mirror of
				https://github.com/asterisk/asterisk.git
				synced 2025-10-31 10:47:18 +00:00 
			
		
		
		
	git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@4013 65c4cc65-6c06-0410-ace0-fbb531ad65f3
		
			
				
	
	
		
			2098 lines
		
	
	
		
			56 KiB
		
	
	
	
		
			C
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			2098 lines
		
	
	
		
			56 KiB
		
	
	
	
		
			C
		
	
	
		
			Executable File
		
	
	
	
	
| /*
 | |
|  * chan_h323.c
 | |
|  *
 | |
|  * OpenH323 Channel Driver for ASTERISK PBX.
 | |
|  *			By Jeremy McNamara
 | |
|  *                      For The NuFone Network 
 | |
|  *
 | |
|  * chan_h323 has been derived from code created by
 | |
|  *               Michael Manousos and Mark Spencer
 | |
|  *
 | |
|  * This file is part of the chan_h323 driver for Asterisk
 | |
|  *
 | |
|  * chan_h323 is free software; you can redistribute it and/or modify
 | |
|  * it under the terms of the GNU General Public License as published by
 | |
|  * the Free Software Foundation; either version 2 of the License, or
 | |
|  * (at your option) any later version. 
 | |
|  *
 | |
|  * chan_h323 is distributed WITHOUT ANY WARRANTY; without even 
 | |
|  * the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR 
 | |
|  * PURPOSE. See the GNU General Public License for more details. 
 | |
|  *
 | |
|  * You should have received a copy of the GNU General Public License
 | |
|  * along with this program; if not, write to the Free Software
 | |
|  * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 
 | |
|  *
 | |
|  * Version Info: $Id$
 | |
|  */
 | |
| 
 | |
| #include <sys/socket.h>
 | |
| #include <sys/signal.h>
 | |
| #include <sys/param.h>
 | |
| #if defined(BSD)
 | |
| #ifndef IPTOS_MINCOST
 | |
| #define IPTOS_MINCOST 0x02
 | |
| #endif
 | |
| #endif
 | |
| #include <arpa/inet.h>
 | |
| #include <net/if.h>
 | |
| #include <netinet/in.h>
 | |
| #include <netinet/in_systm.h>
 | |
| #include <netinet/ip.h>
 | |
| #include <unistd.h>
 | |
| #include <stdlib.h>
 | |
| #include <netdb.h>
 | |
| #include <stdio.h>
 | |
| #include <string.h>
 | |
| #include <errno.h>
 | |
| #include <fcntl.h>
 | |
| #ifdef __cplusplus
 | |
| extern "C" {
 | |
| #endif   
 | |
| #include <asterisk/lock.h>
 | |
| #include <asterisk/logger.h>
 | |
| #include <asterisk/channel.h>
 | |
| #include <asterisk/channel_pvt.h>
 | |
| #include <asterisk/config.h>
 | |
| #include <asterisk/module.h>
 | |
| #include <asterisk/pbx.h>
 | |
| #include <asterisk/options.h>
 | |
| #include <asterisk/utils.h>
 | |
| #include <asterisk/lock.h>
 | |
| #include <asterisk/sched.h>
 | |
| #include <asterisk/io.h>
 | |
| #include <asterisk/rtp.h>
 | |
| #include <asterisk/acl.h>
 | |
| #include <asterisk/callerid.h>
 | |
| #include <asterisk/cli.h>
 | |
| #include <asterisk/dsp.h>
 | |
| #ifdef __cplusplus
 | |
| }
 | |
| #endif
 | |
| #include "h323/chan_h323.h"
 | |
| 
 | |
| send_digit_cb on_send_digit; 
 | |
| on_rtp_cb on_external_rtp_create; 
 | |
| start_rtp_cb on_start_rtp_channel; 
 | |
| setup_incoming_cb on_incoming_call;
 | |
| setup_outbound_cb on_outgoing_call; 
 | |
| chan_ringing_cb	on_chan_ringing;
 | |
| con_established_cb on_connection_established;
 | |
| clear_con_cb on_connection_cleared;
 | |
| answer_call_cb on_answer_call;
 | |
| 
 | |
| /* global debug flag */
 | |
| int h323debug;
 | |
| 
 | |
| /** Variables required by Asterisk */
 | |
| static char *type = "H323";
 | |
| static char *desc = "The NuFone Network's Open H.323 Channel Driver";
 | |
| static char *tdesc = "The NuFone Network's Open H.323 Channel Driver";
 | |
| static char *config = "h323.conf";
 | |
| static char default_context[AST_MAX_EXTENSION] = "default";
 | |
| 
 | |
| /** H.323 configuration values */
 | |
| static int h323_signalling_port = 1720;
 | |
| static char gatekeeper[100];
 | |
| static int gatekeeper_disable = 1;
 | |
| static int gatekeeper_discover = 0;
 | |
| static int usingGk = 0;
 | |
| static int gkroute = 0;
 | |
| static int noFastStart = 0;
 | |
| static int noH245Tunneling = 0;
 | |
| static int noSilenceSuppression = 0;
 | |
| /* Assume we can native bridge by default */
 | |
| static int bridging = 1;
 | |
| /* Find user by alias (h.323 id) is default, alternative is the incomming call's source IP address*/
 | |
| static int  userbyalias = 1;
 | |
| /* Just about everybody seems to support ulaw, so make it a nice default */
 | |
| static int capability = AST_FORMAT_ULAW;
 | |
| /* TOS flag */
 | |
| static int tos = 0;
 | |
| static int dtmfmode = H323_DTMF_RFC2833;
 | |
| static char secret[50];
 | |
| 
 | |
| /** Private structure of a OpenH323 channel */
 | |
| struct oh323_pvt {
 | |
| 	ast_mutex_t lock;					/* Channel private lock */
 | |
| 	call_options_t options;					/* Options to be used during call setup */
 | |
| 	int alreadygone;					/* Whether or not we've already been destroyed by our peer */
 | |
| 	int needdestroy;					/* if we need to be destroyed */
 | |
| 	call_details_t cd;					/* Call details */
 | |
| 	struct ast_channel *owner;				/* Who owns us */
 | |
| 	struct sockaddr_in sa;                  		/* Our peer */
 | |
|         struct sockaddr_in redirip; 			        /* Where our RTP should be going if not to us */
 | |
| 	int capability;						/* audio capability */
 | |
| 	int nonCodecCapability;					/* non-audio capability */
 | |
| 	int outgoing;						/* Outgoing or incoming call? */
 | |
| 	int nat;						/* Are we talking to a NAT EP?*/
 | |
| 	int bridge;						/* Determine of we should native bridge or not*/
 | |
| 	char exten[AST_MAX_EXTENSION];				/* Requested extension */
 | |
| 	char context[AST_MAX_EXTENSION];			/* Context where to start */
 | |
| 	char username[81];					/* H.323 alias using this channel */
 | |
| 	char accountcode[256];					/* Account code */
 | |
| 	int amaflags;						/* AMA Flags */
 | |
| 	char callerid[80];					/* Caller*ID if available */
 | |
| 	struct ast_rtp *rtp;					/* RTP Session */
 | |
| 	int dtmfmode;						/* What DTMF Mode is being used */
 | |
| 	struct ast_dsp *vad;					/* Used for in-band DTMF detection */
 | |
| 	struct oh323_pvt *next;					/* Next channel in list */
 | |
| } *iflist = NULL;
 | |
| 
 | |
| static struct ast_user_list {
 | |
| 	struct oh323_user *users;
 | |
| 	ast_mutex_t lock;
 | |
| } userl;
 | |
| 
 | |
| static struct ast_peer_list {
 | |
| 	struct oh323_peer *peers;
 | |
| 	ast_mutex_t lock;
 | |
| } peerl;
 | |
| 
 | |
| static struct ast_alias_list {
 | |
| 	struct oh323_alias *aliases;
 | |
| 	ast_mutex_t lock;
 | |
| } aliasl;
 | |
| 
 | |
| /** Asterisk RTP stuff */
 | |
| static struct sched_context *sched;
 | |
| static struct io_context *io;
 | |
| 
 | |
| /** Protect the interface list (oh323_pvt) */
 | |
| AST_MUTEX_DEFINE_STATIC(iflock);
 | |
| 
 | |
| /** Usage counter and associated lock */
 | |
| static int usecnt =0;
 | |
| AST_MUTEX_DEFINE_STATIC(usecnt_lock);
 | |
| 
 | |
| /* Protect the monitoring thread, so only one process can kill or start it, and not
 | |
|    when it's doing something critical. */
 | |
| AST_MUTEX_DEFINE_STATIC(monlock);
 | |
| 
 | |
| /* Protect the H.323 capabilities list, to avoid more than one channel to set the capabilities simultaneaously in the h323 stack. */
 | |
| AST_MUTEX_DEFINE_STATIC(caplock);
 | |
| 
 | |
| /* Protect the reload process */
 | |
| AST_MUTEX_DEFINE_STATIC(h323_reload_lock);
 | |
| static int h323_reloading = 0;
 | |
| 
 | |
| /* This is the thread for the monitor which checks for input on the channels
 | |
|    which are not currently in use.  */
 | |
| static pthread_t monitor_thread = AST_PTHREADT_NULL;
 | |
| 
 | |
| static int restart_monitor(void);
 | |
| static int h323_do_reload(void);
 | |
| 
 | |
| static void __oh323_destroy(struct oh323_pvt *p)
 | |
| {
 | |
| 	struct oh323_pvt *cur, *prev = NULL;
 | |
| 	
 | |
| 	if (p->rtp) {
 | |
| 		ast_rtp_destroy(p->rtp);
 | |
| 	}
 | |
| 	
 | |
| 	/* Unlink us from the owner if we have one */
 | |
| 	if (p->owner) {
 | |
| 		ast_mutex_lock(&p->owner->lock);
 | |
| 		ast_log(LOG_DEBUG, "Detaching from %s\n", p->owner->name);
 | |
| 		p->owner->pvt->pvt = NULL;
 | |
| 		ast_mutex_unlock(&p->owner->lock);
 | |
| 	}
 | |
| 	cur = iflist;
 | |
| 	while(cur) {
 | |
| 		if (cur == p) {
 | |
| 			if (prev)
 | |
| 				prev->next = cur->next;
 | |
| 			else
 | |
| 				iflist = cur->next;
 | |
| 			break;
 | |
| 		}
 | |
| 		prev = cur;
 | |
| 		cur = cur->next;
 | |
| 	}
 | |
| 	if (!cur) {
 | |
| 		ast_log(LOG_WARNING, "%p is not in list?!?! \n", cur);
 | |
| 	} else {
 | |
|                 ast_mutex_destroy(&p->lock);
 | |
| 		free(p);
 | |
|         }
 | |
| }
 | |
| 
 | |
| static void oh323_destroy(struct oh323_pvt *p)
 | |
| {
 | |
| 	ast_mutex_lock(&iflock);
 | |
| 	__oh323_destroy(p);
 | |
| 	ast_mutex_unlock(&iflock);
 | |
| }
 | |
| 
 | |
| static struct oh323_alias *build_alias(char *name, struct ast_variable *v)
 | |
| {
 | |
| 	struct oh323_alias *alias;
 | |
| 
 | |
| 	alias = (struct oh323_alias *)malloc(sizeof(struct oh323_alias));
 | |
| 
 | |
| 	if (alias) {
 | |
| 		memset(alias, 0, sizeof(struct oh323_alias));
 | |
| 		strncpy(alias->name, name, sizeof(alias->name) - 1);
