mirror of
				https://github.com/asterisk/asterisk.git
				synced 2025-10-31 10:47:18 +00:00 
			
		
		
		
	- Fix the OUTGOING stuff (merge from 1.4)
- Make sure we UNREF authpeer when not needed git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@46399 65c4cc65-6c06-0410-ace0-fbb531ad65f3
This commit is contained in:
		| @@ -702,7 +702,7 @@ struct sip_auth { | ||||
| #define SIP_USEREQPHONE		(1 << 10)	/*!< Add user=phone to numeric URI. Default off */ | ||||
| #define SIP_REALTIME		(1 << 11)	/*!< Flag for realtime users */ | ||||
| #define SIP_USECLIENTCODE	(1 << 12)	/*!< Trust X-ClientCode info message */ | ||||
| #define SIP_OUTGOING		(1 << 13)	/*!< Is this an outgoing call? */ | ||||
| #define SIP_OUTGOING		(1 << 13)	/*!< Direction of the last transaction in this dialog */ | ||||
| #define SIP_CAN_BYE		(1 << 14)	/*!< Can we send BYE on this dialog? */ | ||||
| #define SIP_DEFER_BYE_ON_TRANSFER	(1 << 15)	/*!< Do not hangup at first ast_hangup */ | ||||
| #define SIP_DTMF		(3 << 16)	/*!< DTMF Support: four settings, uses two bits */ | ||||
| @@ -5569,16 +5569,6 @@ static int reqprep(struct sip_request *req, struct sip_pvt *p, int sipmethod, in | ||||
| 			ast_log(LOG_DEBUG, "Strict routing enforced for session %s\n", p->callid); | ||||
| 	} | ||||
| 	 | ||||
| #ifdef SKREP | ||||
| 	/* Let's try to figure out the direction of this transaction within the dialog */ | ||||
| 	/* If we're sending an ACK, we DID send the INVITE - which means outbound. | ||||
| 	   INVITE's are outbound transactions, always  | ||||
| 	*/ | ||||
| 	if (sipmethod == SIP_ACK || sipmethod == SIP_INVITE) | ||||
| 		is_outbound = TRUE; | ||||
| 	/* In other case's, let's follow the flow of the dialog */ | ||||
| #endif | ||||
|  | ||||
| 	if (sipmethod == SIP_CANCEL) | ||||
| 		c = p->initreq.rlPart2;	/* Use original URI */ | ||||
| 	else if (sipmethod == SIP_ACK) { | ||||
| @@ -6424,6 +6414,7 @@ static int transmit_reinvite_with_sdp(struct sip_pvt *p, int t38version) | ||||
| 	/* Use this as the basis */ | ||||
| 	initialize_initreq(p, &req); | ||||
| 	p->lastinvite = p->ocseq; | ||||
| 	ast_set_flag(&p->flags[0], SIP_OUTGOING);		/* Change direction of this dialog */ | ||||
| 	return send_request(p, &req, XMIT_CRITICAL, p->ocseq); | ||||
| } | ||||
|  | ||||
| @@ -10585,7 +10576,7 @@ static int sip_show_channel(int fd, int argc, char *argv[]) | ||||
| 				ast_cli(fd, "  * Subscription (type: %s)\n", subscription_type2str(cur->subscribed)); | ||||
| 			else | ||||
| 				ast_cli(fd, "  * SIP Call\n"); | ||||
| 			ast_cli(fd, "  Direction:              %s\n", ast_test_flag(&cur->flags[0], SIP_OUTGOING)?"Outgoing":"Incoming"); | ||||
| 			ast_cli(fd, "  Curr. trans. direction:  %s\n", ast_test_flag(&cur->flags[0], SIP_OUTGOING) ? "Outgoing" : "Incoming"); | ||||
| 			ast_cli(fd, "  Call-ID:                %s\n", cur->callid); | ||||
| 			ast_cli(fd, "  Owner channel ID:       %s\n", cur->owner ? cur->owner->name : "<none>"); | ||||
| 			ast_cli(fd, "  Our Codec Capability:   %d\n", cur->capability); | ||||
| @@ -13171,14 +13162,14 @@ static int handle_request_invite(struct sip_pvt *p, struct sip_request *req, int | ||||
| 		p->pendinginvite = seqno; | ||||
| 		check_via(p, req); | ||||
|  | ||||
| 		copy_request(&p->initreq, req);		/* Save this INVITE as the transaction basis */ | ||||
| 		if (!p->owner) {	/* Not a re-invite */ | ||||
| 			/* Use this as the basis */ | ||||
| 			copy_request(&p->initreq, req); | ||||
| 			if (debug) | ||||
| 				ast_verbose("Using INVITE request as basis request - %s\n", p->callid); | ||||
| 			append_history(p, "Invite", "New call: %s", p->callid); | ||||
| 			parse_ok_contact(p, req); | ||||
| 		} else {	/* Re-invite on existing call */ | ||||
| 			ast_clear_flag(&p->flags[0], SIP_OUTGOING);	/* This is now an inbound dialog */ | ||||
