mirror of
				https://github.com/asterisk/asterisk.git
				synced 2025-11-03 20:38:59 +00:00 
			
		
		
		
	git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@4889 65c4cc65-6c06-0410-ace0-fbb531ad65f3
		
			
				
	
	
		
			833 lines
		
	
	
		
			23 KiB
		
	
	
	
		
			C
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			833 lines
		
	
	
		
			23 KiB
		
	
	
	
		
			C
		
	
	
		
			Executable File
		
	
	
	
	
/*
 | 
						|
 * Asterisk -- A telephony toolkit for Linux.
 | 
						|
 *
 | 
						|
 * Provide Open Settlement Protocol capability
 | 
						|
 * 
 | 
						|
 * Copyright (C) 2004 - 2005, Digium, Inc.
 | 
						|
 *
 | 
						|
 * Mark Spencer <markster@digium.com>
 | 
						|
 *
 | 
						|
 * This program is free software, distributed under the terms of
 | 
						|
 * the GNU General Public License
 | 
						|
 */
 | 
						|
 | 
						|
#include <sys/types.h>
 | 
						|
#include <osp.h>
 | 
						|
#include <asterisk/file.h>
 | 
						|
#include <asterisk/channel.h>
 | 
						|
#include <asterisk/logger.h>
 | 
						|
#include <asterisk/say.h>
 | 
						|
#include <asterisk/module.h>
 | 
						|
#include <asterisk/options.h>
 | 
						|
#include <asterisk/crypto.h>
 | 
						|
#include <asterisk/md5.h>
 | 
						|
#include <asterisk/cli.h>
 | 
						|
#include <asterisk/io.h>
 | 
						|
#include <asterisk/lock.h>
 | 
						|
#include <asterisk/astosp.h>
 | 
						|
#include <asterisk/config.h>
 | 
						|
#include <asterisk/utils.h>
 | 
						|
#include <asterisk/lock.h>
 | 
						|
#include <asterisk/causes.h>
 | 
						|
#include <asterisk/callerid.h>
 | 
						|
#include <openssl/err.h>
 | 
						|
#include <stdio.h>
 | 
						|
#include <dirent.h>
 | 
						|
#include <string.h>
 | 
						|
#include <errno.h>
 | 
						|
#include <unistd.h>
 | 
						|
#include <fcntl.h>
 | 
						|
#include "../asterisk.h"
 | 
						|
#include "../astconf.h"
 | 
						|
#include <openssl/bio.h>
 | 
						|
#include <openssl/pem.h>
 | 
						|
#include <openssl/evp.h>
 | 
						|
 | 
						|
 | 
						|
#define MAX_CERTS 10
 | 
						|
#define MAX_SERVICEPOINTS 10
 | 
						|
#define OSP_MAX 256
 | 
						|
 | 
						|
#define OSP_DEFAULT_MAX_CONNECTIONS	20
 | 
						|
#define OSP_DEFAULT_RETRY_DELAY		0
 | 
						|
#define OSP_DEFAULT_RETRY_LIMIT		2
 | 
						|
#define OSP_DEFAULT_TIMEOUT			500
 | 
						|
 | 
						|
static int loadPemCert(unsigned char *FileName, unsigned char *buffer, int *len);
 | 
						|
static int loadPemPrivateKey(unsigned char *FileName, unsigned char *buffer, int *len);
 | 
						|
 | 
						|
AST_MUTEX_DEFINE_STATIC(osplock);
 | 
						|
 | 
						|
static int initialized = 0;
 | 
						|
static int hardware = 0;
 | 
						|
 | 
						|
struct osp_provider {
 | 
						|
	char name[OSP_MAX];
 | 
						|
	char localpvtkey[OSP_MAX];
 | 
						|
	char localcert[OSP_MAX];
 | 
						|
	char cacerts[MAX_CERTS][OSP_MAX]; 
 | 
						|
	int cacount;
 | 
						|
	char servicepoints[MAX_SERVICEPOINTS][OSP_MAX];
 | 
						|
	char source[OSP_MAX];
 | 
						|
	int spcount;
 | 
						|
	int dead;
 | 
						|
	int maxconnections;
 | 
						|
	int retrydelay;
 | 
						|
	int retrylimit;
 | 
						|
	int timeout;
 | 
						|
	OSPTPROVHANDLE handle;
 | 
						|
	struct osp_provider *next;
 | 
						|
};
 | 
						|
static struct osp_provider *providers;
 | 
						|
 | 
						|
static int osp_build(struct ast_config *cfg, char *cat)
 | 
						|
{
 | 
						|
	OSPTCERT TheAuthCert[MAX_CERTS];
 | 
						|
	unsigned char Reqbuf[4096],LocalBuf[4096],AuthBuf[MAX_CERTS][4096];
 | 
						|
	struct ast_variable *v;
 | 
						|
	struct osp_provider *osp;
 | 
						|
	int x,length,errorcode=0;
 | 
						|
	int mallocd=0,i;
 | 
						|
	char *cacerts[MAX_CERTS];
 | 
						|
	const char *servicepoints[MAX_SERVICEPOINTS];
 | 
						|
	OSPTPRIVATEKEY privatekey;
 | 
						|
	OSPTCERT localcert;
 | 
						|
	OSPTCERT *authCerts[MAX_CERTS];
 | 
						|
 | 
						|
	
