", p->cd.call_source_e164);
917 printf(" -- Called party name: %s\n", p->cd.call_dest_alias);
918 printf(" -- Called party number: %s\n", p->cd.call_dest_e164);
921 /* Decide if we are allowing Gatekeeper routed calls*/
922 if ((!strcasecmp(cd.sourceIp, gatekeeper)) && (gkroute == -1) && (usingGk == 1)) {
924 if (strlen(cd.call_dest_e164)) {
925 strncpy(p->exten, cd.call_dest_e164, sizeof(p->exten)-1);
926 strncpy(p->context, default_context, sizeof(p->context)-1);
928 alias = find_alias(cd.call_dest_alias);
931 ast_log(LOG_ERROR, "Call for %s rejected, alias not found\n", cd.call_dest_alias);
934 printf("Alias found: %s and %s\n", alias->name, alias->context);
936 strncpy(p->exten, alias->name, sizeof(p->exten)-1);
937 strncpy(p->context, alias->context, sizeof(p->context)-1);
940 sprintf(p->callerid, "%s <%s>", p->cd.call_source_aliases, p->cd.call_source_e164);
943 /* Either this call is not from the Gatekeeper
944 or we are not allowing gk routed calls */
946 user = find_user(cd.call_source_aliases);
949 sprintf(p->callerid, "%s <%s>", p->cd.call_source_aliases, p->cd.call_source_e164);
950 if (strlen(p->cd.call_dest_e164)) {
951 strncpy(p->exten, cd.call_dest_e164, sizeof(p->exten)-1);
953 strncpy(p->exten, cd.call_dest_alias, sizeof(p->exten)-1);
955 if (!strlen(default_context)) {
956 ast_log(LOG_ERROR, "Call from user '%s' rejected due to no default context\n", p->cd.call_source_aliases);
959 strncpy(p->context, default_context, sizeof(p->context)-1);
960 ast_log(LOG_DEBUG, "Sending %s to context [%s]\n", cd.call_source_aliases, p->context);
963 if (strcasecmp(cd.sourceIp, inet_ntoa(user->addr.sin_addr))){
964 ast_log(LOG_ERROR, "Call from user '%s' rejected due to non-matching IP address of '%s'\n", user->name, cd.sourceIp);
968 if (user->incominglimit > 0) {
969 if (user->inUse >= user->incominglimit) {
970 ast_log(LOG_ERROR, "Call from user '%s' rejected due to usage limit of %d\n", user->name, user->incominglimit);
974 strncpy(p->context, user->context, sizeof(p->context)-1);
975 p->bridge = user->bridge;
977 if (strlen(user->callerid) && strlen(p->callerid))
978 strncpy(p->callerid, user->callerid, sizeof(p->callerid) - 1);
980 sprintf(p->callerid, "%s <%s>", p->cd.call_source_aliases, p->cd.call_source_e164);
982 if (strlen(p->cd.call_dest_e164)) {
983 strncpy(p->exten, cd.call_dest_e164, sizeof(p->exten)-1);
985 strncpy(p->exten, cd.call_dest_alias, sizeof(p->exten)-1);
988 if (strlen(user->accountcode)) {
989 strncpy(p->accountcode, user->accountcode, sizeof(p->accountcode)-1);
992 /* Increment the usage counter */
997 /* allocate a channel and tell asterisk about it */
998 c = oh323_new(p, AST_STATE_RINGING, cd.call_token);
1001 ast_log(LOG_ERROR, "Couldn't create channel. This is bad\n");
1009 * Call-back function to establish an outgoing H.323 call
1011 * Returns 1 on success
1013 int setup_outgoing_call(call_details_t cd)
1019 if (p->inUse >= p->outgoinglimit) {
1020 ast_log(LOG_ERROR, "Call to %s rejected due to usage limit of %d outgoing channels\n", p->name, p->inUse);
1025 ast_log(LOG_ERROR, "Rejecting call: peer %s not found\n", dest_peer);
1031 * Call-back function that gets called for each rtp channel opened
1035 void setup_rtp_connection(unsigned call_reference, const char *remoteIp, int remotePort)
1037 struct oh323_pvt *p = NULL;
1038 struct sockaddr_in them;
1040 /* Find the call or allocate a private structure if call not found */
1041 p = find_call(call_reference);