 | |
| 		while (v) {
 | |
| 			if (!strcasecmp(v->name, "e164")) {
 | |
| 				strncpy(alias->e164,  v->value, sizeof(alias->e164) - 1);
 | |
| 			} else if (!strcasecmp(v->name, "prefix")) {
 | |
| 				strncpy(alias->prefix,  v->value, sizeof(alias->prefix) - 1);
 | |
| 			} else if (!strcasecmp(v->name, "context")) {
 | |
| 				strncpy(alias->context,  v->value, sizeof(alias->context) - 1);
 | |
| 			} else if (!strcasecmp(v->name, "secret")) {
 | |
| 				strncpy(alias->secret,  v->value, sizeof(alias->secret) - 1);
 | |
| 			} else {
 | |
| 				if (strcasecmp(v->value, "h323")) { 	
 | |
| 					ast_log(LOG_WARNING, "Keyword %s does not make sense in type=h323\n", v->value);
 | |
| 				}
 | |
| 			}
 | |
| 			v = v->next;
 | |
| 		}
 | |
| 	}
 | |
| 	return alias;
 | |
| }
 | |
| 
 | |
| static struct oh323_user *build_user(char *name, struct ast_variable *v)
 | |
| {
 | |
| 	struct oh323_user *user;
 | |
| 	int format;
 | |
| 	
 | |
| 	user = (struct oh323_user *)malloc(sizeof(struct oh323_user));
 | |
| 	if (user) {
 | |
| 		memset(user, 0, sizeof(struct oh323_user));
 | |
| 		strncpy(user->name, name, sizeof(user->name) - 1);
 | |
| 		
 | |
| 		/* set the usage flag to a sane starting value*/
 | |
| 		user->inUse = 0;
 | |
| 		/* set the native brigding default */
 | |
| 		user->bridge = bridging;
 | |
| 		strncpy(user->context, default_context, sizeof(user->context) - 1);
 | |
| 
 | |
| 		while(v) {
 | |
| 			if (!strcasecmp(v->name, "context")) {
 | |
| 				strncpy(user->context, v->value, sizeof(user->context) - 1);
 | |
| 			} else if (!strcasecmp(v->name, "bridge")) {
 | |
| 				user->bridge = ast_true(v->value);
 | |
|                       } else if (!strcasecmp(v->name, "nat")) {
 | |
|                               user->nat = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "noFastStart")) {
 | |
| 				user->noFastStart = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "noH245Tunneling")) {
 | |
| 				user->noH245Tunneling = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "noSilenceSuppression")) {
 | |
| 				user->noSilenceSuppression = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "secret")) {
 | |
| 				strncpy(user->secret, v->value, sizeof(user->secret) - 1);
 | |
| 			} else if (!strcasecmp(v->name, "callerid")) {
 | |
| 				strncpy(user->callerid, v->value, sizeof(user->callerid) - 1);
 | |
| 			} else if (!strcasecmp(v->name, "accountcode")) {
 | |
| 				strncpy(user->accountcode, v->value, sizeof(user->accountcode) - 1);
 | |
| 			} else if (!strcasecmp(v->name, "incominglimit")) {
 | |
| 				user->incominglimit = atoi(v->value);
 | |
| 				if (user->incominglimit < 0)
 | |
| 					user->incominglimit = 0;
 | |
| 			} else if (!strcasecmp(v->name, "host")) {
 | |
| 				if (!strcasecmp(v->value, "dynamic")) {
 | |
| 					ast_log(LOG_ERROR, "A dynamic host on a type=user does not make any sense\n");
 | |
| 					free(user);
 | |
| 					return NULL;
 | |
| 				} else if (ast_get_ip(&user->addr, v->value)) {
 | |
| 					free(user);
 | |
| 					return NULL;
 | |
| 				} 
 | |
| 				/* Let us know we need to use ip authentication */
 | |
| 				user->host = 1;
 | |
| 			} else if (!strcasecmp(v->name, "amaflags")) {
 | |
| 				format = ast_cdr_amaflags2int(v->value);
 | |
| 				if (format < 0) {
 | |
| 					ast_log(LOG_WARNING, "Invalid AMA Flags: %s at line %d\n", v->value, v->lineno);
 | |
| 				} else {
 | |
| 					user->amaflags = format;
 | |
| 				}
 | |
| 			}
 | |
| 			v = v->next;
 | |
| 		}
 | |
| 	}
 | |
| 	return user;
 | |
| }
 | |
| 
 | |
| static struct oh323_peer *build_peer(char *name, struct ast_variable *v)
 | |
| {
 | |
| 	struct oh323_peer *peer;
 | |
| 	struct oh323_peer *prev;
 | |
| 	struct ast_ha *oldha = NULL;
 | |
| 	int found=0;
 | |
| 	int format;	
 | |
| 
 | |
| 	prev = NULL;
 | |
| 	ast_mutex_lock(&peerl.lock);
 | |
| 	peer = peerl.peers;
 | |
| 
 | |
| 	while(peer) {
 | |
| 		if (!strcasecmp(peer->name, name)) {	
 | |
| 			break;
 | |
| 		}
 | |
| 		prev = peer;
 | |
| 		peer = peer->next;
 | |
| 	}
 | |
| 
 | |
| 	if (peer) {
 | |
| 		found++;
 | |
| 		/* Already in the list, remove it and it will be added back (or FREE'd) */
 | |
| 		if (prev) {
 | |
| 			prev->next = peer->next;
 | |
| 		} else {
 | |
| 			peerl.peers = peer->next;
 | |
| 		}
 | |
| 		ast_mutex_unlock(&peerl.lock);
 | |
|  	} else {
 | |
| 		ast_mutex_unlock(&peerl.lock);
 | |
| 		peer = (struct oh323_peer*)malloc(sizeof(struct oh323_peer));
 | |
| 		memset(peer, 0, sizeof(struct oh323_peer));
 | |
| 	}
 | |
| 	if (peer) {
 | |
| 		if (!found) {
 | |
| 			strncpy(peer->name, name, sizeof(peer->name) - 1);
 | |
| 			peer->addr.sin_port = htons(h323_signalling_port);
 | |
| 			peer->addr.sin_family = AF_INET;
 | |
| 		}
 | |
| 		oldha = peer->ha;
 | |
| 		peer->ha = NULL;
 | |
| 		peer->addr.sin_family = AF_INET;
 | |
| 		peer->capability = capability;
 | |
| 
 | |
| 		while(v) {
 | |
| 			if (!strcasecmp(v->name, "bridge")) {
 | |
| 				peer->bridge = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "nat")) {
 | |
| 				peer->nat = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "noFastStart")) {
 | |
| 				peer->noFastStart = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "noH245Tunneling")) {
 | |
| 				peer->noH245Tunneling = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "noSilenceSuppression")) {
 | |
| 				peer->noSilenceSuppression = ast_true(v->value);
 | |
| 			} else if (!strcasecmp(v->name, "dtmfmode")) {
 | |
| 				if (!strcasecmp(v->value, "inband")) {
 | |
| 					peer->dtmfmode = H323_DTMF_INBAND;
 | |
| 				} else if (!strcasecmp(v->value, "rfc2833")) {
 | |
| 					peer->dtmfmode = H323_DTMF_RFC2833;
 | |
| 				} else {
 | |
| 					ast_log(LOG_WARNING, "Unknown DTMF Mode %s, using RFC2833\n", v->value);
 | |
| 					peer->dtmfmode = H323_DTMF_RFC2833;
 | |
| 				}	
 | |
| 			} else if (!strcasecmp(v->name, "allow")) {
 | |
| 				format = ast_getformatbyname(v->value);
 | |
| 				if (format < 1) {
 | |
| 					ast_log(LOG_WARNING, "Cannot allow unknown format '%s'\n", v->value);
 | |
| 				} else {
 | |
| 					peer->capability |= format;
 | |
| 				}
 | |
| 			} else if (!strcasecmp(v->name, "disallow")) {
 | |
| 				format = ast_getformatbyname(v->value);
 | |
| 				if (format < 1) {
 | |
| 					ast_log(LOG_WARNING, "Cannot disallow unknown format '%s'\n", v->value);
 | |
| 				} else {
 | |
| 					peer->capability |= ~format;
 | |
| 				}
 | |
| 			} else if (!strcasecmp(v->name, "outgoinglimit")) {
 | |
| 				peer->outgoinglimit = atoi(v->value);
 | |
| 				if (peer->outgoinglimit > 0) {
 | |
| 					peer->outgoinglimit = 0;
 | |
| 				}
 | |
| 			} else if (!strcasecmp(v->name, "host")) {
 | |
| 				if (!strcasecmp(v->value, "dynamic")) {
 | |
| 					ast_log(LOG_ERROR, "Dynamic host configuration not implemented.\n");
 | |
| 					free(peer);
 | |
| 					return NULL;
 | |
| 				}
 | |
| 				if (ast_get_ip(&peer->addr, v->value)) {
 | |
| 						ast_log(LOG_ERROR, "Could not determine IP for %s\n", v->value);
 | |
| 						free(peer);
 | |
| 						return NULL;
 | |
| 				}
 | |
| 			} else if (!strcasecmp(v->name, "port")) {
 | |
| 				peer->addr.sin_port = htons(atoi(v->value));
 | |
| 			}
 | |
| 			v=v->next;
 | |
| 		}
 | |
| 	}
 | |
| 	return peer;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Send (play) the specified digit to the channel.
 | |
|  * 
 | |
|  */
 | |
| static int oh323_digit(struct ast_channel *c, char digit)
 | |
| {
 | |
| 	struct oh323_pvt *p = (struct oh323_pvt *) c->pvt->pvt;
 | |
| 	if (p && p->rtp && (p->dtmfmode & H323_DTMF_RFC2833)) {
 | |
| 		ast_rtp_senddigit(p->rtp, digit);
 | |
| 	}
 | |
| 	/* If in-band DTMF is desired, send that */
 | |
| 	if (p->dtmfmode & H323_DTMF_INBAND)
 | |
| 		h323_send_tone(p->cd.call_token, digit);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Make a call over the specified channel to the specified 
 | |
|  * destination.
 | |
|  * Returns -1 on error, 0 on success.
 | |
|  */
 | |
| static int oh323_call(struct ast_channel *c, char *dest, int timeout)
 | |
| {
 | |
| 	int res = 0;
 | |
| 	struct oh323_pvt *pvt = (struct oh323_pvt *)c->pvt->pvt;
 | |
| 	char called_addr[INET_ADDRSTRLEN];
 | |
| 
 | |
| 	if ((c->_state != AST_STATE_DOWN) && (c->_state != AST_STATE_RESERVED)) {
 | |
| 		ast_log(LOG_WARNING, "Line is already in use (%s)\n", c->name);
 | |
| 		return -1;
 | |
| 	}
 | |
| 	/* Clear and then set the address to call */
 | |
| 	memset(called_addr, 0, sizeof(called_addr));
 | |
| 	if (usingGk) {
 | |
| 		memcpy(called_addr, dest, strlen(called_addr));
 | |
| 		pvt->options.noFastStart = noFastStart;
 | |
| 		pvt->options.noH245Tunneling = noH245Tunneling;
 | |
| 		pvt->options.noSilenceSuppression = noSilenceSuppression;
 | |
| 		pvt->options.port = h323_signalling_port;
 | |
| 	} else {
 | |
| 		ast_inet_ntoa(called_addr, sizeof(called_addr), pvt->sa.sin_addr);
 | |
| 		pvt->options.port = htons(pvt->sa.sin_port);
 | |
| 	}
 | |
| 	/* indicate that this is an outgoing call */
 | |
| 	pvt->outgoing = 1;
 | |
| 	ast_log(LOG_DEBUG, "Outgoing call to %s:%d\n", called_addr, pvt->options.port);
 | |
| 	res = h323_make_call(called_addr, &(pvt->cd), pvt->options);