 | 
						|
	
 | 
						|
	ast_mutex_lock(&osplock);
 | 
						|
	osp = providers;
 | 
						|
	while(osp) {
 | 
						|
		if (!strcasecmp(osp->name, cat))
 | 
						|
			break;
 | 
						|
		osp = osp->next;
 | 
						|
	}
 | 
						|
	ast_mutex_unlock(&osplock);
 | 
						|
	if (!osp) {
 | 
						|
		mallocd = 1;
 | 
						|
		osp = malloc(sizeof(struct osp_provider));
 | 
						|
		if (!osp) {
 | 
						|
			ast_log(LOG_WARNING, "Out of memory!\n");
 | 
						|
			return -1;
 | 
						|
		}
 | 
						|
		memset(osp, 0, sizeof(struct osp_provider));
 | 
						|
		osp->handle = -1;
 | 
						|
	}
 | 
						|
	strncpy(osp->name, cat, sizeof(osp->name) - 1);
 | 
						|
	snprintf(osp->localpvtkey, sizeof(osp->localpvtkey), AST_KEY_DIR "/%s-privatekey.pem", cat);
 | 
						|
	snprintf(osp->localcert, sizeof(osp->localpvtkey), AST_KEY_DIR "/%s-localcert.pem", cat);
 | 
						|
	osp->maxconnections=OSP_DEFAULT_MAX_CONNECTIONS;
 | 
						|
	osp->retrydelay = OSP_DEFAULT_RETRY_DELAY;
 | 
						|
	osp->retrylimit = OSP_DEFAULT_RETRY_LIMIT;
 | 
						|
	osp->timeout = OSP_DEFAULT_TIMEOUT;
 | 
						|
	osp->source[0] = '\0';
 | 
						|
	ast_log(LOG_DEBUG, "Building OSP Provider '%s'\n", cat);
 | 
						|
	v = ast_variable_browse(cfg, cat);
 | 
						|
	while(v) {
 | 
						|
		if (!strcasecmp(v->name, "privatekey")) {
 | 
						|
			if (v->value[0] == '/')
 | 
						|
				strncpy(osp->localpvtkey, v->value, sizeof(osp->localpvtkey) - 1);
 | 
						|
			else
 | 
						|
				snprintf(osp->localpvtkey, sizeof(osp->localpvtkey), AST_KEY_DIR "/%s", v->value);
 | 
						|
		} else if (!strcasecmp(v->name, "localcert")) {
 | 
						|
			if (v->value[0] == '/')
 | 
						|
				strncpy(osp->localcert, v->value, sizeof(osp->localcert) - 1);
 | 
						|
			else
 | 
						|
				snprintf(osp->localcert, sizeof(osp->localcert), AST_KEY_DIR "/%s", v->value);
 | 
						|
		} else if (!strcasecmp(v->name, "cacert")) {
 | 
						|
			if (osp->cacount < MAX_CERTS) {
 | 
						|
				if (v->value[0] == '/')
 | 
						|
					strncpy(osp->cacerts[osp->cacount], v->value, sizeof(osp->cacerts[0]) - 1);
 | 
						|
				else
 | 
						|
					snprintf(osp->cacerts[osp->cacount], sizeof(osp->cacerts[0]), AST_KEY_DIR "/%s", v->value);
 | 
						|
				osp->cacount++;
 | 
						|
			} else
 | 
						|
				ast_log(LOG_WARNING, "Too many CA Certificates at line %d\n", v->lineno);
 | 
						|
		} else if (!strcasecmp(v->name, "servicepoint")) {
 | 
						|
			if (osp->spcount < MAX_SERVICEPOINTS) {
 | 
						|
				strncpy(osp->servicepoints[osp->spcount], v->value, sizeof(osp->servicepoints[0]) - 1);
 | 
						|
				osp->spcount++;
 | 
						|
			} else
 | 
						|
				ast_log(LOG_WARNING, "Too many Service points at line %d\n", v->lineno);
 | 
						|
		} else if (!strcasecmp(v->name, "maxconnections")) {
 | 
						|
			if ((sscanf(v->value, "%i", &x) == 1) && (x > 0) && (x <= 1000)) {
 | 
						|
				osp->maxconnections = x;
 | 
						|
			} else
 | 
						|
				ast_log(LOG_WARNING, "maxconnections should be an integer from 1 to 1000, not '%s' at line %d\n", v->value, v->lineno);
 | 
						|
		} else if (!strcasecmp(v->name, "retrydelay")) {
 | 
						|
			if ((sscanf(v->value, "%i", &x) == 1) && (x >= 0) && (x <= 10)) {
 | 
						|
				osp->retrydelay = x;
 | 
						|
			} else
 | 
						|
				ast_log(LOG_WARNING, "retrydelay should be an integer from 0 to 10, not '%s' at line %d\n", v->value, v->lineno);
 | 
						|
		} else if (!strcasecmp(v->name, "retrylimit")) {
 | 
						|
			if ((sscanf(v->value, "%i", &x) == 1) && (x >= 0) && (x <= 100)) {
 | 
						|
				osp->retrylimit = x;
 | 
						|
			} else
 | 
						|
				ast_log(LOG_WARNING, "retrylimit should be an integer from 0 to 100, not '%s' at line %d\n", v->value, v->lineno);
 | 
						|
		} else if (!strcasecmp(v->name, "timeout")) {
 | 
						|
			if ((sscanf(v->value, "%i", &x) == 1) && (x >= 200) && (x <= 10000)) {
 | 
						|
				osp->timeout = x;
 | 
						|
			} else
 | 
						|
				ast_log(LOG_WARNING, "timeout should be an integer from 200 to 10000, not '%s' at line %d\n", v->value, v->lineno);
 | 
						|
		} else if (!strcasecmp(v->name, "source")) {
 | 
						|
			strncpy(osp->source, v->value, sizeof(osp->source) - 1);
 | 
						|
		}
 | 
						|
		v = v->next;
 | 
						|
	}
 | 
						|
	if (osp->cacount < 1) {
 | 
						|
		snprintf(osp->cacerts[osp->cacount], sizeof(osp->cacerts[0]), AST_KEY_DIR "/%s-cacert.pem", cat);
 | 
						|
		osp->cacount++;
 | 
						|
	}
 | 
						|
	for (x=0;x<osp->cacount;x++)
 | 
						|
		cacerts[x] = osp->cacerts[x];
 | 
						|
	for (x=0;x<osp->spcount;x++)
 | 
						|
		servicepoints[x] = osp->servicepoints[x];
 | 
						|
	