| 			/* Handle SDP here if we already have an owner */ | ||||
| 			if (find_sdp(req)) { | ||||
| 				if (process_sdp(p, req)) { | ||||
| @@ -14148,6 +14139,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req, | ||||
| 	if (!ast_test_flag(&p->flags[1], SIP_PAGE2_ALLOWSUBSCRIBE)) { | ||||
| 		transmit_response(p, "403 Forbidden (policy)", req); | ||||
| 		ast_set_flag(&p->flags[0], SIP_NEEDDESTROY); | ||||
| 		if (authpeer) | ||||
| 			ASTOBJ_UNREF(authpeer,sip_destroy_peer); | ||||
| 		return 0; | ||||
| 	} | ||||
|  | ||||
| @@ -14168,6 +14161,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req, | ||||
| 	if (gotdest) { | ||||
| 		transmit_response(p, "404 Not Found", req); | ||||
| 		ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);	 | ||||
| 		if (authpeer) | ||||
| 			ASTOBJ_UNREF(authpeer,sip_destroy_peer); | ||||
| 		return 0; | ||||
| 	} | ||||
|  | ||||
| @@ -14176,6 +14171,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req, | ||||
| 		make_our_tag(p->tag, sizeof(p->tag)); | ||||
|  | ||||
| 	if (!strcmp(event, "presence") || !strcmp(event, "dialog")) { /* Presence, RFC 3842 */ | ||||
| 		if (authpeer)	/* We do not need the authpeer any more */ | ||||
| 			ASTOBJ_UNREF(authpeer,sip_destroy_peer); | ||||
|  | ||||
| 		/* Header from Xten Eye-beam Accept: multipart/related, application/rlmi+xml, application/pidf+xml, application/xpidf+xml */ | ||||
| 		/* Polycom phones only handle xpidf+xml, even if they say they can | ||||
| @@ -14205,6 +14202,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req, | ||||
| 			if (option_debug > 1) | ||||
| 				ast_log(LOG_DEBUG, "Received SIP mailbox subscription for unknown format: %s\n", accept); | ||||
| 			ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);	 | ||||
| 			if (authpeer) | ||||
| 				ASTOBJ_UNREF(authpeer,sip_destroy_peer); | ||||
| 			return 0; | ||||
| 		} | ||||
| 		/* Looks like they actually want a mailbox status  | ||||
| @@ -14216,6 +14215,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req, | ||||
| 			transmit_response(p, "404 Not found (no mailbox)", req); | ||||
| 			ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);	 | ||||
| 			ast_log(LOG_NOTICE, "Received SIP subscribe for peer without mailbox: %s\n", authpeer->name); | ||||
| 			if (authpeer) | ||||
| 				ASTOBJ_UNREF(authpeer,sip_destroy_peer); | ||||
| 			return 0; | ||||
| 		} | ||||
|  | ||||
| @@ -14225,14 +14226,18 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req, | ||||
| 			sip_destroy(authpeer->mwipvt); | ||||
| 		authpeer->mwipvt = p;		/* Link from peer to pvt */ | ||||
| 		p->relatedpeer = authpeer;	/* Link from pvt to peer */ | ||||
| 		/* Do not release authpeer here */ | ||||
| 	} else { /* At this point, Asterisk does not understand the specified event */ | ||||
| 		transmit_response(p, "489 Bad Event", req); | ||||
| 		if (option_debug > 1) | ||||
| 			ast_log(LOG_DEBUG, "Received SIP subscribe for unknown event package: %s\n", event); | ||||
| 		ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);	 | ||||
| 		if (authpeer) | ||||
| 			ASTOBJ_UNREF(authpeer,sip_destroy_peer); | ||||
| 		return 0; | ||||
| 	} | ||||
|  | ||||
| 	/* Add subscription for extension state from the PBX core */ | ||||
| 	if (p->subscribed != MWI_NOTIFICATION && !resubscribe) | ||||
| 		p->stateid = ast_extension_state_add(p->context, p->exten, cb_extensionstate, p); | ||||
|  | ||||
| @@ -14311,8 +14316,6 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req, | ||||
| 		if (!p->expiry) | ||||
| 			ast_set_flag(&p->flags[0], SIP_NEEDDESTROY); | ||||
| 	} | ||||
| 	if (authpeer) | ||||
| 		ASTOBJ_UNREF(authpeer, sip_destroy_peer); | ||||
| 	return 1; | ||||
| } | ||||
|  | ||||
|   | ||||
		Reference in New Issue
	
	Block a user