 | |
| 	if (res) {
 | |
| 		ast_log(LOG_NOTICE, "h323_make_call failed(%s)\n", c->name);
 | |
| 		return -1;
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int oh323_answer(struct ast_channel *c)
 | |
| {
 | |
| 	int res;
 | |
| 	struct oh323_pvt *pvt = (struct oh323_pvt *) c->pvt->pvt;
 | |
| 
 | |
| 	res = h323_answering_call(pvt->cd.call_token, 0);
 | |
| 	
 | |
| 	if (c->_state != AST_STATE_UP)
 | |
| 		ast_setstate(c, AST_STATE_UP);
 | |
| 
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int oh323_hangup(struct ast_channel *c)
 | |
| {
 | |
| 	struct oh323_pvt *pvt = (struct oh323_pvt *) c->pvt->pvt;
 | |
| 	int needcancel = 0;
 | |
| 	if (h323debug)
 | |
| 		ast_log(LOG_DEBUG, "oh323_hangup(%s)\n", c->name);
 | |
| 	if (!c->pvt->pvt) {
 | |
| 		ast_log(LOG_DEBUG, "Asked to hangup channel not connected\n");
 | |
| 		return 0;
 | |
| 	}
 | |
| 	ast_mutex_lock(&pvt->lock);
 | |
| 	/* Determine how to disconnect */
 | |
| 	if (pvt->owner != c) {
 | |
| 		ast_log(LOG_WARNING, "Huh?  We aren't the owner?\n");
 | |
| 		ast_mutex_unlock(&pvt->lock);
 | |
| 		return 0;
 | |
| 	}
 | |
| 	if (!c || (c->_state != AST_STATE_UP))
 | |
| 		needcancel = 1;
 | |
| 	/* Disconnect */
 | |
| 	pvt = (struct oh323_pvt *) c->pvt->pvt;
 | |
| 	
 | |
| 	/* Free dsp used for in-band DTMF detection */
 | |
| 	if (pvt->vad) {
 | |
| 		ast_dsp_free(pvt->vad);
 | |
| 	}
 | |
| 
 | |
| 	pvt->owner = NULL;
 | |
| 	c->pvt->pvt = NULL;
 | |
| 
 | |
| 	/* Start the process if it's not already started */
 | |
| 	if (!pvt->alreadygone) {
 | |
| 		if (h323_clear_call((pvt->cd).call_token)) { 
 | |
| 			ast_log(LOG_DEBUG, "ClearCall failed.\n");
 | |
| 		}
 | |
| 		pvt->needdestroy = 1;
 | |
| 	} 
 | |
| 
 | |
| 	/* Update usage counter */
 | |
| 	ast_mutex_lock(&usecnt_lock);
 | |
| 	usecnt--;
 | |
| 	if (usecnt < 0)
 | |
| 		ast_log(LOG_WARNING, "Usecnt < 0\n");
 | |
| 	ast_mutex_unlock(&usecnt_lock);
 | |
| 	ast_update_use_count();
 | |
| 
 | |
| 	ast_mutex_unlock(&pvt->lock);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static struct ast_frame *oh323_rtp_read(struct oh323_pvt *pvt)
 | |
| {
 | |
| 	/* Retrieve audio/etc from channel.  Assumes pvt->lock is already held. */
 | |
| 	struct ast_frame *f;
 | |
| 	static struct ast_frame null_frame = { AST_FRAME_NULL, };
 | |
| 
 | |
|       /* Only apply it for the first packet, we just need the correct ip/port */
 | |
|       if(pvt->nat)
 | |
|       {
 | |
|               ast_rtp_setnat(pvt->rtp,pvt->nat);
 | |
|               pvt->nat = 0;
 | |
|       }
 | |
| 
 | |
| 	f = ast_rtp_read(pvt->rtp);
 | |
| 	/* Don't send RFC2833 if we're not supposed to */
 | |
| 	if (f && (f->frametype == AST_FRAME_DTMF) && !(pvt->dtmfmode & H323_DTMF_RFC2833))
 | |
| 		return &null_frame;
 | |
| 	if (pvt->owner) {
 | |
| 		/* We already hold the channel lock */
 | |
| 		if (f->frametype == AST_FRAME_VOICE) {
 | |
| 			if (f->subclass != pvt->owner->nativeformats) {
 | |
| 				ast_log(LOG_DEBUG, "Oooh, format changed to %d\n", f->subclass);
 | |
| 				pvt->owner->nativeformats = f->subclass;
 | |
| 				ast_set_read_format(pvt->owner, pvt->owner->readformat);
 | |
| 				ast_set_write_format(pvt->owner, pvt->owner->writeformat);
 | |
| 			}
 | |
| 		
 | |
| 			/* Do in-band DTMF detection */
 | |
| 			if (pvt->dtmfmode & H323_DTMF_INBAND) {
 | |
|                    		f = ast_dsp_process(pvt->owner,pvt->vad,f);
 | |
| 				if (f->frametype == AST_FRAME_DTMF) {
 | |
| 					ast_log(LOG_DEBUG, "Got in-band digit %c.\n", f->subclass);
 | |
|             			}
 | |
| 			}
 | |
| 			
 | |
| 		}
 | |
| 	}
 | |
| 	return f;
 | |
| }
 | |
| 
 | |
| 
 | |
| static struct ast_frame  *oh323_read(struct ast_channel *c)
 | |
| {
 | |
| 	struct ast_frame *fr;
 | |
| 	struct oh323_pvt *pvt = (struct oh323_pvt *) c->pvt->pvt;
 | |
| 	ast_mutex_lock(&pvt->lock);
 | |
| 	fr = oh323_rtp_read(pvt);
 | |
| 	ast_mutex_unlock(&pvt->lock);
 | |
| 	return fr;
 | |
| }
 | |
| 
 | |
| static int oh323_write(struct ast_channel *c, struct ast_frame *frame)
 | |
| {
 | |
| 	struct oh323_pvt *pvt = (struct oh323_pvt *) c->pvt->pvt;
 | |
| 	int res = 0;
 | |
| 	if (frame->frametype != AST_FRAME_VOICE) {
 | |
| 		if (frame->frametype == AST_FRAME_IMAGE)
 | |
| 			return 0;
 | |
| 		else {
 | |
| 			ast_log(LOG_WARNING, "Can't send %d type frames with H323 write\n", frame->frametype);
 | |
| 			return 0;
 | |
| 		}
 | |
| 	} else {
 | |
| 		if (!(frame->subclass & c->nativeformats)) {
 | |
| 			ast_log(LOG_WARNING, "Asked to transmit frame type %d, while native formats is %d (read/write = %d/%d)\n",
 | |
| 				frame->subclass, c->nativeformats, c->readformat, c->writeformat);
 | |
| 			return -1;
 | |
| 		}
 | |
| 	}
 | |
| 	if (pvt) {
 | |
| 		ast_mutex_lock(&pvt->lock);
 | |
| 		if (pvt->rtp) {
 | |
| 			res =  ast_rtp_write(pvt->rtp, frame);
 | |
| 		}
 | |
| 		ast_mutex_unlock(&pvt->lock);
 | |
| 	}
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| static int oh323_indicate(struct ast_channel *c, int condition)
 | |
| {
 | |
| 
 | |
| 	struct oh323_pvt *pvt = (struct oh323_pvt *) c->pvt->pvt;
 | |
| 	
 | |
| 	switch(condition) {
 | |
| 	case AST_CONTROL_RINGING:
 | |
| 		if (c->_state == AST_STATE_RING || c->_state == AST_STATE_RINGING) {
 | |
| 			h323_send_alerting(pvt->cd.call_token);
 | |
|  			break;
 | |
|  		}		
 | |
| 		return -1;
 | |
| 	case AST_CONTROL_PROGRESS:
 | |
| 		if (c->_state != AST_STATE_UP) {
 | |
| 			h323_send_progress(pvt->cd.call_token);
 | |
| 			break;
 | |
| 		}
 | |
| 		return -1;
 | |
| 
 | |
| 	case AST_CONTROL_BUSY:
 | |
| 		if (c->_state != AST_STATE_UP) {
 | |
| 			h323_answering_call(pvt->cd.call_token, 1);
 | |
|  			pvt->alreadygone = 1;
 | |
| 			ast_softhangup_nolock(c, AST_SOFTHANGUP_DEV);			
 | |
| 			break;
 | |
| 		}
 | |
| 		return -1;
 | |
| 	case AST_CONTROL_CONGESTION:
 | |
| 		if (c->_state != AST_STATE_UP) {
 | |
| 			h323_answering_call(pvt->cd.call_token, 1);
 | |
| 			pvt->alreadygone = 1;
 | |
| 			ast_softhangup_nolock(c, AST_SOFTHANGUP_DEV);
 | |
| 			break;
 | |
| 		}
 | |
| 		return -1;
 | |
| 	case AST_CONTROL_PROCEEDING:
 | |
| 	case -1:
 | |
| 		return -1;
 | |
| 	default:
 | |
| 		ast_log(LOG_WARNING, "Don't know how to indicate condition %d\n", condition);
 | |
| 		return -1;
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int oh323_fixup(struct ast_channel *oldchan, struct ast_channel *newchan)
 | |
| {
 | |
| 	struct oh323_pvt *pvt = (struct oh323_pvt *) newchan->pvt->pvt;
 | |
| 
 | |
| 	ast_mutex_lock(&pvt->lock);
 | |
| 	if (pvt->owner != oldchan) {
 | |
| 		ast_log(LOG_WARNING, "old channel wasn't %p but was %p\n", oldchan, pvt->owner);
 | |
| 		return -1;
 | |
| 	}
 | |
| 	pvt->owner = newchan;
 | |
| 	ast_mutex_unlock(&pvt->lock);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static struct ast_channel *oh323_new(struct oh323_pvt *pvt, int state, const char *host)
 | |
| {
 | |
| 	struct ast_channel *ch;
 | |
| 	int fmt;
 | |
| 	ch = ast_channel_alloc(1);
 | |
| 	
 | |
| 	if (ch) {
 | |
| 		
 | |
| 		snprintf(ch->name, sizeof(ch->name), "H323/%s", host);
 | |
| 		ch->nativeformats = pvt->capability;
 | |
| 		if (!ch->nativeformats)
 | |
| 			ch->nativeformats = capability;
 | |
| 		fmt = ast_best_codec(ch->nativeformats);
 | |
| 		ch->type = type;
 | |
| 		ch->fds[0] = ast_rtp_fd(pvt->rtp);
 | |
| 		
 | |
| 		if (state == AST_STATE_RING)
 | |
| 			ch->rings = 1;
 | |
| 		
 | |
| 		ch->writeformat = fmt;
 | |
| 		ch->pvt->rawwriteformat = fmt;
 | |
| 		ch->readformat = fmt;
 | |
| 		ch->pvt->rawreadformat = fmt;
 | |
| 		
 | |
| 		/* Allocate dsp for in-band DTMF support */
 | |
| 		if (pvt->dtmfmode & H323_DTMF_INBAND) {
 | |
| 			pvt->vad = ast_dsp_new();
 | |
| 			ast_dsp_set_features(pvt->vad, DSP_FEATURE_DTMF_DETECT);
 | |
|         	}
 | |
| 
 | |
| 		/* Register the OpenH323 channel's functions. */
 | |
| 		ch->pvt->pvt = pvt;
 | |
| 		ch->pvt->send_digit = oh323_digit;
 | |
| 		ch->pvt->call = oh323_call;
 | |
| 		ch->pvt->hangup = oh323_hangup;
 | |
| 		ch->pvt->answer = oh323_answer;
 | |
| 		ch->pvt->read = oh323_read;
 | |
| 		ch->pvt->write = oh323_write;
 | |
| 		ch->pvt->indicate = oh323_indicate;
 | |
| 		ch->pvt->fixup = oh323_fixup;
 | |
| 	     /*	ch->pvt->bridge = ast_rtp_bridge; */
 | |
| 
 | |
| 		/*  Set the owner of this channel */
 | |
| 		pvt->owner = ch;
 | |
| 		
 | |
| 		ast_mutex_lock(&usecnt_lock);
 | |
| 		usecnt++;
 | |
| 		ast_mutex_unlock(&usecnt_lock);
 | |
| 		ast_update_use_count();
 | |
| 		strncpy(ch->context, pvt->context, sizeof(ch->context) - 1);
 | |
| 		strncpy(ch->exten, pvt->exten, sizeof(ch->exten) - 1);		
 | |
| 		ch->priority = 1;
 | |
| 		if (!ast_strlen_zero(pvt->accountcode))
 | |
| 			strncpy(ch->accountcode, pvt->accountcode, sizeof(ch->accountcode) - 1);
 | |
| 		if (pvt->amaflags)
 | |
| 			ch->amaflags = pvt->amaflags;
 | |
| 		ast_setstate(ch, state);
 | |
| 		if (state != AST_STATE_DOWN) {
 | |
| 			if (ast_pbx_start(ch)) {
 | |
| 				ast_log(LOG_WARNING, "Unable to start PBX on %s\n", ch->name);
 | |
| 				ast_hangup(ch);
 | |
| 				ch = NULL;
 | |
| 			}
 | |
| 		}
 | |
| 	} else
 | |
| 		ast_log(LOG_WARNING, "Unable to allocate channel structure\n");