 | 
						|
	ast_mutex_lock(&osplock);
 | 
						|
	osp->dead = 0;
 | 
						|
	if (osp->handle > -1) {
 | 
						|
		ast_log(LOG_DEBUG, "Deleting old handle for '%s'\n", osp->name);
 | 
						|
		OSPPProviderDelete(osp->handle, 0);
 | 
						|
	}
 | 
						|
		
 | 
						|
 | 
						|
    length = 0;
 | 
						|
	ast_log(LOG_DEBUG, "Loading private key for '%s' (%s)\n", osp->name, osp->localpvtkey);
 | 
						|
    errorcode = loadPemPrivateKey(osp->localpvtkey,Reqbuf,&length);
 | 
						|
    if (errorcode == 0)
 | 
						|
    {
 | 
						|
        privatekey.PrivateKeyData = Reqbuf;
 | 
						|
        privatekey.PrivateKeyLength = length;
 | 
						|
    }
 | 
						|
    else
 | 
						|
    {
 | 
						|
         return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    length = 0;
 | 
						|
	ast_log(LOG_DEBUG, "Loading local cert for '%s' (%s)\n", osp->name, osp->localcert);
 | 
						|
    errorcode = loadPemCert(osp->localcert,LocalBuf,&length);
 | 
						|
    if (errorcode == 0)
 | 
						|
    {
 | 
						|
        localcert.CertData = LocalBuf;
 | 
						|
        localcert.CertDataLength = length;
 | 
						|
    }
 | 
						|
    else
 | 
						|
    {
 | 
						|
         return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    for (i=0;i<osp->cacount;i++)
 | 
						|
    {
 | 
						|
        length = 0;
 | 
						|
		ast_log(LOG_DEBUG, "Loading CA cert %d for '%s' (%s)\n", i + 1, osp->name, osp->cacerts[i]);
 | 
						|
        errorcode = loadPemCert(osp->cacerts[i],AuthBuf[i],&length);
 | 
						|
        if (errorcode == 0)
 | 
						|
        {
 | 
						|
            TheAuthCert[i].CertData = AuthBuf[i];
 | 
						|
            TheAuthCert[i].CertDataLength = length;
 | 
						|
            authCerts[i] = &(TheAuthCert[i]);
 | 
						|
        }
 | 
						|
        else
 | 
						|
        {
 | 
						|
			return -1;        
 | 
						|
		}
 | 
						|
    }
 | 
						|
	
 | 
						|
	ast_log(LOG_DEBUG, "Creating provider handle for '%s'\n", osp->name);
 | 
						|
	
 | 
						|
	ast_log(LOG_DEBUG, "Service point '%s %d'\n", servicepoints[0], osp->spcount);
 | 
						|
	
 | 
						|
	if (OSPPProviderNew(osp->spcount, 
 | 
						|
					    servicepoints, 
 | 
						|
					   NULL, 
 | 
						|
					   "localhost", 
 | 
						|
					   &privatekey, 
 | 
						|
					   &localcert, 
 | 
						|
					   osp->cacount, 
 | 
						|
					   (const OSPTCERT **)authCerts, 
 | 
						|
					   1, 
 | 
						|
					   300, 
 | 
						|
					   osp->maxconnections, 
 | 
						|
					   1, 
 | 
						|
					   osp->retrydelay, 
 | 
						|
					   osp->retrylimit, 
 | 
						|
					   osp->timeout, 
 | 
						|
					   "", 
 | 
						|
					   "", 
 | 
						|
					   &osp->handle)) {
 | 
						|
		ast_log(LOG_WARNING, "Unable to initialize provider '%s'\n", cat);
 | 
						|
		osp->dead = 1;
 | 
						|
	}
 | 
						|
	
 | 
						|
	if (mallocd) {
 | 
						|
		osp->next = providers;
 | 
						|
		providers = osp;
 | 
						|
	}
 | 
						|
	ast_mutex_unlock(&osplock);	
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int show_osp(int fd, int argc, char *argv[])
 | 
						|
{
 | 
						|
	struct osp_provider *osp;
 | 
						|
	char *search = NULL;
 | 
						|
	int x;
 | 
						|
	int found = 0;
 | 
						|
	if ((argc < 2) || (argc > 3))
 | 
						|
		return RESULT_SHOWUSAGE;
 | 
						|
	if (argc > 2)
 | 
						|
		search = argv[2];
 | 
						|
	if (!search) 
 | 
						|
		ast_cli(fd, "OSP: %s %s\n", initialized ? "Initialized" : "Uninitialized", hardware ? "Accelerated" : "Normal");
 | 
						|
	