1044 ast_log(LOG_ERROR, "Something is wrong: rtp\n");
1048 them.sin_family = AF_INET;
1049 them.sin_addr.s_addr = inet_addr(remoteIp); // only works for IPv4
1050 them.sin_port = htons(remotePort);
1051 ast_rtp_set_peer(p->rtp, &them);
1057 * Call-back function to signal asterisk that the channel has been answered
1060 void connection_made(unsigned call_reference)
1062 struct ast_channel *c = NULL;
1063 struct oh323_pvt *p = NULL;
1065 p = find_call(call_reference);
1068 ast_log(LOG_ERROR, "Something is wrong: connection\n");
1072 printf("Channel has no owner\n");
1077 ast_setstate(c, AST_STATE_UP);
1082 * Call-back function to cleanup communication
1085 void cleanup_connection(call_details_t cd)
1087 struct oh323_pvt *p = NULL;
1088 // struct oh323_peer *peer = NULL;
1089 struct oh323_user *user = NULL;
1090 struct ast_rtp *rtp = NULL;
1092 ast_log(LOG_DEBUG, "Cleaning up our mess\n");
1094 p = find_call(cd.call_reference);
1100 /* Decrement usage counter */
1102 user = find_user(cd.call_source_aliases);
1110 peer = find_peer(cd.call_dest_alias);
1113 user = find_user(cd.call_source_aliases);
1121 /* Immediately stop RTP */
1122 ast_rtp_destroy(rtp);
1129 ast_queue_hangup(p->owner, 1);
1135 static void *do_monitor(void *data)
1138 struct oh323_pvt *oh323 = NULL;
1141 /* Check for interfaces needing to be killed */
1142 ast_pthread_mutex_lock(&iflock);
1146 if (oh323->needdestroy) {
1147 __oh323_destroy(oh323);
1150 oh323 = oh323->next;
1152 ast_pthread_mutex_unlock(&iflock);
1154 pthread_testcancel();
1156 /* Wait for sched or io */
1157 res = ast_sched_wait(sched);
1158 if ((res < 0) || (res > 1000))
1160 res = ast_io_wait(io, res);
1161 ast_pthread_mutex_lock(&monlock);
1163 ast_sched_runq(sched);
1164 ast_pthread_mutex_unlock(&monlock);
1171 static int restart_monitor(void)
1173 /* If we're supposed to be stopped -- stay stopped */
1174 if (monitor_thread == -2)
1176 if (ast_pthread_mutex_lock(&monlock)) {
1177 ast_log(LOG_WARNING, "Unable to lock monitor\n");
1180 if (monitor_thread == pthread_self()) {
1181 ast_pthread_mutex_unlock(&monlock);
1182 ast_log(LOG_WARNING, "Cannot kill myself\n");
1185 if (monitor_thread) {
1186 /* Wake up the thread */
1187 pthread_kill(monitor_thread, SIGURG);
1189 /* Start a new monitor */
1190 if (pthread_create(&monitor_thread, NULL, do_monitor, NULL) < 0) {
1191 ast_pthread_mutex_unlock(&monlock);
1192 ast_log(LOG_ERROR, "Unable to start monitor thread.\n");
1196 ast_pthread_mutex_unlock(&monlock);
1200 static int h323_do_trace(int fd, int argc, char *argv[])
1203 return RESULT_SHOWUSAGE;
1205 h323_debug(1, atoi(argv[2]));
1206 ast_cli(fd, "H.323 trace set to level %s\n", argv[2]);
1207 return RESULT_SUCCESS;
1210 static int h323_no_trace(int fd, int argc, char *argv[])
1213 return RESULT_SHOWUSAGE;
1216 ast_cli(fd, "H.323 trace disabled\n");
1217 return RESULT_SUCCESS;
1220 static int h323_do_debug(int fd, int argc, char *argv[])
1223 return RESULT_SHOWUSAGE;
1226 ast_cli(fd, "H323 debug enabled\n");
1227 return RESULT_SUCCESS;
1230 static int h323_no_debug(int fd, int argc, char *argv[])
1233 return RESULT_SHOWUSAGE;
1236 ast_cli(fd, "H323 Debug disabled\n");
1237 return RESULT_SUCCESS;
1240 static int h323_gk_cycle(int fd, int argc, char *argv[])
1243 return RESULT_SHOWUSAGE;
1247 /* Possibly register with a GK */
1248 if (!gatekeeper_disable) {
1249 if (h323_set_gk(gatekeeper_discover, gatekeeper, secret)) {
1250 ast_log(LOG_ERROR, "Gatekeeper registration failed.\n");