 | |
| 	return ch;
 | |
| }
 | |
| 
 | |
| static struct oh323_pvt *oh323_alloc(int callid)
 | |
| {
 | |
| 	struct oh323_pvt *pvt;
 | |
| 
 | |
| 	pvt = (struct oh323_pvt *) malloc(sizeof(struct oh323_pvt));
 | |
| 	if (!pvt) {
 | |
| 		ast_log(LOG_ERROR, "Couldn't allocate private structure. This is bad\n");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	/* Keep track of stuff */
 | |
| 	memset(pvt, 0, sizeof(struct oh323_pvt));
 | |
| 	pvt->rtp = ast_rtp_new(sched, io, 1, 0);
 | |
| 	if (!pvt->rtp) {
 | |
| 		ast_log(LOG_WARNING, "Unable to create RTP session: %s\n", strerror(errno));
 | |
| 		free(pvt);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	ast_rtp_settos(pvt->rtp, tos);
 | |
| 	ast_mutex_init(&pvt->lock);
 | |
| 	/* Ensure the call token is allocated */
 | |
| 	if ((pvt->cd).call_token == NULL) {
 | |
| 		(pvt->cd).call_token = (char *)malloc(128);
 | |
| 	}
 | |
| 	memset((char *)(pvt->cd).call_token, 0, 128);
 | |
| 	if (!pvt->cd.call_token) {
 | |
| 		ast_log(LOG_ERROR, "Not enough memory to alocate call token\n");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	pvt->cd.call_reference = callid;
 | |
| 	pvt->bridge = bridging;	
 | |
| 	pvt->dtmfmode = dtmfmode;
 | |
| 	if (pvt->dtmfmode & H323_DTMF_RFC2833) {
 | |
| 		pvt->nonCodecCapability |= AST_RTP_DTMF;
 | |
| 	}
 | |
| 	strncpy(pvt->context, default_context, sizeof(pvt->context) - 1);
 | |
| 	/* Add to interface list */
 | |
| 	ast_mutex_lock(&iflock);
 | |
| 	pvt->next = iflist;
 | |
| 	iflist = pvt;
 | |
| 	ast_mutex_unlock(&iflock);
 | |
| 	return pvt;
 | |
| }
 | |
| 
 | |
| static struct oh323_pvt *find_call(int call_reference, const char *token)
 | |
| {  
 | |
|         struct oh323_pvt *pvt;
 | |
| 
 | |
| 	ast_mutex_lock(&iflock);
 | |
|         pvt = iflist; 
 | |
|         while(pvt) {
 | |
|                 if ((signed int)pvt->cd.call_reference == call_reference) {
 | |
|                         /* Found the call */             
 | |
|                         if ((token != NULL) && (strcmp(pvt->cd.call_token, token) == 0)) {
 | |
|         			ast_mutex_unlock(&iflock);
 | |
| 	        		return pvt;
 | |
|                         } else if(token == NULL) {
 | |
|                                 ast_log(LOG_DEBUG, "token is NULL, skipping comparition\n");
 | |
|                                 ast_mutex_unlock(&iflock);
 | |
|                                 return pvt;
 | |
|                         }
 | |
|                 }
 | |
|                 pvt = pvt->next; 
 | |
|         }
 | |
|         ast_mutex_unlock(&iflock);
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| struct oh323_user *find_user(const call_details_t cd)
 | |
| {
 | |
| 	struct oh323_user *u;
 | |
| 	char iabuf[INET_ADDRSTRLEN];
 | |
| 	u = userl.users;
 | |
| 	if(userbyalias == 1){
 | |
| 		while(u) {
 | |
| 			if (!strcasecmp(u->name, cd.call_source_aliases)) {
 | |
| 				break;
 | |
| 			}
 | |
| 			u = u->next;
 | |
| 		}
 | |
| 
 | |
| 	} else {
 | |
| 		while(u) {
 | |
| 			if (!strcasecmp(cd.sourceIp, ast_inet_ntoa(iabuf, sizeof(iabuf), u->addr.sin_addr))) {
 | |
| 				break;
 | |
| 			}
 | |
| 			u = u->next;
 | |
| 		}
 | |
| 
 | |
| 	
 | |
| 	}
 | |
| 	return u;
 | |
| 
 | |
| }
 | |
| 
 | |
| struct oh323_peer *find_peer(char *peer, struct sockaddr_in *sin)
 | |
| {
 | |
| 	struct oh323_peer *p = NULL;
 | |
|        	static char iabuf[INET_ADDRSTRLEN];
 | |
| 
 | |
| 	p = peerl.peers;
 | |
| 	if (peer) {
 | |
| 		while(p) {
 | |
| 			if (!strcasecmp(p->name, peer)) {
 | |
| 				ast_log(LOG_DEBUG, "Found peer %s by name\n", peer);
 | |
| 				break;
 | |
| 			}
 | |
| 			p = p->next;
 | |
| 		}
 | |
| 	} else {
 | |
| 		/* find by sin */
 | |
| 		if (sin) {
 | |
| 			while (p) {
 | |
| 				if ((!inaddrcmp(&p->addr, sin)) || 
 | |
| 					(p->addr.sin_addr.s_addr == sin->sin_addr.s_addr)) {
 | |
| 					ast_log(LOG_DEBUG, "Found peer %s/%s by addr\n", peer, ast_inet_ntoa(iabuf, sizeof(iabuf), p->addr.sin_addr));
 | |
| 					break;
 | |
| 				}
 | |
| 				p = p->next;
 | |
| 			}
 | |
| 		}	
 | |
| 	}
 | |
| 	if (!p) {
 | |
| 		ast_log(LOG_DEBUG, "Could not find peer %s by name or address\n", peer);
 | |
| 	}
 | |
| 	return p;
 | |
| }
 | |
| 
 | |
| static int create_addr(struct oh323_pvt *pvt, char *opeer)
 | |
| {
 | |
| 	struct hostent *hp;
 | |
| 	struct ast_hostent ahp;
 | |
| 	struct oh323_peer *p;
 | |
| 	int portno;
 | |
| 	int found = 0;
 | |
| 	char *port;
 | |
| 	char *hostn;
 | |
| 	char peer[256] = "";
 | |
| 
 | |
| 	strncpy(peer, opeer, sizeof(peer) - 1);
 | |
| 	port = strchr(peer, ':');
 | |
| 	if (port) {
 | |
| 		*port = '\0';
 | |
| 		port++;
 | |
| 	}
 | |
| 	pvt->sa.sin_family = AF_INET;
 | |
| 	ast_mutex_lock(&peerl.lock);
 | |
| 	p = find_peer(peer, NULL);
 | |
| 	if (p) {
 | |
| 		found++;
 | |
| 		pvt->capability = p->capability;
 | |
| 		pvt->nat = p->nat;
 | |
| 		if (pvt->rtp) {
 | |
| 			ast_log(LOG_DEBUG, "Setting NAT on RTP to %d\n", pvt->nat);
 | |
| 			ast_rtp_setnat(pvt->rtp, pvt->nat);
 | |
| 		}
 | |
| 		pvt->options.noFastStart = p->noFastStart;
 | |
| 		pvt->options.noH245Tunneling = p->noH245Tunneling;
 | |
| 		pvt->options.noSilenceSuppression = p->noSilenceSuppression;
 | |
| 		if (pvt->dtmfmode) {
 | |
| 			pvt->dtmfmode = p->dtmfmode;
 | |
| 			if (pvt->dtmfmode & H323_DTMF_RFC2833) {
 | |
| 				pvt->nonCodecCapability |= AST_RTP_DTMF;
 | |
| 			} else {
 | |
| 				pvt->nonCodecCapability &= ~AST_RTP_DTMF;
 | |
| 			}
 | |
| 		}
 | |
| 		if (p->addr.sin_addr.s_addr) {
 | |
| 			pvt->sa.sin_addr = p->addr.sin_addr;	
 | |
| 			pvt->sa.sin_port = p->addr.sin_port;	
 | |
| 		} 
 | |
| 	}
 | |
| 	ast_mutex_unlock(&peerl.lock);
 | |
| 	if (!p && !found) {
 | |
| 		hostn = peer;
 | |
| 		if (port) {
 | |
| 			portno = atoi(port);
 | |
| 		} else {
 | |
| 			portno = h323_signalling_port;
 | |
| 		}		
 | |
| 		hp = ast_gethostbyname(hostn, &ahp);
 | |
| 		if (hp) {
 | |
| 			memcpy(&pvt->sa.sin_addr, hp->h_addr, sizeof(pvt->sa.sin_addr));
 | |
| 			pvt->sa.sin_port = htons(portno);
 | |
| 			return 0;	
 | |
| 		} else {
 | |
| 			ast_log(LOG_WARNING, "No such host: %s\n", peer);
 | |
| 			return -1;
 | |
| 		}
 | |
| 	} else if (!p) {
 | |
| 		return -1;
 | |
| 	} else {	
 | |
| 		return 0;
 | |
| 	}
 | |
| }
 | |
| static struct ast_channel *oh323_request(const char *type, int format, void *data)
 | |
| {
 | |
| 	int oldformat;
 | |
| 	struct oh323_pvt *pvt;
 | |
| 	struct ast_channel *tmpc = NULL;
 | |
| 	char *dest = (char *)data;
 | |
| 	char *ext, *host;
 | |
| 	char *h323id = NULL;
 | |
| 	char tmp[256];
 | |
| 	
 | |
| 	ast_log(LOG_DEBUG, "type=%s, format=%d, data=%s.\n", type, format, (char *)data);
 | |
| 
 | |
| 	pvt = oh323_alloc(0);
 | |
| 	if (!pvt) {
 | |
| 		ast_log(LOG_WARNING, "Unable to build pvt data for '%s'\n", (char *)data);
 | |
| 		return NULL;
 | |
| 	}	
 | |
| 
 | |
| 	oldformat = format;
 | |
| 	format &= ((AST_FORMAT_MAX_AUDIO << 1) - 1);
 | |
| 	if (!format) {
 | |
| 		ast_log(LOG_NOTICE, "Asked to get a channel of unsupported format '%d'\n", format);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	/* Assign default capabilities */
 | |
| 	pvt->capability = capability;
 | |
| 	pvt->dtmfmode = H323_DTMF_RFC2833;
 | |
| 
 | |
| 	strncpy(tmp, dest, sizeof(tmp) - 1);	
 | |
| 	host = strchr(tmp, '@');
 | |
| 	if (host) {
 | |
| 		*host = '\0';
 | |
| 		host++;
 | |
| 		ext = tmp;
 | |
| 	} else {
 | |
| 		host = tmp;
 | |
| 		ext = NULL;
 | |
| 	}
 | |
| 	strtok_r(host, "/", &(h323id));		
 | |
| 	if (h323id && !ast_strlen_zero(h323id)) {
 | |
| 		h323_set_id(h323id);
 | |
| 	}
 | |
| 	if (ext) {
 | |
| 		strncpy(pvt->username, ext, sizeof(pvt->username) - 1);
 | |
| 	}
 | |
| 	ast_log(LOG_DEBUG, "Host: %s\tUsername: %s\n", host, pvt->username);
 | |
| 
 | |
| 	if (!usingGk) {
 | |
| 		if (create_addr(pvt, host)) {
 | |
| 			oh323_destroy(pvt);
 | |
| 			return NULL;
 | |
| 		}
 | |
| 	}
 | |
| 	/* pass on our capabilites to the H.323 stack */
 | |
| 	ast_mutex_lock(&caplock);
 | |
| 	h323_set_capability(pvt->capability, pvt->dtmfmode);
 | |
| 	ast_mutex_unlock(&caplock);
 | |
| 	
 | |
| 	ast_mutex_lock(&pvt->lock);
 | |
| 	tmpc = oh323_new(pvt, AST_STATE_DOWN, host);
 | |
| 	ast_mutex_unlock(&pvt->lock);
 | |
| 	if (!tmpc) {
 | |
| 		oh323_destroy(pvt);
 | |
| 	}
 | |
| 	ast_update_use_count();
 | |
| 	restart_monitor();
 | |
| 	return tmpc;
 | |
| }
 | |
| 
 | |
| struct oh323_alias *find_alias(const char *source_aliases)
 | |
| {
 | |
| 	struct oh323_alias *a;
 | |
| 
 | |
| 	a = aliasl.aliases;
 | |
| 
 | |
| 	while(a) {
 | |
| 
 | |
| 		if (!strcasecmp(a->name, source_aliases)) {
 | |
| 			break;
 | |
| 		}
 | |
| 		a = a->next;
 | |
| 	}
 | |
| 	return a;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   * Callback for sending digits from H.323 up to asterisk
 | |
|   *
 | |
|   */
 | |
| int send_digit(unsigned call_reference, char digit, const char *token)
 | |
| {
 | |
| 	struct oh323_pvt *pvt;
 | |
| 	struct ast_frame f;
 | |
| 
 | |
| 	ast_log(LOG_DEBUG, "Recieved Digit: %c\n", digit);
 | |
|         
 | |
| 	pvt = find_call(call_reference, token); 
 | |
| 	
 | |
| 	if (!pvt) {