 | 
						|
	ast_mutex_lock(&osplock);
 | 
						|
	osp = providers;
 | 
						|
	while(osp) {
 | 
						|
		if (!search || !strcasecmp(osp->name, search)) {
 | 
						|
			if (found)
 | 
						|
				ast_cli(fd, "\n");
 | 
						|
			ast_cli(fd, " == OSP Provider '%s' ==\n", osp->name);
 | 
						|
			ast_cli(fd, "Local Private Key: %s\n", osp->localpvtkey);
 | 
						|
			ast_cli(fd, "Local Certificate: %s\n", osp->localcert);
 | 
						|
			for (x=0;x<osp->cacount;x++)
 | 
						|
				ast_cli(fd, "CA Certificate %d:  %s\n", x + 1, osp->cacerts[x]);
 | 
						|
			for (x=0;x<osp->spcount;x++)
 | 
						|
				ast_cli(fd, "Service Point %d:   %s\n", x + 1, osp->servicepoints[x]);
 | 
						|
			ast_cli(fd, "Max Connections:   %d\n", osp->maxconnections);
 | 
						|
			ast_cli(fd, "Retry Delay:       %d seconds\n", osp->retrydelay);
 | 
						|
			ast_cli(fd, "Retry Limit:       %d\n", osp->retrylimit);
 | 
						|
			ast_cli(fd, "Timeout:           %d milliseconds\n", osp->timeout);
 | 
						|
			ast_cli(fd, "Source:            %s\n", strlen(osp->source) ? osp->source : "<unspecified>");
 | 
						|
			ast_cli(fd, "OSP Handle:        %d\n", osp->handle);
 | 
						|
			found++;
 | 
						|
		}
 | 
						|
		osp = osp->next;
 | 
						|
	}
 | 
						|
	ast_mutex_unlock(&osplock);
 | 
						|
	if (!found) {
 | 
						|
		if (search) 
 | 
						|
			ast_cli(fd, "Unable to find OSP provider '%s'\n", search);
 | 
						|
		else
 | 
						|
			ast_cli(fd, "No OSP providers configured\n");
 | 
						|
	}
 | 
						|
	return RESULT_SUCCESS;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/*----------------------------------------------*
 | 
						|
 *               Loads the Certificate          *
 | 
						|
 *----------------------------------------------*/
 | 
						|
static int loadPemCert(unsigned char *FileName, unsigned char *buffer, int *len)
 | 
						|
{
 | 
						|
    int length = 0;
 | 
						|
    unsigned char *temp;
 | 
						|
    BIO *bioIn = NULL;
 | 
						|
    X509 *cert=NULL;
 | 
						|
    int retVal = OSPC_ERR_NO_ERROR;
 | 
						|
 | 
						|
    temp = buffer;
 | 
						|
    bioIn = BIO_new_file((const char*)FileName,"r");
 | 
						|
    if (bioIn == NULL)
 | 
						|
    {
 | 
						|
		ast_log(LOG_WARNING,"Failed to find the File - %s \n",FileName);
 | 
						|
		return -1;
 | 
						|
    }
 | 
						|
    else
 | 
						|
    {
 | 
						|
        cert = PEM_read_bio_X509(bioIn,NULL,NULL,NULL);
 | 
						|
        if (cert == NULL)
 | 
						|
        {
 | 
						|
			ast_log(LOG_WARNING,"Failed to parse the Certificate from the File - %s \n",FileName);
 | 
						|
			return -1;
 | 
						|
        }
 | 
						|
        else
 | 
						|
        {
 | 
						|
            length = i2d_X509(cert,&temp);
 | 
						|
            if (cert == 0)
 | 
						|
            {
 | 
						|
				ast_log(LOG_WARNING,"Failed to parse the Certificate from the File - %s, Length=0 \n",FileName);
 | 
						|
				return -1;
 | 
						|
            }
 | 
						|
            else
 | 
						|
			{
 | 
						|
               *len = length;
 | 
						|
            }
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    if (bioIn != NULL)
 | 
						|
    {
 | 
						|
        BIO_free(bioIn);
 | 
						|
    }
 | 
						|
 | 
						|
    if (cert != NULL)
 | 
						|
    {
 | 
						|
        X509_free(cert);
 | 
						|
    }
 | 
						|
    return retVal;
 | 
						|
}
 | 
						|
 | 
						|
/*----------------------------------------------*
 | 
						|
 *               Loads the Private Key          *
 | 
						|
 *----------------------------------------------*/
 | 
						|
static int loadPemPrivateKey(unsigned char *FileName, unsigned char *buffer, int *len)
 | 
						|
{
 | 
						|
    int length = 0;
 | 
						|
    unsigned char *temp;
 | 
						|
    BIO *bioIn = NULL;
 | 
						|
    RSA *pKey = NULL;
 | 
						|
    int retVal = OSPC_ERR_NO_ERROR;
 | 
						|
 | 
						|
    temp = buffer;
 | 
						|
 | 
						|
    bioIn = BIO_new_file((const char*)FileName,"r");
 | 
						|
    if (bioIn == NULL)
 | 
						|
    {
 | 
						|
		ast_log(LOG_WARNING,"Failed to find the File - %s \n",FileName);
 | 
						|
		return -1;
 | 
						|
    }
 | 
						|
    else
 | 
						|
    {
 | 
						|
        pKey = PEM_read_bio_RSAPrivateKey(bioIn,NULL,NULL,NULL);
 | 
						|
        if (pKey == NULL)
 | 
						|
        {
 | 
						|
			ast_log(LOG_WARNING,"Failed to parse the Private Key from the File - %s \n",FileName);
 | 
						|
			return -1;
 | 
						|
        }
 | 
						|
        else
 | 
						|
        {
 | 
						|
            length = i2d_RSAPrivateKey(pKey,&temp);
 | 
						|
            if (length == 0)
 | 
						|
            {
 | 
						|
				ast_log(LOG_WARNING,"Failed to parse the Private Key from the File - %s, Length=0 \n",FileName);
 | 
						|
				return -1;
 | 
						|
            }
 | 
						|
            else
 | 
						|
            {
 | 
						|
                *len = length;
 | 
						|
            }
 | 
						|
        }
 | 
						|
    }
 | 
						|
    if (bioIn != NULL)
 | 
						|
    {
 | 
						|
        BIO_free(bioIn);
 | 
						|
    }
 | 
						|
 | 
						|
    if (pKey != NULL)
 | 
						|
    {
 | 
						|
       RSA_free(pKey);
 | 
						|
    }
 | 
						|
    return retVal;
 | 
						|
}
 | 
						|
 | 
						|
int ast_osp_validate(char *provider, char *token, int *handle, unsigned int *timelimit, char *callerid, struct in_addr addr, char *extension)
 | 
						|
{
 | 
						|
	char tmp[256]="", *l, *n;
 | 
						|
	char iabuf[INET_ADDRSTRLEN];
 | 
						|
	char source[OSP_MAX] = ""; /* Same length as osp->source */
 | 
						|
	char *token2;
 | 
						|
	int tokenlen;
 | 
						|
	struct osp_provider *osp;
 | 
						|
	int res = 0;
 | 
						|
	unsigned int authorised, dummy;
 | 
						|
 | 
						|
	if (!provider || !strlen(provider))
 | 
						|
		provider = "default";
 | 
						|
 | 
						|
	token2 = ast_strdupa(token);
 | 
						|
	if (!token2)
 | 
						|
		return -1;
 | 
						|
	tokenlen = ast_base64decode(token2, token, strlen(token));
 | 
						|
	*handle = -1;
 | 
						|
	if (!callerid)
 | 
						|
		callerid = "";
 | 
						|
	strncpy(tmp, callerid, sizeof(tmp) - 1);
 | 
						|
	ast_callerid_parse(tmp, &n, &l);
 | 
						|
	if (!l)
 | 
						|
		l = "";
 | 
						|
	else {
 | 
						|
		ast_shrink_phone_number(l);
 | 
						|
		if (!ast_isphonenumber(l))
 | 
						|
			l = "";
 | 
						|
	}
 | 
						|
	callerid = l;