1255 return RESULT_SUCCESS;
1259 static char trace_usage[] =
1260 "Usage: h.323 trace <level num>\n"
1261 " Enables H.323 stack tracing for debugging purposes\n";
1263 static char no_trace_usage[] =
1264 "Usage: h.323 no trace\n"
1265 " Disables H.323 stack tracing for debugging purposes\n";
1267 static char debug_usage[] =
1268 "Usage: h.323 debug\n"
1269 " Enables chan_h323 debug output\n";
1271 static char no_debug_usage[] =
1272 "Usage: h.323 no debug\n"
1273 " Disables chan_h323 debug output\n";
1275 static char show_codec_usage[] =
1276 "Usage: h.323 show codec\n"
1277 " Shows all enabled codecs\n";
1279 static char show_cycle_usage[] =
1280 "Usage: h.323 gk cycle\n"
1281 " Manually re-register with the Gatekeper\n";
1284 static struct ast_cli_entry cli_trace =
1285 { { "h.323", "trace", NULL }, h323_do_trace, "Enable H.323 Stack Tracing", trace_usage };
1286 static struct ast_cli_entry cli_no_trace =
1287 { { "h.323", "no", "trace", NULL }, h323_no_trace, "Disable H.323 Stack Tracing", no_trace_usage };
1288 static struct ast_cli_entry cli_debug =
1289 { { "h.323", "debug", NULL }, h323_do_debug, "Enable chan_h323 debug", debug_usage };
1290 static struct ast_cli_entry cli_no_debug =
1291 { { "h.323", "no", "debug", NULL }, h323_no_debug, "Disable chan_h323 debug", no_debug_usage };
1292 static struct ast_cli_entry cli_show_codecs =
1293 { { "h.323", "show", "codecs", NULL }, h323_show_codec, "Show enabled codecs", show_codec_usage };
1294 static struct ast_cli_entry cli_gk_cycle =
1295 { { "h.323", "gk", "cycle", NULL }, h323_gk_cycle, "Manually re-register with the Gatekeper", show_cycle_usage };
1303 struct ast_config *cfg;
1304 struct ast_variable *v;
1305 struct oh323_peer *peer = NULL;
1306 struct oh323_user *user = NULL;
1307 struct oh323_alias *alias = NULL;
1312 cfg = ast_load(config);
1314 /* We *must* have a config file otherwise stop immediately */
1316 ast_log(LOG_NOTICE, "Unable to load config %s, H.323 disabled\n", config);
1321 dtmfmode = H323_DTMF_RFC2833;
1323 memset(&bindaddr, 0, sizeof(bindaddr));
1325 v = ast_variable_browse(cfg, "general");
1327 /* Create the interface list */
1328 if (!strcasecmp(v->name, "jitter")) {
1329 jitter = (int) strtol(v->value, NULL, 10);
1330 if (jitter < 20 || jitter > 10000) {
1331 ast_log(LOG_NOTICE, "Invalid jitter value! Valid range: 20ms to 10000ms. Recommended: 100ms");
1335 } else if (!strcasecmp(v->name, "port")) {
1336 port = (int)strtol(v->value, NULL, 10);
1337 } else if (!strcasecmp(v->name, "bindaddr")) {
1338 if (!(hp = gethostbyname(v->value))) {
1339 ast_log(LOG_WARNING, "Invalid address: %s\n", v->value);
1341 memcpy(&bindaddr.sin_addr, hp->h_addr, sizeof(bindaddr.sin_addr));
1343 } else if (!strcasecmp(v->name, "allow")) {
1344 format = ast_getformatbyname(v->value);
1346 ast_log(LOG_WARNING, "Cannot allow unknown format '%s'\n", v->value);
1348 capability |= format;
1349 } else if (!strcasecmp(v->name, "disallow")) {
1350 format = ast_getformatbyname(v->value);
1352 ast_log(LOG_WARNING, "Cannot disallow unknown format '%s'\n", v->value);
1354 capability &= ~format;
1355 } else if (!strcasecmp(v->name, "tos")) {
1356 if (sscanf(v->value, "%i", &format) == 1)
1357 tos = format & 0xff;
1358 else if (!strcasecmp(v->value, "lowdelay"))
1359 tos = IPTOS_LOWDELAY;
1360 else if (!strcasecmp(v->value, "throughput"))
1361 tos = IPTOS_THROUGHPUT;
1362 else if (!strcasecmp(v->value, "reliability"))
1363 tos = IPTOS_RELIABILITY;
1364 else if (!strcasecmp(v->value, "mincost"))