 | |
| 		ast_log(LOG_ERROR, "Private structure not found in send_digit.\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 	memset(&f, 0, sizeof(f));
 | |
| 	f.frametype = AST_FRAME_DTMF;
 | |
| 	f.subclass = digit;
 | |
| 	f.datalen = 0;
 | |
| 	f.samples = 800;
 | |
| 	f.offset = 0;
 | |
|  	f.data = NULL;
 | |
|     	f.mallocd = 0;
 | |
|     	f.src = "SEND_DIGIT";	
 | |
| 	return ast_queue_frame(pvt->owner, &f);	
 | |
| }
 | |
| 
 | |
| /**
 | |
|   * Callback function used to inform the H.323 stack of the local rtp ip/port details
 | |
|   *
 | |
|   * Returns the local RTP information
 | |
|   */
 | |
| struct rtp_info *external_rtp_create(unsigned call_reference, const char * token)
 | |
| {	
 | |
| 	struct oh323_pvt *pvt;
 | |
| 	struct sockaddr_in us;
 | |
| 	struct rtp_info *info;
 | |
|        	static char iabuf[INET_ADDRSTRLEN];
 | |
| 
 | |
| 	info = (struct rtp_info *)malloc(sizeof(struct rtp_info));
 | |
| 	if (!info) {
 | |
| 		ast_log(LOG_ERROR, "Unable to allocated info structure, this is very bad\n");
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	pvt = find_call(call_reference, token); 
 | |
| 	if (!pvt) {
 | |
| 		ast_log(LOG_ERROR, "Unable to find call %s(%d)\n", token, call_reference);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 	/* figure out our local RTP port and tell the H.323 stack about it */
 | |
| 	ast_rtp_get_us(pvt->rtp, &us);
 | |
| 	/* evil hack, until I (someone?) figures out a better way */
 | |
| 	info->addr = ast_inet_ntoa(iabuf, sizeof(iabuf), bindaddr.sin_addr);
 | |
| 	info->port = ntohs(us.sin_port);
 | |
| 	ast_log(LOG_DEBUG, "Sending RTP 'US' %s:%d\n", info->addr, info->port);
 | |
| 	return info;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   * Call-back function passing remote ip/port information from H.323 to asterisk 
 | |
|   *
 | |
|   * Returns nothing 
 | |
|   */
 | |
| void setup_rtp_connection(unsigned call_reference, const char *remoteIp, int remotePort, const char *token)
 | |
| {
 | |
| 	struct oh323_pvt *pvt = NULL;
 | |
| 	struct sockaddr_in them;
 | |
| 
 | |
| 	/* Find the call or allocate a private structure if call not found */
 | |
| 	pvt = find_call(call_reference, token); 
 | |
| 	if (!pvt) {
 | |
| 		ast_log(LOG_ERROR, "Something is wrong: rtp\n");
 | |
| 		return;
 | |
| 	}
 | |
| 	them.sin_family = AF_INET;
 | |
| 	them.sin_addr.s_addr = inet_addr(remoteIp); // only works for IPv4
 | |
| 	them.sin_port = htons(remotePort);
 | |
| 	ast_rtp_set_peer(pvt->rtp, &them);
 | |
| 	return;
 | |
| }
 | |
| 
 | |
| /**  
 | |
|   *	Call-back function to signal asterisk that the channel has been answered 
 | |
|   * Returns nothing
 | |
|   */
 | |
| void connection_made(unsigned call_reference, const char *token)
 | |
| {
 | |
| 	struct ast_channel *c = NULL;
 | |
| 	struct oh323_pvt *pvt = NULL;
 | |
| 	
 | |
| 	pvt = find_call(call_reference, token); 
 | |
| 	
 | |
| 	if (!pvt) {
 | |
| 		ast_log(LOG_ERROR, "Something is wrong: connection\n");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	if (!pvt->owner) {
 | |
| 		ast_log(LOG_ERROR, "Channel has no owner\n");
 | |
| 		return;
 | |
| 	}
 | |
| 	c = pvt->owner;	
 | |
| 
 | |
| 	ast_setstate(c, AST_STATE_UP);
 | |
| 	ast_queue_control(c, AST_CONTROL_ANSWER);
 | |
| 	return;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  *  Call-back function for incoming calls
 | |
|  *
 | |
|  *  Returns 1 on success
 | |
|  */
 | |
| int setup_incoming_call(call_details_t cd)
 | |
| {
 | |
| 	struct oh323_pvt *pvt = NULL;
 | |
| 	struct oh323_user *user = NULL;
 | |
| 	struct oh323_alias *alias = NULL;
 | |
| 	char iabuf[INET_ADDRSTRLEN];
 | |
| 
 | |
| 	/* allocate the call*/
 | |
| 	pvt = oh323_alloc(cd.call_reference);
 | |
| 
 | |
| 	if (!pvt) {
 | |
| 		ast_log(LOG_ERROR, "Unable to allocate private structure, this is bad.\n");
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	/* Populate the call details in the private structure */
 | |
| 	pvt->cd.call_token = strdup(cd.call_token);
 | |
| 	pvt->cd.call_source_aliases = strdup(cd.call_source_aliases);
 | |
| 	pvt->cd.call_dest_alias = strdup(cd.call_dest_alias);
 | |
| 	pvt->cd.call_source_name = strdup(cd.call_source_name);
 | |
| 	pvt->cd.call_source_e164 = strdup(cd.call_source_e164);
 | |
| 	pvt->cd.call_dest_e164 = strdup(cd.call_dest_e164);
 | |
| 
 | |
| 	if (h323debug) {
 | |
| 		ast_verbose(VERBOSE_PREFIX_3 "Setting up Call\n");
 | |
| 		ast_verbose(VERBOSE_PREFIX_3 "	   Call token:  [%s]\n", pvt->cd.call_token);
 | |
| 		ast_verbose(VERBOSE_PREFIX_3 "	   Calling party name:  [%s]\n", pvt->cd.call_source_name);
 | |
| 		ast_verbose(VERBOSE_PREFIX_3 "	   Calling party number:  [%s]\n", pvt->cd.call_source_e164);
 | |
| 		ast_verbose(VERBOSE_PREFIX_3 "	   Called  party name:  [%s]\n", pvt->cd.call_dest_alias);
 | |
| 		ast_verbose(VERBOSE_PREFIX_3 "	   Called  party number:  [%s]\n", pvt->cd.call_dest_e164);
 | |
| 	}
 | |
| 
 | |
| 	/* Decide if we are allowing Gatekeeper routed calls*/
 | |
| 	if ((!strcasecmp(cd.sourceIp, gatekeeper)) && (gkroute == -1) && (usingGk == 1)) {
 | |
| 		
 | |
| 		if (!ast_strlen_zero(cd.call_dest_e164)) {
 | |
| 			strncpy(pvt->exten, cd.call_dest_e164, sizeof(pvt->exten) - 1);
 | |
| 			strncpy(pvt->context, default_context, sizeof(pvt->context) - 1); 
 | |
| 		} else {
 | |
| 			alias = find_alias(cd.call_dest_alias);
 | |
| 		
 | |
| 			if (!alias) {
 | |
| 				ast_log(LOG_ERROR, "Call for %s rejected, alias not found\n", cd.call_dest_alias);
 | |
| 				return 0;
 | |
| 			}
 | |
| 			strncpy(pvt->exten, alias->name, sizeof(pvt->exten) - 1);
 | |
| 			strncpy(pvt->context, alias->context, sizeof(pvt->context) - 1);
 | |
| 		}
 | |
| 		snprintf(pvt->callerid, sizeof(pvt->callerid), "%s <%s>", pvt->cd.call_source_name, pvt->cd.call_source_e164);
 | |
| 	} else { 
 | |
| 		/* Either this call is not from the Gatekeeper 
 | |
| 		   or we are not allowing gk routed calls */
 | |
| 		user  = find_user(cd);
 | |
| 
 | |
| 		if (!user) {
 | |
| 			snprintf(pvt->callerid, sizeof(pvt->callerid), "%s <%s>", pvt->cd.call_source_name, pvt->cd.call_source_e164);
 | |
| 			if (!ast_strlen_zero(pvt->cd.call_dest_e164)) {
 | |
| 				strncpy(pvt->exten, cd.call_dest_e164, sizeof(pvt->exten) - 1);
 | |
| 			} else {
 | |
| 				strncpy(pvt->exten, cd.call_dest_alias, sizeof(pvt->exten) - 1);
 | |
| 			}
 | |
| 			if (ast_strlen_zero(default_context)) {
 | |
| 				ast_log(LOG_ERROR, "Call from '%s' rejected due to no default context\n", pvt->cd.call_source_aliases);
 | |
| 				return 0;
 | |
| 			}
 | |
| 			strncpy(pvt->context, default_context, sizeof(pvt->context) - 1);
 | |
| 			ast_log(LOG_DEBUG, "Sending %s to context [%s]\n", cd.call_source_aliases, pvt->context);
 | |
| 		} else {					
 | |
| 			if (user->host) {
 | |
| 				if (strcasecmp(cd.sourceIp, ast_inet_ntoa(iabuf, sizeof(iabuf), user->addr.sin_addr))){					
 | |
| 					if (ast_strlen_zero(user->context)) {
 | |
| 						if (ast_strlen_zero(default_context)) {					
 | |
| 							ast_log(LOG_ERROR, "Call from '%s' rejected due to non-matching IP address (%s) and no default context\n", user->name, cd.sourceIp);
 | |
|                 					return 0;
 | |
| 						}
 | |
| 						strncpy(pvt->context, default_context, sizeof(pvt->context) - 1);
 | |
| 					} else {
 | |
| 						strncpy(pvt->context, user->context, sizeof(pvt->context) - 1);
 | |
| 					}
 | |
| 					pvt->exten[0] = 'i';
 | |
| 					pvt->exten[1] = '\0';
 | |
| 					ast_log(LOG_ERROR, "Call from '%s' rejected due to non-matching IP address (%s)s\n", user->name, cd.sourceIp);
 | |
| 					goto exit;					
 | |
| 				}
 | |
| 			}
 | |
| 			if (user->incominglimit > 0) {
 | |
| 				if (user->inUse >= user->incominglimit) {
 | |
| 					ast_log(LOG_ERROR, "Call from user '%s' rejected due to usage limit of %d\n", user->name, user->incominglimit);
 | |
| 					return 0;
 | |
| 				}
 | |
| 			}
 | |
| 			strncpy(pvt->context, user->context, sizeof(pvt->context) - 1);
 | |
| 			pvt->bridge = user->bridge;
 | |
|                       	pvt->nat = user->nat;
 | |
| 
 | |
| 			if (!ast_strlen_zero(user->callerid)) {
 | |
| 				strncpy(pvt->callerid, user->callerid, sizeof(pvt->callerid) - 1);
 | |
| 			} else {
 | |
| 				 snprintf(pvt->callerid, sizeof(pvt->callerid), "%s <%s>", pvt->cd.call_source_name, pvt->cd.call_source_e164); 
 | |
| 			}
 | |
| 			if (!ast_strlen_zero(pvt->cd.call_dest_e164)) {
 | |
| 				strncpy(pvt->exten, cd.call_dest_e164, sizeof(pvt->exten) - 1);
 | |
| 			} else {
 | |
| 				strncpy(pvt->exten, cd.call_dest_alias, sizeof(pvt->exten) - 1);
 | |
| 			}
 | |
| 			if (!ast_strlen_zero(user->accountcode)) {
 | |
| 				strncpy(pvt->accountcode, user->accountcode, sizeof(pvt->accountcode) - 1);
 | |
| 			} 
 | |
| 			/* Increment the usage counter */
 | |
| 			user->inUse++;
 | |
| 		} 
 | |
| 	}
 | |
| 
 | |
| exit:
 | |
| 	return 1;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Call-back function to start PBX when OpenH323 ready to serve incoming call
 | |
|  *
 | |
|  * Returns 1 on success
 | |
|  */
 | |
| static int answer_call(unsigned call_reference, const char *token)
 | |
| {
 | |
| 	struct oh323_pvt *pvt = NULL;