 | 
						|
	ast_mutex_lock(&osplock);
 | 
						|
	ast_inet_ntoa(iabuf, sizeof(iabuf), addr);
 | 
						|
	osp = providers;
 | 
						|
	while(osp) {
 | 
						|
		if (!strcasecmp(osp->name, provider)) {
 | 
						|
			if (OSPPTransactionNew(osp->handle, handle)) {
 | 
						|
				ast_log(LOG_WARNING, "Unable to create OSP Transaction handle!\n");
 | 
						|
			} else {
 | 
						|
				strncpy(source, osp->source, sizeof(source) - 1);
 | 
						|
				res = 1;
 | 
						|
			}
 | 
						|
			break;
 | 
						|
		}
 | 
						|
		osp = osp->next;
 | 
						|
	}
 | 
						|
	ast_mutex_unlock(&osplock);
 | 
						|
	if (res) {
 | 
						|
		res = 0;
 | 
						|
		dummy = 0;
 | 
						|
		if (!OSPPTransactionValidateAuthorisation(*handle, iabuf, source, NULL, NULL, 
 | 
						|
			callerid, OSPC_E164, extension, OSPC_E164, 0, "", tokenlen, token2, &authorised, timelimit, &dummy, NULL, TOKEN_ALGO_BOTH)) {
 | 
						|
			if (authorised) {
 | 
						|
				ast_log(LOG_DEBUG, "Validated token for '%s' from '%s@%s'\n", extension, callerid, iabuf);
 | 
						|
				res = 1;
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return res;	
 | 
						|
}
 | 
						|
 | 
						|
int ast_osp_lookup(struct ast_channel *chan, char *provider, char *extension, char *callerid, struct ast_osp_result *result)
 | 
						|
{
 | 
						|
	int cres;
 | 
						|
	int res = 0;
 | 
						|
	int counts;
 | 
						|
	int tokenlen;
 | 
						|
	unsigned int dummy=0;
 | 
						|
	unsigned int timelimit;
 | 
						|
	unsigned int callidlen;
 | 
						|
	struct osp_provider *osp;
 | 
						|
	char source[OSP_MAX] = ""; /* Same length as osp->source */
 | 
						|
	char uniqueid[32] = "";
 | 
						|
	char callednum[2048]="";
 | 
						|
	char callingnum[2048]="";
 | 
						|
	char destination[2048]="";
 | 
						|
	char token[2000];
 | 
						|
	char tmp[256]="", *l, *n;
 | 
						|
	OSPTCALLID *callid;
 | 
						|
	OSPE_DEST_PROT prot;
 | 
						|
 | 
						|
	result->handle = -1;
 | 
						|
	result->numresults = 0;
 | 
						|
	result->tech[0] = '\0';
 | 
						|
	result->dest[0] = '\0';
 | 
						|
	result->token[0] = '\0';
 | 
						|
 | 
						|
	if (!provider || !strlen(provider))
 | 
						|
		provider = "default";
 | 
						|
 | 
						|
	if (!callerid)
 | 
						|
		callerid = "";
 | 
						|
	strncpy(tmp, callerid, sizeof(tmp) - 1);
 | 
						|
	ast_callerid_parse(tmp, &n, &l);
 | 
						|
	if (!l)
 | 
						|
		l = "";
 | 
						|
	else {
 | 
						|
		ast_shrink_phone_number(l);
 | 
						|
		if (!ast_isphonenumber(l))
 | 
						|
			l = "";
 | 
						|
	}
 | 
						|
	callerid = l;
 | 
						|
 | 
						|
	if (chan) {
 | 
						|
		strncpy(uniqueid, chan->uniqueid, sizeof(uniqueid) - 1);
 | 
						|
		cres = ast_autoservice_start(chan);
 | 
						|
		if (cres < 0)
 | 
						|
			return cres;
 | 
						|
	}
 | 
						|
	ast_mutex_lock(&osplock);
 | 
						|
	osp = providers;
 | 
						|
	while(osp) {
 | 
						|
		if (!strcasecmp(osp->name, provider)) {
 | 
						|
			if (OSPPTransactionNew(osp->handle, &result->handle)) {
 | 
						|
				ast_log(LOG_WARNING, "Unable to create OSP Transaction handle!\n");
 | 
						|
			} else {
 | 
						|
				strncpy(source, osp->source, sizeof(source) - 1);
 | 
						|
				res = 1;
 | 
						|
			}
 | 
						|
			break;
 | 
						|
		}
 | 
						|
		osp = osp->next;
 | 
						|
	}
 | 
						|
	ast_mutex_unlock(&osplock);
 | 
						|
	if (res) {
 | 
						|
		res = 0;
 | 
						|
		callid = OSPPCallIdNew(strlen(uniqueid), uniqueid);
 | 
						|
		if (callid) {
 | 
						|
			/* No more than 10 back */
 | 
						|
			counts = 10;
 | 
						|
			dummy = 0;
 | 
						|
			callidlen = sizeof(uniqueid);
 | 
						|
			if (!OSPPTransactionRequestAuthorisation(result->handle, source, "", 
 | 
						|
				  callerid,OSPC_E164, extension, OSPC_E164, NULL, 1, &callid, NULL, &counts, &dummy, NULL)) {
 | 
						|
				if (counts) {
 | 
						|
					tokenlen = sizeof(token);
 | 
						|
					result->numresults = counts - 1;
 | 
						|
					if (!OSPPTransactionGetFirstDestination(result->handle, 0, NULL, NULL, &timelimit, &callidlen, uniqueid, 
 | 
						|
						sizeof(callednum), callednum, sizeof(callingnum), callingnum, sizeof(destination), destination, 0, NULL, &tokenlen, token)) {
 | 
						|
						ast_log(LOG_DEBUG, "Got destination '%s' and called: '%s' calling: '%s' for '%s' (provider '%s')\n",
 | 
						|
							destination, callednum, callingnum, extension, provider);
 | 
						|
						do {
 | 
						|
							ast_base64encode(result->token, token, tokenlen, sizeof(result->token) - 1);
 | 
						|
							if ((strlen(destination) > 2) && !OSPPTransactionGetDestProtocol(result->handle, &prot)) {
 | 
						|
								res = 1;
 | 
						|
								/* Strip leading and trailing brackets */
 | 
						|
								destination[strlen(destination) - 1] = '\0';
 | 
						|
								switch(prot) {
 | 
						|
								case OSPE_DEST_PROT_H323_SETUP:
 | 
						|
									strncpy(result->tech, "H323", sizeof(result->tech) - 1);
 | 
						|
									snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1);
 | 
						|
									break;
 | 
						|
								case OSPE_DEST_PROT_SIP:
 | 
						|
									strncpy(result->tech, "SIP", sizeof(result->tech) - 1);
 | 
						|
									snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1);
 | 
						|
									break;
 | 
						|
								case OSPE_DEST_PROT_IAX:
 | 
						|
									strncpy(result->tech, "IAX", sizeof(result->tech) - 1);
 | 
						|
									snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1);
 | 
						|
									break;
 | 
						|
								default:
 | 
						|
									ast_log(LOG_DEBUG, "Unknown destination protocol '%d', skipping...\n", prot);
 | 
						|
									res = 0;
 | 
						|
								}
 | 
						|
								if (!res && result->numresults) {
 | 
						|
									result->numresults--;
 | 
						|
									if (OSPPTransactionGetNextDestination(result->handle, OSPC_FAIL_INCOMPATIBLE_DEST, 0, NULL, NULL, &timelimit, &callidlen, uniqueid, 
 | 
						|
											sizeof(callednum), callednum, sizeof(callingnum), callingnum, sizeof(destination), destination, 0, NULL, &tokenlen, token)) {
 | 
						|
											break;
 | 
						|
									}
 | 
						|
								}
 | 
						|
							} else {
 | 
						|
								ast_log(LOG_DEBUG, "Missing destination protocol\n");
 | 
						|
								break;
 | 
						|
							}
 | 
						|
						} while(!res && result->numresults);
 | 
						|
					}
 | 
						|
				}
 | 
						|
				