1365 tos = IPTOS_MINCOST;
1366 else if (!strcasecmp(v->value, "none"))
1369 ast_log(LOG_WARNING, "Invalid tos value at line %d, should be 'lowdelay', 'throughput', 'reliability', 'mincost', or 'none'\n", v->lineno);
1370 } else if (!strcasecmp(v->name, "gatekeeper")) {
1371 if (!strcasecmp(v->value, "DISABLE")) {
1372 gatekeeper_disable = 1;
1374 } else if (!strcasecmp(v->value, "DISCOVER")) {
1375 gatekeeper_disable = 0;
1376 gatekeeper_discover = 1;
1379 gatekeeper_disable = 0;
1381 strncpy(gatekeeper, v->value, sizeof(gatekeeper)-1);
1383 } else if (!strcasecmp(v->name, "secret")) {
1384 strncpy(secret, v->value, sizeof(secret)-1);
1385 } else if (!strcasecmp(v->name, "AllowGKRouted")) {
1386 gkroute = ast_true(v->value);
1387 } else if (!strcasecmp(v->name, "context")) {
1388 strncpy(default_context, v->value, sizeof(default_context)-1);
1389 printf(" == Setting default context to %s\n", default_context);
1390 } else if (!strcasecmp(v->name, "manual")) {
1391 manual = ast_true(v->value);
1392 } else if (!strcasecmp(v->name, "dtmfmode")) {
1393 if (!strcasecmp(v->value, "inband"))
1394 dtmfmode=H323_DTMF_INBAND;
1395 else if (!strcasecmp(v->value, "rfc2833"))
1396 dtmfmode = H323_DTMF_RFC2833;
1398 ast_log(LOG_WARNING, "Unknown dtmf mode '%s', using rfc2833\n", v->value);
1399 dtmfmode = H323_DTMF_RFC2833;
1405 cat = ast_category_browse(cfg, NULL);
1407 if (strcasecmp(cat, "general")) {
1408 utype = ast_variable_retrieve(cfg, cat, "type");
1410 if (!strcasecmp(utype, "user") || !strcasecmp(utype, "friend")) {
1411 user = build_user(cat, ast_variable_browse(cfg, cat));
1413 ast_pthread_mutex_lock(&userl.lock);
1414 user->next = userl.users;
1416 ast_pthread_mutex_unlock(&userl.lock);
1418 } else if (!strcasecmp(utype, "peer") || !strcasecmp(utype, "friend")) {
1419 peer = build_peer(cat, ast_variable_browse(cfg, cat));
1421 ast_pthread_mutex_lock(&peerl.lock);
1422 peer->next = peerl.peers;
1424 ast_pthread_mutex_unlock(&peerl.lock);
1426 } else if (!strcasecmp(utype, "h323")) {
1427 alias = build_alias(cat, ast_variable_browse(cfg, cat));
1429 ast_pthread_mutex_lock(&aliasl.lock);
1430 alias->next = aliasl.aliases;
1431 aliasl.aliases = alias;
1432 ast_pthread_mutex_unlock(&aliasl.lock);
1435 ast_log(LOG_WARNING, "Unknown type '%s' for '%s' in %s\n", utype, cat, config);
1438 ast_log(LOG_WARNING, "Section '%s' lacks type\n", cat);
1440 cat = ast_category_browse(cfg, cat);
1443 /* Register our H.323 aliases if any*/
1445 if (h323_set_alias(alias)) {
1446 ast_log(LOG_ERROR, "Alias %s rejected by endpoint\n", alias->name);
1449 alias = alias->next;
1452 /* Add some capabilities */
1453 if(h323_set_capability(capability, dtmfmode)) {
1454 ast_log(LOG_ERROR, "Capabilities failure, this is bad.\n");
1458 printf("CONTEXT RELOAD: [%s]\n", default_context);
1465 void delete_users(void)
1467 struct oh323_user *user, *userlast;
1468 struct oh323_peer *peer;
1470 /* Delete all users */
1471 ast_pthread_mutex_lock(&userl.lock);
1472 for (user=userl.users;user;) {
1478 ast_pthread_mutex_unlock(&userl.lock);
1479 ast_pthread_mutex_lock(&peerl.lock);
1480 for (peer=peerl.peers;peer;) {
1481 /* Assume all will be deleted, and we'll find out for sure later */
1485 ast_pthread_mutex_unlock(&peerl.lock);
1488 void delete_aliases(void)
1490 struct oh323_alias *alias, *aliaslast;
1492 /* Delete all users */
1493 ast_pthread_mutex_lock(&aliasl.lock);
1494 for (alias=aliasl.aliases;alias;) {
1499 aliasl.aliases=NULL;