 | |
| 	struct ast_channel *c = NULL;
 | |
| 
 | |
| 	/* Find the call or allocate a private structure if call not found */
 | |
| 	pvt = find_call(call_reference, token); 
 | |
| 	
 | |
| 	if (!pvt) {
 | |
| 		ast_log(LOG_ERROR, "Something is wrong: answer_call\n");
 | |
| 		return 0;
 | |
| 	}
 | |
| 	
 | |
| 	/* allocate a channel and tell asterisk about it */
 | |
| 	c = oh323_new(pvt, AST_STATE_RINGING, pvt->cd.call_token);
 | |
| 	if (!c) {
 | |
| 		ast_log(LOG_ERROR, "Couldn't create channel. This is bad\n");
 | |
| 		return 0;
 | |
| 	}
 | |
| 	return 1;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Call-back function to establish an outgoing H.323 call
 | |
|  * 
 | |
|  * Returns 1 on success 
 | |
|  */
 | |
| int setup_outgoing_call(call_details_t cd)
 | |
| {	
 | |
| 	return 1;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   *  Call-back function to signal asterisk that the channel is ringing
 | |
|   *  Returns nothing
 | |
|   */
 | |
| void chan_ringing(unsigned call_reference, const char *token)
 | |
| {
 | |
|         struct ast_channel *c = NULL;
 | |
|         struct oh323_pvt *pvt = NULL;
 | |
| 
 | |
|         pvt = find_call(call_reference, token); 
 | |
| 
 | |
|         if (!pvt) {
 | |
|                 ast_log(LOG_ERROR, "Something is wrong: ringing\n");
 | |
| 	}
 | |
| 
 | |
|         if (!pvt->owner) {
 | |
|                 ast_log(LOG_ERROR, "Channel has no owner\n");
 | |
|                 return;
 | |
|         }
 | |
|         c = pvt->owner;
 | |
|         ast_setstate(c, AST_STATE_RINGING);
 | |
|         ast_queue_control(c, AST_CONTROL_RINGING);
 | |
|         return;
 | |
| }
 | |
| 
 | |
| 
 | |
| void cleanup_call_details(call_details_t cd) 
 | |
| {
 | |
|         if (cd.call_token) {
 | |
|                 free(cd.call_token);
 | |
|         }
 | |
|         if (cd.call_source_aliases) {
 | |
|                 free(cd.call_source_aliases);
 | |
|         }
 | |
|         if (cd.call_dest_alias) {
 | |
|                 free(cd.call_dest_alias);
 | |
| 	}
 | |
|         if (cd.call_source_name) { 
 | |
|                 free(cd.call_source_name);
 | |
|         }
 | |
|         if (cd.call_source_e164) {
 | |
|                 free(cd.call_source_e164);
 | |
|         }
 | |
|         if (cd.call_dest_e164) {
 | |
|                 free(cd.call_dest_e164);
 | |
|         }
 | |
|         if (cd.sourceIp) {
 | |
|                 free(cd.sourceIp);
 | |
|         }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   * Call-back function to cleanup communication
 | |
|   * Returns nothing,
 | |
|   */
 | |
| void cleanup_connection(call_details_t cd)
 | |
| {	
 | |
| 	struct oh323_pvt *pvt = NULL;
 | |
| 	struct ast_rtp *rtp = NULL;
 | |
| 	
 | |
| 	pvt = find_call(cd.call_reference, cd.call_token); 
 | |
| 	if (!pvt) {
 | |
| 		return;
 | |
| 	}
 | |
| 	ast_mutex_lock(&pvt->lock);
 | |
| 	if (pvt->rtp) {
 | |
| 		rtp = pvt->rtp;
 | |
| 		pvt->rtp = NULL;
 | |
| 		/* Immediately stop RTP */
 | |
| 		ast_rtp_destroy(rtp);
 | |
| 	}
 | |
| 	cleanup_call_details(pvt->cd);
 | |
| 	pvt->alreadygone = 1;
 | |
| 	/* Send hangup */	
 | |
| 	if (pvt->owner) {
 | |
| 		ast_queue_hangup(pvt->owner);
 | |
| 	} 
 | |
| 	ast_mutex_unlock(&pvt->lock);
 | |
| 	return;	
 | |
| }
 | |
| 
 | |
| static void *do_monitor(void *data)
 | |
| {
 | |
| 	int res;
 | |
| 	int reloading;
 | |
| 	struct oh323_pvt *oh323 = NULL;
 | |
| 	
 | |
| 		for(;;) {
 | |
| 		 /* Check for a reload request */
 | |
|                 ast_mutex_lock(&h323_reload_lock);
 | |
|                 reloading = h323_reloading;
 | |
|                 h323_reloading = 0;
 | |
|                 ast_mutex_unlock(&h323_reload_lock);
 | |
|                 if (reloading) {
 | |
|                         if (option_verbose > 0) {
 | |
|                                 ast_verbose(VERBOSE_PREFIX_1 "Reloading H.323\n");
 | |
| 			}
 | |
|                         h323_do_reload();
 | |
|                 }
 | |
| 		/* Check for interfaces needing to be killed */
 | |
| 		ast_mutex_lock(&iflock);
 | |
| restartsearch:		
 | |
| 		oh323 = iflist;
 | |
| 		while(oh323) {
 | |
| 			if (oh323->needdestroy) {
 | |
| 				__oh323_destroy(oh323);
 | |
| 				goto restartsearch;
 | |
| 			}
 | |
| 			oh323 = oh323->next;
 | |
| 		}
 | |
| 		ast_mutex_unlock(&iflock);
 | |
| 		pthread_testcancel();
 | |
| 		/* Wait for sched or io */
 | |
| 		res = ast_sched_wait(sched);
 | |
| 		if ((res < 0) || (res > 1000)) {
 | |
| 			res = 1000;
 | |
| 		}
 | |
| 		res = ast_io_wait(io, res);
 | |
| 		ast_mutex_lock(&monlock);
 | |
| 		if (res >= 0) {
 | |
| 			ast_sched_runq(sched);
 | |
| 		}
 | |
| 		ast_mutex_unlock(&monlock);
 | |
| 	}
 | |
| 	/* Never reached */
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| static int restart_monitor(void)
 | |
| {
 | |
| 	pthread_attr_t attr;
 | |
| 	/* If we're supposed to be stopped -- stay stopped */
 | |
| 	if (monitor_thread == AST_PTHREADT_STOP) {
 | |
| 		return 0;
 | |
| 	}
 | |
| 	if (ast_mutex_lock(&monlock)) {
 | |
| 		ast_log(LOG_WARNING, "Unable to lock monitor\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 	if (monitor_thread == pthread_self()) {
 | |
| 		ast_mutex_unlock(&monlock);
 | |
| 		ast_log(LOG_WARNING, "Cannot kill myself\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 	if (monitor_thread && (monitor_thread != AST_PTHREADT_NULL)) {
 | |
| 		/* Wake up the thread */
 | |
| 		pthread_kill(monitor_thread, SIGURG);
 | |
| 	} else {	
 | |
| 	 	pthread_attr_init(&attr);
 | |
|                 pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
 | |
|                 /* Start a new monitor */
 | |
|                 if (ast_pthread_create(&monitor_thread, &attr, do_monitor, NULL) < 0) {
 | |
|                         ast_mutex_unlock(&monlock);
 | |
|                         ast_log(LOG_ERROR, "Unable to start monitor thread.\n");
 | |
|                         return -1;
 | |
|                 }
 | |
| 
 | |
| 	}
 | |
| 	ast_mutex_unlock(&monlock);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int h323_do_trace(int fd, int argc, char *argv[])
 | |
| {
 | |
| 	if (argc != 3) {
 | |
| 		return RESULT_SHOWUSAGE;
 | |
| 	}
 | |
| 	h323_debug(1, atoi(argv[2]));
 | |
| 	ast_cli(fd, "H.323 trace set to level %s\n", argv[2]);
 | |
| 	return RESULT_SUCCESS;
 | |
| }
 | |
| 
 | |
| static int h323_no_trace(int fd, int argc, char *argv[])
 | |
| {
 | |
| 	if (argc != 3) {
 | |
| 		return RESULT_SHOWUSAGE;
 | |
| 	}
 | |
| 	h323_debug(0,0);
 | |
| 	ast_cli(fd, "H.323 trace disabled\n");
 | |
| 	return RESULT_SUCCESS;
 | |
| }
 | |
| 
 | |
| static int h323_do_debug(int fd, int argc, char *argv[])
 | |
| {
 | |
| 	if (argc != 2) {
 | |
| 		return RESULT_SHOWUSAGE;
 | |
| 	}
 | |
| 	h323debug = 1;
 | |
| 	ast_cli(fd, "H323 debug enabled\n");
 | |
| 	return RESULT_SUCCESS;
 | |
| }
 | |
| 
 | |
| static int h323_no_debug(int fd, int argc, char *argv[])
 | |
| {
 | |
| 	if (argc != 3) {
 | |
| 		return RESULT_SHOWUSAGE;
 | |
| 	}
 | |
| 	h323debug = 0;
 | |
| 	ast_cli(fd, "H323 Debug disabled\n");
 | |
| 	return RESULT_SUCCESS;
 | |
| }
 | |
| 
 | |
| static int h323_gk_cycle(int fd, int argc, char *argv[])
 | |
| {
 | |
| 	return RESULT_SUCCESS;
 | |
| #if 0
 | |
| 	if (argc != 3) {
 | |
| 		return RESULT_SHOWUSAGE;
 | |
| 	}	
 | |
| 	h323_gk_urq();
 | |
| 	
 | |
| 	/* Possibly register with a GK */
 | |
| 	if (!gatekeeper_disable) {
 | |
| 		if (h323_set_gk(gatekeeper_discover, gatekeeper, secret)) {
 | |
| 			ast_log(LOG_ERROR, "Gatekeeper registration failed.\n");
 | |
| 		}
 | |
| 	}
 | |
| 	return RESULT_SUCCESS;
 | |
| #endif
 | |
| }
 | |
| 
 | |
| static int h323_ep_hangup(int fd, int argc, char *argv[])
 | |
| {
 | |
| 
 | |
|         if (argc != 3) {
 | |
|                 return RESULT_SHOWUSAGE;
 | |
| 	}
 | |
| 
 | |
| 	if (h323_soft_hangup(argv[2])) {
 | |
| 		ast_verbose(VERBOSE_PREFIX_3 "Hangup succeeded on %s\n", argv[2]);
 | |
| 	} else { 
 | |
| 		ast_verbose(VERBOSE_PREFIX_3 "Hangup failed for %s\n", argv[2]);
 | |
| 	}
 | |
| 
 | |
| 	return RESULT_SUCCESS;
 | |
| }
 | |
| 
 | |
| static int h323_tokens_show(int fd, int argc, char *argv[])
 | |
| {
 | |
| 
 | |
|         if (argc != 3) {
 | |
|                 return RESULT_SHOWUSAGE;
 | |
| 	}
 | |
| 	h323_show_tokens();
 | |
| 
 | |
| 	return RESULT_SUCCESS;
 | |
| }
 | |
| 
 | |
| 
 | |
| static char trace_usage[] = 
 | |
| "Usage: h.323 trace <level num>\n"
 | |
| "       Enables H.323 stack tracing for debugging purposes\n";
 | |
| 
 | |
| static char no_trace_usage[] = 
 | |
| "Usage: h.323 no trace\n"
 | |
| "       Disables H.323 stack tracing for debugging purposes\n";
 | |
| 
 | |
| static char debug_usage[] = 
 | |
| "Usage: h.323 debug\n"
 | |
| "       Enables chan_h323 debug output\n";
 | |
| 
 | |
| static char no_debug_usage[] = 
 | |
| "Usage: h.323 no debug\n"
 | |
| "       Disables chan_h323 debug output\n";
 | |
| 
 | |
| static char show_codec_usage[] = 
 | |
| "Usage: h.323 show codec\n"
 | |
| "       Shows all enabled codecs\n";
 | |
| 
 | |
| static char show_cycle_usage[] = 
 | |
| "Usage: h.323 gk cycle\n"
 | |