 | 
						|
			}
 | 
						|
			OSPPCallIdDelete(&callid);
 | 
						|
		}
 | 
						|
		if (!res) {
 | 
						|
			OSPPTransactionDelete(result->handle);
 | 
						|
			result->handle = -1;
 | 
						|
		}
 | 
						|
		
 | 
						|
	}
 | 
						|
	if (!osp) 
 | 
						|
		ast_log(LOG_NOTICE, "OSP Provider '%s' does not exist!\n", provider);
 | 
						|
	if (chan) {
 | 
						|
		cres = ast_autoservice_stop(chan);
 | 
						|
		if (cres < 0)
 | 
						|
			return cres;
 | 
						|
	}
 | 
						|
	return res;
 | 
						|
}
 | 
						|
 | 
						|
int ast_osp_next(struct ast_osp_result *result, int cause)
 | 
						|
{
 | 
						|
	int res = 0;
 | 
						|
	int tokenlen;
 | 
						|
	unsigned int dummy=0;
 | 
						|
	unsigned int timelimit;
 | 
						|
	unsigned int callidlen;
 | 
						|
	char uniqueid[32] = "";
 | 
						|
	char callednum[2048]="";
 | 
						|
	char callingnum[2048]="";
 | 
						|
	char destination[2048]="";
 | 
						|
	char token[2000];
 | 
						|
	OSPE_DEST_PROT prot;
 | 
						|
 | 
						|
	result->tech[0] = '\0';
 | 
						|
	result->dest[0] = '\0';
 | 
						|
	result->token[0] = '\0';
 | 
						|
 | 
						|
	if (result->handle > -1) {
 | 
						|
		dummy = 0;
 | 
						|
		callidlen = sizeof(uniqueid);
 | 
						|
		if (result->numresults) {
 | 
						|
			tokenlen = sizeof(token);
 | 
						|
			while(!res && result->numresults) {
 | 
						|
				result->numresults--;
 | 
						|
				if (!OSPPTransactionGetNextDestination(result->handle, OSPC_FAIL_INCOMPATIBLE_DEST, 0, NULL, NULL, &timelimit, &callidlen, uniqueid, 
 | 
						|
									sizeof(callednum), callednum, sizeof(callingnum), callingnum, sizeof(destination), destination, 0, NULL, &tokenlen, token)) {
 | 
						|
					ast_base64encode(result->token, token, tokenlen, sizeof(result->token) - 1);
 | 
						|
					if ((strlen(destination) > 2) && !OSPPTransactionGetDestProtocol(result->handle, &prot)) {
 | 
						|
						res = 1;
 | 
						|
						/* Strip leading and trailing brackets */
 | 
						|
						destination[strlen(destination) - 1] = '\0';
 | 
						|
						switch(prot) {
 | 
						|
						case OSPE_DEST_PROT_H323_SETUP:
 | 
						|
							strncpy(result->tech, "H323", sizeof(result->tech) - 1);
 | 
						|
							snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1);
 | 
						|
							break;
 | 
						|
						case OSPE_DEST_PROT_SIP:
 | 
						|
							strncpy(result->tech, "SIP", sizeof(result->tech) - 1);
 | 
						|
							snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1);
 | 
						|
							break;
 | 
						|
						case OSPE_DEST_PROT_IAX:
 | 
						|
							strncpy(result->tech, "IAX", sizeof(result->tech) - 1);
 | 
						|
							snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1);
 | 
						|
							break;
 | 
						|
						default:
 | 
						|
							ast_log(LOG_DEBUG, "Unknown destination protocol '%d', skipping...\n", prot);
 | 
						|
							res = 0;
 | 
						|
						}
 | 
						|
					} else {
 | 
						|
						ast_log(LOG_DEBUG, "Missing destination protocol\n");
 | 
						|
						break;
 | 
						|
					}
 | 
						|
				}
 | 
						|
			}
 | 
						|
			
