- Fix the OUTGOING stuff (merge from 1.4)

- Make sure we UNREF authpeer when not needed


git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@46399 65c4cc65-6c06-0410-ace0-fbb531ad65f3
1.6.0
Olle Johansson 19 years ago
parent a58a4fb8ac
commit 430ca5b59c

@ -702,7 +702,7 @@ struct sip_auth {
#define SIP_USEREQPHONE (1 << 10) /*!< Add user=phone to numeric URI. Default off */
#define SIP_REALTIME (1 << 11) /*!< Flag for realtime users */
#define SIP_USECLIENTCODE (1 << 12) /*!< Trust X-ClientCode info message */
#define SIP_OUTGOING (1 << 13) /*!< Is this an outgoing call? */
#define SIP_OUTGOING (1 << 13) /*!< Direction of the last transaction in this dialog */
#define SIP_CAN_BYE (1 << 14) /*!< Can we send BYE on this dialog? */
#define SIP_DEFER_BYE_ON_TRANSFER (1 << 15) /*!< Do not hangup at first ast_hangup */
#define SIP_DTMF (3 << 16) /*!< DTMF Support: four settings, uses two bits */
@ -5569,16 +5569,6 @@ static int reqprep(struct sip_request *req, struct sip_pvt *p, int sipmethod, in
ast_log(LOG_DEBUG, "Strict routing enforced for session %s\n", p->callid);
}
#ifdef SKREP
/* Let's try to figure out the direction of this transaction within the dialog */
/* If we're sending an ACK, we DID send the INVITE - which means outbound.
INVITE's are outbound transactions, always
*/
if (sipmethod == SIP_ACK || sipmethod == SIP_INVITE)
is_outbound = TRUE;
/* In other case's, let's follow the flow of the dialog */
#endif
if (sipmethod == SIP_CANCEL)
c = p->initreq.rlPart2; /* Use original URI */
else if (sipmethod == SIP_ACK) {
@ -6424,6 +6414,7 @@ static int transmit_reinvite_with_sdp(struct sip_pvt *p, int t38version)
/* Use this as the basis */
initialize_initreq(p, &req);
p->lastinvite = p->ocseq;
ast_set_flag(&p->flags[0], SIP_OUTGOING); /* Change direction of this dialog */
return send_request(p, &req, XMIT_CRITICAL, p->ocseq);
}
@ -10585,7 +10576,7 @@ static int sip_show_channel(int fd, int argc, char *argv[])
ast_cli(fd, " * Subscription (type: %s)\n", subscription_type2str(cur->subscribed));
else
ast_cli(fd, " * SIP Call\n");
ast_cli(fd, " Direction: %s\n", ast_test_flag(&cur->flags[0], SIP_OUTGOING)?"Outgoing":"Incoming");
ast_cli(fd, " Curr. trans. direction: %s\n", ast_test_flag(&cur->flags[0], SIP_OUTGOING) ? "Outgoing" : "Incoming");
ast_cli(fd, " Call-ID: %s\n", cur->callid);
ast_cli(fd, " Owner channel ID: %s\n", cur->owner ? cur->owner->name : "<none>");
ast_cli(fd, " Our Codec Capability: %d\n", cur->capability);
@ -13171,14 +13162,14 @@ static int handle_request_invite(struct sip_pvt *p, struct sip_request *req, int
p->pendinginvite = seqno;
check_via(p, req);
copy_request(&p->initreq, req); /* Save this INVITE as the transaction basis */
if (!p->owner) { /* Not a re-invite */
/* Use this as the basis */
copy_request(&p->initreq, req);
if (debug)
ast_verbose("Using INVITE request as basis request - %s\n", p->callid);
append_history(p, "Invite", "New call: %s", p->callid);
parse_ok_contact(p, req);
} else { /* Re-invite on existing call */
ast_clear_flag(&p->flags[0], SIP_OUTGOING); /* This is now an inbound dialog */
/* Handle SDP here if we already have an owner */
if (find_sdp(req)) {
if (process_sdp(p, req)) {
@ -14148,6 +14139,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req,
if (!ast_test_flag(&p->flags[1], SIP_PAGE2_ALLOWSUBSCRIBE)) {
transmit_response(p, "403 Forbidden (policy)", req);
ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);
if (authpeer)
ASTOBJ_UNREF(authpeer,sip_destroy_peer);
return 0;
}
@ -14168,6 +14161,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req,
if (gotdest) {
transmit_response(p, "404 Not Found", req);
ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);
if (authpeer)
ASTOBJ_UNREF(authpeer,sip_destroy_peer);
return 0;
}
@ -14176,6 +14171,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req,
make_our_tag(p->tag, sizeof(p->tag));
if (!strcmp(event, "presence") || !strcmp(event, "dialog")) { /* Presence, RFC 3842 */
if (authpeer) /* We do not need the authpeer any more */
ASTOBJ_UNREF(authpeer,sip_destroy_peer);
/* Header from Xten Eye-beam Accept: multipart/related, application/rlmi+xml, application/pidf+xml, application/xpidf+xml */
/* Polycom phones only handle xpidf+xml, even if they say they can
@ -14205,6 +14202,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req,
if (option_debug > 1)
ast_log(LOG_DEBUG, "Received SIP mailbox subscription for unknown format: %s\n", accept);
ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);
if (authpeer)
ASTOBJ_UNREF(authpeer,sip_destroy_peer);
return 0;
}
/* Looks like they actually want a mailbox status
@ -14216,6 +14215,8 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req,
transmit_response(p, "404 Not found (no mailbox)", req);
ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);
ast_log(LOG_NOTICE, "Received SIP subscribe for peer without mailbox: %s\n", authpeer->name);
if (authpeer)
ASTOBJ_UNREF(authpeer,sip_destroy_peer);
return 0;
}
@ -14225,14 +14226,18 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req,
sip_destroy(authpeer->mwipvt);
authpeer->mwipvt = p; /* Link from peer to pvt */
p->relatedpeer = authpeer; /* Link from pvt to peer */
/* Do not release authpeer here */
} else { /* At this point, Asterisk does not understand the specified event */
transmit_response(p, "489 Bad Event", req);
if (option_debug > 1)
ast_log(LOG_DEBUG, "Received SIP subscribe for unknown event package: %s\n", event);
ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);
if (authpeer)
ASTOBJ_UNREF(authpeer,sip_destroy_peer);
return 0;
}
/* Add subscription for extension state from the PBX core */
if (p->subscribed != MWI_NOTIFICATION && !resubscribe)
p->stateid = ast_extension_state_add(p->context, p->exten, cb_extensionstate, p);
@ -14311,8 +14316,6 @@ static int handle_request_subscribe(struct sip_pvt *p, struct sip_request *req,
if (!p->expiry)
ast_set_flag(&p->flags[0], SIP_NEEDDESTROY);
}
if (authpeer)
ASTOBJ_UNREF(authpeer, sip_destroy_peer);
return 1;
}

Loading…
Cancel
Save