| "       Manually re-register with the Gatekeper\n";
 | |
| 
 | |
| static char show_hangup_usage[] = 
 | |
| "Usage: h.323 hangup <token>\n"
 | |
| "       Manually try to hang up call identified by <token>\n";
 | |
| 
 | |
| static char show_tokens_usage[] = 
 | |
| "Usage: h.323 show tokens\n"
 | |
| "       Print out all active call tokens\n";
 | |
| 
 | |
| static char h323_reload_usage[] =
 | |
| "Usage: h323 reload\n"
 | |
| "       Reloads H.323 configuration from sip.conf\n";
 | |
| 
 | |
| static struct ast_cli_entry  cli_trace =
 | |
| 	{ { "h.323", "trace", NULL }, h323_do_trace, "Enable H.323 Stack Tracing", trace_usage };
 | |
| static struct ast_cli_entry  cli_no_trace =
 | |
| 	{ { "h.323", "no", "trace", NULL }, h323_no_trace, "Disable H.323 Stack Tracing", no_trace_usage };
 | |
| static struct ast_cli_entry  cli_debug =
 | |
| 	{ { "h.323", "debug", NULL }, h323_do_debug, "Enable chan_h323 debug", debug_usage };
 | |
| static struct ast_cli_entry  cli_no_debug =
 | |
| 	{ { "h.323", "no", "debug", NULL }, h323_no_debug, "Disable chan_h323 debug", no_debug_usage };
 | |
| static struct ast_cli_entry  cli_show_codecs =
 | |
| 	{ { "h.323", "show", "codecs", NULL }, h323_show_codec, "Show enabled codecs", show_codec_usage };
 | |
| static struct ast_cli_entry  cli_gk_cycle =
 | |
| 	{ { "h.323", "gk", "cycle", NULL }, h323_gk_cycle, "Manually re-register with the Gatekeper", show_cycle_usage };
 | |
| static struct ast_cli_entry  cli_hangup_call =
 | |
| 	{ { "h.323", "hangup", NULL }, h323_ep_hangup, "Show all active call tokens", show_hangup_usage };
 | |
| static struct ast_cli_entry  cli_show_tokens =
 | |
| 	{ { "h.323", "show", "tokens", NULL }, h323_tokens_show, "Manually try to hang up a call", show_tokens_usage };
 | |
| 
 | |
| 
 | |
| 
 | |
| int reload_config(void)
 | |
| {	
 | |
| 	int format;
 | |
| 	struct ast_config *cfg;
 | |
| 	struct ast_variable *v;
 | |
| 	struct oh323_peer *peer   = NULL;
 | |
| 	struct oh323_user *user   = NULL;
 | |
| 	struct oh323_alias *alias = NULL;
 | |
| 	struct ast_hostent ahp; struct hostent *hp;
 | |
| 	char *cat;
 | |
|     	char *utype;
 | |
| 	
 | |
| 	cfg = ast_load(config);
 | |
| 
 | |
| 	/* We *must* have a config file otherwise stop immediately */
 | |
| 	if (!cfg) {
 | |
| 		ast_log(LOG_NOTICE, "Unable to load config %s, H.323 disabled\n", config);
 | |
| 		return 1;
 | |
| 	}
 | |
| 	
 | |
|        /* fire up the H.323 Endpoint */       
 | |
| 	if (!h323_end_point_exist()) {
 | |
| 	       h323_end_point_create();        
 | |
| 	}
 | |
| 	h323debug=0;
 | |
| 	dtmfmode = H323_DTMF_RFC2833;
 | |
| 
 | |
| 	memset(&bindaddr, 0, sizeof(bindaddr));
 | |
| 
 | |
| 	v = ast_variable_browse(cfg, "general");
 | |
| 	while(v) {
 | |
| 		/* Create the interface list */
 | |
| 		if (!strcasecmp(v->name, "port")) {
 | |
| 			h323_signalling_port = (int)strtol(v->value, NULL, 10);
 | |
| 		} else if (!strcasecmp(v->name, "bindaddr")) {
 | |
| 			if (!(hp = ast_gethostbyname(v->value, &ahp))) {
 | |
| 				ast_log(LOG_WARNING, "Invalid address: %s\n", v->value);
 | |
| 			} else {
 | |
| 				memcpy(&bindaddr.sin_addr, hp->h_addr, sizeof(bindaddr.sin_addr));
 | |
| 			}
 | |
| 		} else if (!strcasecmp(v->name, "allow")) {
 | |
| 			format = ast_getformatbyname(v->value);
 | |
| 			if (format < 1) 
 | |
| 				ast_log(LOG_WARNING, "Cannot allow unknown format '%s'\n", v->value);
 | |
| 			else
 | |
| 				capability |= format;
 | |
| 		} else if (!strcasecmp(v->name, "disallow")) {
 | |
| 			format = ast_getformatbyname(v->value);
 | |
| 			if (format < 1) 
 | |
| 				ast_log(LOG_WARNING, "Cannot disallow unknown format '%s'\n", v->value);
 | |
| 			else
 | |
| 				capability &= ~format;
 | |
| 		} else if (!strcasecmp(v->name, "tos")) {
 | |
| 			if (sscanf(v->value, "%i", &format) == 1)
 | |
| 				tos = format & 0xff;
 | |
| 			else if (!strcasecmp(v->value, "lowdelay"))
 | |
| 				tos = IPTOS_LOWDELAY;
 | |
| 			else if (!strcasecmp(v->value, "throughput"))
 | |
| 				tos = IPTOS_THROUGHPUT;
 | |
| 			else if (!strcasecmp(v->value, "reliability"))
 | |
| 				tos = IPTOS_RELIABILITY;
 | |
| 			else if (!strcasecmp(v->value, "mincost"))
 | |
| 				tos = IPTOS_MINCOST;
 | |
| 			else if (!strcasecmp(v->value, "none"))
 | |
| 				tos = 0;
 | |
| 			else
 | |
| 				ast_log(LOG_WARNING, "Invalid tos value at line %d, should be 'lowdelay', 'throughput', 'reliability', 'mincost', or 'none'\n", v->lineno);
 | |
| 		} else if (!strcasecmp(v->name, "gatekeeper")) {
 | |
| 			if (!strcasecmp(v->value, "DISABLE")) {
 | |
| 				gatekeeper_disable = 1;
 | |
| 				usingGk = 0;
 | |
| 			} else if (!strcasecmp(v->value, "DISCOVER")) {
 | |
| 				gatekeeper_disable = 0;
 | |
| 				gatekeeper_discover = 1;
 | |
| 				usingGk = 1;
 | |
| 			} else {
 | |
| 				gatekeeper_disable = 0;
 | |
| 				usingGk = 1;
 | |
| 				strncpy(gatekeeper, v->value, sizeof(gatekeeper) - 1);
 | |
| 			}
 | |
| 		} else if (!strcasecmp(v->name, "secret")) {
 | |
| 				strncpy(secret, v->value, sizeof(secret) - 1);
 | |
| 		} else if (!strcasecmp(v->name, "AllowGKRouted")) {
 | |
| 				gkroute = ast_true(v->value);
 | |
| 		} else if (!strcasecmp(v->name, "context")) {
 | |
| 			strncpy(default_context, v->value, sizeof(default_context) - 1);
 | |
| 			ast_verbose(VERBOSE_PREFIX_3 "  == Setting default context to %s\n", default_context);	
 | |
| 		} else if (!strcasecmp(v->name, "dtmfmode")) {
 | |
| 			if (!strcasecmp(v->value, "inband"))
 | |
| 				dtmfmode=H323_DTMF_INBAND;
 | |
| 			else if (!strcasecmp(v->value, "rfc2833"))
 | |
| 				dtmfmode = H323_DTMF_RFC2833;
 | |
| 			else {
 | |
| 				ast_log(LOG_WARNING, "Unknown dtmf mode '%s', using rfc2833\n", v->value);
 | |
| 				dtmfmode = H323_DTMF_RFC2833;
 | |
| 			}
 | |
| 		} else if (!strcasecmp(v->name, "UserByAlias")) {
 | |
|                         userbyalias = ast_true(v->value);
 | |
|                 } else if (!strcasecmp(v->name, "bridge")) {
 | |
|                         bridging = ast_true(v->value);
 | |
|                 } else if (!strcasecmp(v->name, "noFastStart")) {
 | |
|                                 noFastStart = ast_true(v->value);
 | |
|                 } else if (!strcasecmp(v->name, "noH245Tunneling")) {
 | |
|                                 noH245Tunneling = ast_true(v->value);
 | |
| 		}
 | |
| 		v = v->next;	
 | |
| 	}
 | |
| 	
 | |
| 	cat = ast_category_browse(cfg, NULL);
 | |
| 	while(cat) {
 | |
| 		if (strcasecmp(cat, "general")) {
 | |
| 			utype = ast_variable_retrieve(cfg, cat, "type");
 | |
| 			if (utype) {
 | |
| 				if (!strcasecmp(utype, "user") || !strcasecmp(utype, "friend")) {
 | |
| 					user = build_user(cat, ast_variable_browse(cfg, cat));
 | |
| 					if (user) {
 | |
| 						ast_mutex_lock(&userl.lock);
 | |
| 						user->next = userl.users;
 | |
| 						userl.users = user;
 | |
| 						ast_mutex_unlock(&userl.lock);
 | |
| 					}
 | |
| 				}  else if (!strcasecmp(utype, "peer") || !strcasecmp(utype, "friend")) {
 | |
| 					peer = build_peer(cat, ast_variable_browse(cfg, cat));
 | |
| 					if (peer) {
 | |
| 						ast_mutex_lock(&peerl.lock);
 | |
| 						peer->next = peerl.peers;
 | |
| 						peerl.peers = peer;
 | |
| 						ast_mutex_unlock(&peerl.lock);
 | |
| 					}
 | |
| 				}  else if (!strcasecmp(utype, "h323")) {			
 | |
| 					alias = build_alias(cat, ast_variable_browse(cfg, cat));
 | |
| 					if (alias) {
 | |
| 						ast_mutex_lock(&aliasl.lock);
 | |
| 						alias->next = aliasl.aliases;
 | |
| 						aliasl.aliases = alias;
 | |
| 						ast_mutex_unlock(&aliasl.lock);
 | |
| 					}
 | |
| 				} else {
 | |
| 					ast_log(LOG_WARNING, "Unknown type '%s' for '%s' in %s\n", utype, cat, config);
 | |
| 				}
 | |
| 			} else
 | |
| 				ast_log(LOG_WARNING, "Section '%s' lacks type\n", cat);
 | |
| 		}
 | |
| 		cat = ast_category_browse(cfg, cat);
 | |
| 	}
 | |
| 	ast_destroy(cfg);
 | |
| 
 | |
| 	/* Register our H.323 aliases if any*/
 | |
| 	while (alias) {		
 | |
| 		if (h323_set_alias(alias)) {
 | |
| 			ast_log(LOG_ERROR, "Alias %s rejected by endpoint\n", alias->name);
 | |
| 			return -1;
 | |
| 		}	
 | |
| 		alias = alias->next;
 | |
| 	}
 | |
| 
 | |
| 	/* Add some capabilities */
 | |
| 	ast_mutex_lock(&caplock);
 | |
| 	if(h323_set_capability(capability, dtmfmode)) {
 | |
| 		ast_log(LOG_ERROR, "Capabilities failure, this is bad.\n");
 | |
| 		ast_mutex_unlock(&caplock);
 | |
| 		return -1;
 | |
| 	}
 | |
| 	ast_mutex_unlock(&caplock);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| void delete_users(void)
 | |
| {
 | |
| 	struct oh323_user *user, *userlast;
 | |
| 	struct oh323_peer *peer;
 | |
| 	
 | |
| 	/* Delete all users */
 | |
| 	ast_mutex_lock(&userl.lock);
 | |
| 	for (user=userl.users;user;) {
 | |
| 		userlast = user;
 | |
| 		user=user->next;
 | |
| 		free(userlast);
 | |
| 	}
 | |
| 	userl.users=NULL;
 | |
| 	ast_mutex_unlock(&userl.lock);
 | |
| 	ast_mutex_lock(&peerl.lock);
 | |
| 	for (peer=peerl.peers;peer;) {
 | |
| 		/* Assume all will be deleted, and we'll find out for sure later */
 | |
| 		peer->delme = 1;
 | |
| 		peer = peer->next;
 | |
| 	}
 | |
| 	ast_mutex_unlock(&peerl.lock);
 | |
| }
 | |
| 
 | |