 | 
						|
		}
 | 
						|
		if (!res) {
 | 
						|
			OSPPTransactionDelete(result->handle);
 | 
						|
			result->handle = -1;
 | 
						|
		}
 | 
						|
		
 | 
						|
	}
 | 
						|
	return res;
 | 
						|
}
 | 
						|
 | 
						|
static enum OSPEFAILREASON cause2reason(int cause)
 | 
						|
{
 | 
						|
	switch(cause) {
 | 
						|
	case AST_CAUSE_BUSY:
 | 
						|
		return OSPC_FAIL_USER_BUSY;
 | 
						|
	case AST_CAUSE_CONGESTION:
 | 
						|
		return OSPC_FAIL_SWITCHING_EQUIPMENT_CONGESTION;
 | 
						|
	case AST_CAUSE_UNALLOCATED:
 | 
						|
		return OSPC_FAIL_UNALLOC_NUMBER;
 | 
						|
	case AST_CAUSE_NOTDEFINED:
 | 
						|
		return OSPC_FAIL_NORMAL_UNSPECIFIED;
 | 
						|
	case AST_CAUSE_NOANSWER:
 | 
						|
		return OSPC_FAIL_NO_ANSWER_FROM_USER;
 | 
						|
	case AST_CAUSE_NORMAL:
 | 
						|
	default:
 | 
						|
		return OSPC_FAIL_NORMAL_CALL_CLEARING;
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
int ast_osp_terminate(int handle, int cause, time_t start, time_t duration)
 | 
						|
{
 | 
						|
	unsigned int dummy = 0;
 | 
						|
	int res = -1;
 | 
						|
	enum OSPEFAILREASON reason;
 | 
						|
 | 
						|
	time_t endTime = 0;
 | 
						|
	time_t alertTime = 0;
 | 
						|
	time_t connectTime = 0;
 | 
						|
	unsigned isPddInfoPresent = 0;
 | 
						|
	unsigned pdd = 0;
 | 
						|
	unsigned releaseSource = 0;
 | 
						|
	unsigned char *confId = "";
 | 
						|
	