1500 ast_pthread_mutex_unlock(&aliasl.lock);
1503 void prune_peers(void)
1505 /* Prune peers who still are supposed to be deleted */
1506 struct oh323_peer *peer, *peerlast, *peernext;
1507 ast_pthread_mutex_lock(&peerl.lock);
1509 for (peer=peerl.peers;peer;) {
1510 peernext = peer->next;
1514 peerlast->next = peernext;
1516 peerl.peers = peernext;
1521 ast_pthread_mutex_unlock(&peerl.lock);
1530 if (strlen(gatekeeper)) {
1536 /* Possibly register with a GK */
1537 if (!gatekeeper_disable) {
1538 if (h323_set_gk(gatekeeper_discover, gatekeeper, secret)) {
1539 ast_log(LOG_ERROR, "Gatekeeper registration failed.\n");
1549 static struct ast_rtp *oh323_get_rtp_peer(struct ast_channel *chan)
1551 struct oh323_pvt *p;
1553 if (p && p->rtp && p->bridge)
1558 static int oh323_set_rtp_peer(struct ast_channel *chan, struct ast_rtp *rtp)
1560 struct oh323_pvt *p;
1561 struct sockaddr_in them;
1562 struct sockaddr_in us;
1569 ast_log(LOG_ERROR, "No Private Structure, this is bad\n");
1573 ast_rtp_get_peer(rtp, &them);
1574 printf("peer is now: %s\n", inet_ntoa(them.sin_addr));
1576 ast_rtp_set_peer(p->rtp, &them);
1577 ast_rtp_get_us(p->rtp, &us);
1579 h323_native_bridge(p->cd.call_token, inet_ntoa(them.sin_addr), inet_ntoa(us.sin_addr));
1585 static struct ast_rtp_protocol oh323_rtp = {
1586 get_rtp_info: oh323_get_rtp_peer,
1587 set_rtp_peer: oh323_set_rtp_peer,
1594 /* fire up the H.323 Endpoint */
1595 h323_end_point_create();
1597 res = reload_config();
1599 /* Make sure we can register our channel type */
1600 if (ast_channel_register(type, tdesc, capability, oh323_request)) {
1601 ast_log(LOG_ERROR, "Unable to register channel class %s\n", type);
1605 ast_cli_register(&cli_debug);
1606 ast_cli_register(&cli_no_debug);
1607 ast_cli_register(&cli_trace);
1608 ast_cli_register(&cli_no_trace);
1609 ast_cli_register(&cli_show_codecs);
1610 ast_cli_register(&cli_gk_cycle);
1612 oh323_rtp.type = type;
1613 ast_rtp_proto_register(&oh323_rtp);
1615 sched = sched_context_create();
1617 ast_log(LOG_WARNING, "Unable to create schedule context\n");
1619 io = io_context_create();
1621 ast_log(LOG_WARNING, "Unable to create I/O context\n");
1624 /* Register our callback functions */
1625 h323_callback_register(setup_incoming_call,
1626 setup_outgoing_call,
1628 setup_rtp_connection,
1630 connection_made, send_digit);
1632 /* start the h.323 listener */
1633 if (h323_start_listener(port, bindaddr, jitter)) {
1634 ast_log(LOG_ERROR, "Unable to create H323 listener.\n");
1639 /* Possibly register with a GK */
1640 if (!gatekeeper_disable) {
1641 if (h323_set_gk(gatekeeper_discover, gatekeeper, secret)) {
1642 ast_log(LOG_ERROR, "Gatekeeper registration failed.\n");
1647 /* And start the monitor for the first time */
1656 struct oh323_pvt *p, *pl;
1658 if (!ast_pthread_mutex_lock(&iflock)) {
1659 /* hangup all interfaces if they have an owner */
1663 ast_softhangup(p->owner, AST_SOFTHANGUP_APPUNLOAD);
1667 ast_pthread_mutex_unlock(&iflock);
1669 ast_log(LOG_WARNING, "Unable to lock the interface list\n");
1673 if (!ast_pthread_mutex_lock(&iflock)) {
1674 /* destroy all the interfaces and free their memory */
1679 /* free associated memory */
1683 ast_pthread_mutex_unlock(&iflock);
1685 ast_log(LOG_WARNING, "Unable to lock the interface list\n");
1691 /* unregister channel type */
1692 ast_channel_unregister(type);
1701 ast_pthread_mutex_lock(&usecnt_lock);
1703 ast_pthread_mutex_unlock(&usecnt_lock);
1714 return ASTERISK_GPL_KEY;