| void delete_aliases(void)
 | |
| {
 | |
| 	struct oh323_alias *alias, *aliaslast;
 | |
| 		
 | |
| 	/* Delete all users */
 | |
| 	ast_mutex_lock(&aliasl.lock);
 | |
| 	for (alias=aliasl.aliases;alias;) {
 | |
| 		aliaslast = alias;
 | |
| 		alias=alias->next;
 | |
| 		free(aliaslast);
 | |
| 	}
 | |
| 	aliasl.aliases=NULL;
 | |
| 	ast_mutex_unlock(&aliasl.lock);
 | |
| }
 | |
| 
 | |
| void prune_peers(void)
 | |
| {
 | |
| 	/* Prune peers who still are supposed to be deleted */
 | |
| 	struct oh323_peer *peer, *peerlast, *peernext;
 | |
| 	ast_mutex_lock(&peerl.lock);
 | |
| 	peerlast = NULL;
 | |
| 	for (peer=peerl.peers;peer;) {
 | |
| 		peernext = peer->next;
 | |
| 		if (peer->delme) {
 | |
| 			free(peer);
 | |
| 			if (peerlast)
 | |
| 				peerlast->next = peernext;
 | |
| 			else
 | |
| 				peerl.peers = peernext;
 | |
| 		} else
 | |
| 			peerlast = peer;
 | |
| 		peer=peernext;
 | |
| 	}
 | |
| 	ast_mutex_unlock(&peerl.lock);
 | |
| }
 | |
| 
 | |
| static int h323_reload(int fd, int argc, char *argv[])
 | |
| {
 | |
| 	ast_mutex_lock(&h323_reload_lock);
 | |
|         if (h323_reloading) {
 | |
|                 ast_verbose("Previous H.323 reload not yet done\n");
 | |
|         } else {
 | |
|                 h323_reloading = 1;
 | |
|         }
 | |
| 	ast_mutex_unlock(&h323_reload_lock);
 | |
|         restart_monitor();
 | |
|         return 0;
 | |
| }
 | |
| 
 | |
| static int h323_do_reload(void)
 | |
| {
 | |
| 	delete_users();
 | |
|         delete_aliases();
 | |
|         prune_peers();
 | |
|         reload_config();
 | |
|         restart_monitor();
 | |
|         return 0;
 | |
| }
 | |
| 
 | |
| int reload(void)
 | |
| {
 | |
| 	return h323_reload(0, 0, NULL);
 | |
| }
 | |
| 
 | |
| 
 | |
| static struct ast_cli_entry  cli_h323_reload =
 | |
|         { { "h.323", "reload", NULL }, h323_reload, "Reload H.323 configuration", h323_reload_usage };
 | |
| 
 | |
| static struct ast_rtp *oh323_get_rtp_peer(struct ast_channel *chan)
 | |
| {
 | |
| 	struct oh323_pvt *p;
 | |
| 	p = (struct oh323_pvt *) chan->pvt->pvt;
 | |
| 	if (p && p->rtp && p->bridge) {
 | |
| 		return p->rtp;
 | |
| 	}
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| static struct ast_rtp *oh323_get_vrtp_peer(struct ast_channel *chan)
 | |
| {
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| static char *convertcap(int cap)
 | |
| {
 | |
| 	switch (cap) {
 | |
| 	case AST_FORMAT_G723_1:
 | |
| 		return "G.723";
 | |
| 	case AST_FORMAT_GSM:
 | |
| 		return "GSM";
 | |
| 	case AST_FORMAT_ULAW:
 | |
| 		return "ULAW";
 | |
| 	case AST_FORMAT_ALAW:
 | |
| 		return "ALAW";
 | |
| 	case AST_FORMAT_ADPCM:
 | |
| 		return "G.728";
 | |
| 	case AST_FORMAT_G729A:
 | |
| 		return "G.729";
 | |
| 	case AST_FORMAT_SPEEX:
 | |
| 		return "SPEEX";
 | |
| 	case AST_FORMAT_ILBC:
 | |
| 		return "ILBC";
 | |
| 	default:
 | |
| 		ast_log(LOG_NOTICE, "Don't know how to deal with mode %d\n", cap);
 | |
| 		return NULL;
 | |
| 	}
 | |
| 
 | |
| }
 | |
| 
 | |
| static int oh323_set_rtp_peer(struct ast_channel *chan, struct ast_rtp *rtp, struct ast_rtp *vrtp, int codecs)
 | |
| {
 | |
| 	/* XXX Deal with Video */
 | |
| 	struct oh323_pvt *p;
 | |
| 	struct sockaddr_in them;
 | |
| 	struct sockaddr_in us;
 | |
| 	char *mode;
 | |
| 	char iabuf[INET_ADDRSTRLEN];
 | |
| 
 | |
| 	mode = convertcap(chan->writeformat); 
 | |
| 
 | |
| 	if (!rtp) {
 | |
| 		return 0;
 | |
| 	}
 | |
| 
 | |
| 	p = (struct oh323_pvt *) chan->pvt->pvt;
 | |
| 	if (!p) {
 | |
| 		ast_log(LOG_ERROR, "No Private Structure, this is bad\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	ast_rtp_get_peer(rtp, &them);	
 | |
| 	ast_rtp_get_us(rtp, &us);
 | |
| 
 | |
| 	h323_native_bridge(p->cd.call_token, ast_inet_ntoa(iabuf, sizeof(iabuf), them.sin_addr), mode);
 | |
| 	
 | |
| 	return 0;
 | |
| 	
 | |
| }
 | |
| 
 | |
| static struct ast_rtp_protocol oh323_rtp = {
 | |
| 	get_rtp_info: oh323_get_rtp_peer,
 | |
| 	get_vrtp_info: oh323_get_vrtp_peer,
 | |
| 	set_rtp_peer: oh323_set_rtp_peer,
 | |
| };
 | |
| 
 | |
| int load_module()
 | |
| {
 | |
| 	int res;
 | |
|         ast_mutex_init(&userl.lock);
 | |
|         ast_mutex_init(&peerl.lock);
 | |
|         ast_mutex_init(&aliasl.lock);
 | |
| 	sched = sched_context_create();
 | |
| 	if (!sched) {
 | |
| 		ast_log(LOG_WARNING, "Unable to create schedule context\n");
 | |
| 	}
 | |
| 	io = io_context_create();
 | |
| 	if (!io) {
 | |
| 		ast_log(LOG_WARNING, "Unable to create I/O context\n");
 | |
| 	}
 | |
| 		
 | |
| 	res = reload_config();
 | |
| 	if (res) {
 | |
| 		return 0;
 | |
| 	} else {
 | |
| 		/* Make sure we can register our channel type */
 | |
| 		if (ast_channel_register(type, tdesc, capability, oh323_request)) {
 | |
| 			ast_log(LOG_ERROR, "Unable to register channel class %s\n", type);
 | |
| 			h323_end_process();
 | |
| 			return -1;
 | |
| 		}
 | |
| 		ast_cli_register(&cli_debug);
 | |
| 		ast_cli_register(&cli_no_debug);
 | |
| 		ast_cli_register(&cli_trace);
 | |
| 		ast_cli_register(&cli_no_trace);
 | |
| 		ast_cli_register(&cli_show_codecs);
 | |
| 		ast_cli_register(&cli_gk_cycle);
 | |
| 		ast_cli_register(&cli_hangup_call);
 | |
| 		ast_cli_register(&cli_show_tokens);
 | |
| 		ast_cli_register(&cli_h323_reload);
 | |
| 
 | |
| 		oh323_rtp.type = type;
 | |
| 		ast_rtp_proto_register(&oh323_rtp);
 | |
| 
 | |
| 		/* Register our callback functions */
 | |
| 		h323_callback_register(setup_incoming_call, 
 | |
| 			               setup_outgoing_call,							 
 | |
| 	 			       external_rtp_create, 
 | |
| 				       setup_rtp_connection, 
 | |
| 				       cleanup_connection, 
 | |
| 				       chan_ringing,
 | |
| 				       connection_made, 
 | |
| 				       send_digit,
 | |
| 				       answer_call);
 | |
| 	
 | |
| 		/* start the h.323 listener */
 | |
| 		if (h323_start_listener(h323_signalling_port, bindaddr)) {
 | |
| 			ast_log(LOG_ERROR, "Unable to create H323 listener.\n");
 | |
| 			return -1;
 | |
| 		}
 | |
| 
 | |
| 		/* Possibly register with a GK */
 | |
| 		if (gatekeeper_disable == 0) {
 | |
| 			if (h323_set_gk(gatekeeper_discover, gatekeeper, secret)) {
 | |
| 				ast_log(LOG_ERROR, "Gatekeeper registration failed.\n");
 | |
| 				return 0;
 | |
| 			}
 | |
| 		}
 | |
| 		/* And start the monitor for the first time */
 | |
| 		restart_monitor();
 | |
| 	}
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| 
 | |
| int unload_module() 
 | |
| {
 | |
| 	struct oh323_pvt *p, *pl;
 | |
| 		
 | |
| 	if (!ast_mutex_lock(&iflock)) {
 | |
| 	/* hangup all interfaces if they have an owner */
 | |
| 	p = iflist;
 | |
| 	while(p) {
 | |
| 		if (p->owner)
 | |
| 			ast_softhangup(p->owner, AST_SOFTHANGUP_APPUNLOAD);
 | |
| 		p = p->next;
 | |
| 	}
 | |
| 	iflist = NULL;
 | |
| 	ast_mutex_unlock(&iflock);
 | |
| 	} else {
 | |
| 		ast_log(LOG_WARNING, "Unable to lock the interface list\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (!ast_mutex_lock(&monlock)) {
 | |
|                 if (monitor_thread && (monitor_thread != AST_PTHREADT_STOP)) {
 | |
|                         pthread_cancel(monitor_thread);
 | |
|                         pthread_kill(monitor_thread, SIGURG);
 | |
|                         pthread_join(monitor_thread, NULL);
 | |
|                  }
 | |
|                 monitor_thread = AST_PTHREADT_STOP;
 | |
|                 ast_mutex_unlock(&monlock);
 | |
|         } else {
 | |
|                 ast_log(LOG_WARNING, "Unable to lock the monitor\n");
 | |
|                 return -1;
 | |
|         }
 | |
| 		
 | |
| 	if (!ast_mutex_lock(&iflock)) {
 | |
| 		/* destroy all the interfaces and free their memory */
 | |
| 		p = iflist;
 | |
| 		while(p) {
 | |
| 			pl = p;
 | |
| 			p = p->next;
 | |
| 			/* free associated memory */
 | |
| 			ast_mutex_destroy(&pl->lock);
 | |
| 			free(pl);
 | |
| 		}
 | |
| 		iflist = NULL;
 | |
| 		ast_mutex_unlock(&iflock);
 | |
| 	} else {
 | |
| 		ast_log(LOG_WARNING, "Unable to lock the interface list\n");
 | |
| 		return -1;
 | |
| 	}
 | |
| 	h323_gk_urq();
 | |
| 	h323_end_process();
 | |
| 
 | |
| 	/* unregister rtp */
 | |
| 	ast_rtp_proto_unregister(&oh323_rtp);
 | |
| 	
 | |
| 	/* unregister commands */
 | |
|         ast_cli_unregister(&cli_debug);
 | |
|         ast_cli_unregister(&cli_no_debug);
 | |
|         ast_cli_unregister(&cli_trace);
 | |
|         ast_cli_unregister(&cli_no_trace);   
 | |
|         ast_cli_unregister(&cli_show_codecs);
 | |
|         ast_cli_unregister(&cli_gk_cycle);
 | |
|         ast_cli_unregister(&cli_hangup_call);
 | |
|         ast_cli_unregister(&cli_show_tokens);
 | |
|         ast_cli_unregister(&cli_h323_reload);
 | |
|                  
 | |
| 	/* unregister channel type */
 | |
| 	ast_channel_unregister(type);
 | |
| 
 | |
| 	return 0; 
 | |
| } 
 | |
| 
 | |
| int usecount()
 | |
| {
 | |
| 	int res;
 | |
| 	ast_mutex_lock(&usecnt_lock);
 | |
| 	res = usecnt;
 | |
| 	ast_mutex_unlock(&usecnt_lock);
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| char *description()
 | |
| {
 | |
| 	return desc;
 | |
| }
 | |
| 
 | |
| char *key()
 | |
| {
 | |
| 	return ASTERISK_GPL_KEY;
 | |
| }
 | |
| 
 | |
| 
 | |
| 
 | |
| 
 |