 | 
						|
	reason = cause2reason(cause);
 | 
						|
	if (OSPPTransactionRecordFailure(handle, reason))
 | 
						|
		ast_log(LOG_WARNING, "Failed to record call termination for handle %d\n", handle);
 | 
						|
	else if (OSPPTransactionReportUsage(handle, duration, start,
 | 
						|
			       endTime,alertTime,connectTime,isPddInfoPresent,pdd,releaseSource,confId,
 | 
						|
		       	       0, 0, 0, 0, &dummy, NULL))
 | 
						|
		ast_log(LOG_WARNING, "Failed to report duration for handle %d\n", handle);
 | 
						|
	else {
 | 
						|
		ast_log(LOG_DEBUG, "Completed recording handle %d\n", handle);
 | 
						|
		OSPPTransactionDelete(handle);
 | 
						|
		res = 0;
 | 
						|
	}
 | 
						|
	return res;
 | 
						|
}
 | 
						|
 | 
						|
static int config_load(void)
 | 
						|
{
 | 
						|
	struct ast_config *cfg;
 | 
						|
	char *cat;
 | 
						|
	struct osp_provider *osp, *prev = NULL, *next;
 | 
						|
	ast_mutex_lock(&osplock);
 | 
						|
	osp = providers;
 | 
						|
	while(osp) {
 | 
						|
		osp->dead = 1;
 | 
						|
		osp = osp->next;
 | 
						|
	}
 | 
						|
	ast_mutex_unlock(&osplock);
 | 
						|
	cfg = ast_config_load("osp.conf");
 | 
						|
	if (cfg) {
 | 
						|
		if (!initialized) {
 | 
						|
			cat = ast_variable_retrieve(cfg, "general", "accelerate");
 | 
						|
			if (cat && ast_true(cat))
 | 
						|
				if (OSPPInit(1)) {
 | 
						|
					ast_log(LOG_WARNING, "Failed to enable hardware accelleration, falling back to software mode\n");
 | 
						|
					OSPPInit(0);
 | 
						|
				} else
 | 
						|
					hardware = 1;
 | 
						|
			else
 | 
						|
				OSPPInit(0);
 | 
						|
			initialized = 1;
 | 
						|
		}
 | 
						|
		cat = ast_category_browse(cfg, NULL);
 | 
						|
		while(cat) {
 | 
						|
			if (strcasecmp(cat, "general"))
 | 
						|
				osp_build(cfg, cat);
 | 
						|
			cat = ast_category_browse(cfg, cat);
 | 
						|
		}
 | 
						|
		ast_config_destroy(cfg);
 | 
						|
	} else
 | 
						|
		ast_log(LOG_NOTICE, "No OSP configuration found.  OSP support disabled\n");
 | 
						|
	ast_mutex_lock(&osplock);
 | 
						|
	osp = providers;
 | 
						|
	while(osp) {
 | 
						|
		next = osp->next;
 | 
						|
		if (osp->dead) {
 | 
						|
			if (prev)
 | 
						|
				prev->next = next;
 | 
						|
			else
 | 
						|
				providers = next;
 | 
						|
			/* XXX Cleanup OSP structure first XXX */
 | 
						|
			free(osp);
 | 
						|
		} else 
 | 
						|
			prev = osp;
 | 
						|
		osp = next;
 | 
						|
	}
 | 
						|
	ast_mutex_unlock(&osplock);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static char show_osp_usage[] = 
 | 
						|
"Usage: show osp\n"
 | 
						|
"       Displays information on Open Settlement Protocol\n";
 | 
						|
 | 
						|
static struct ast_cli_entry cli_show_osp = 
 | 
						|
{ { "show", "osp", NULL }, show_osp, "Displays OSP information", show_osp_usage };
 | 
						|
 | 
						|
int reload(void)
 | 
						|
{
 | 
						|
	config_load();
 | 
						|
	ast_log(LOG_NOTICE, "XXX Should reload OSP config XXX\n");
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
int load_module(void)
 | 
						|
{
 | 
						|
	config_load();
 | 
						|
	ast_cli_register(&cli_show_osp);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
int unload_module(void)
 | 
						|
{
 | 
						|
	/* Can't unload this once we're loaded */
 | 
						|
	return -1;
 | 
						|
}
 | 
						|
 | 
						|
char *description(void)
 | 
						|
{
 | 
						|
	return "Open Settlement Protocol Support";
 | 
						|
}
 | 
						|
 | 
						|
int usecount(void)
 | 
						|
{
 | 
						|
	/* We should never be unloaded */
 | 
						|
	return 1;
 | 
						|
}
 | 
						|
 | 
						|
char *key()
 | 
						|
{
 | 
						|
	return ASTERISK_GPL_KEY;
 | 
						|
}
 |