|
|
@ -5063,10 +5063,11 @@ static int register_verify(int callno, struct sockaddr_in *sin, struct iax_ies *
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* SLD: first call to lookup peer during registration */
|
|
|
|
/* SLD: first call to lookup peer during registration */
|
|
|
|
|
|
|
|
ast_mutex_unlock(&iaxsl[callno]);
|
|
|
|
p = find_peer(peer, 1);
|
|
|
|
p = find_peer(peer, 1);
|
|
|
|
|
|
|
|
ast_mutex_lock(&iaxsl[callno]);
|
|
|
|
if (!p) {
|
|
|
|
if (!p || !iaxs[callno]) {
|
|
|
|
if (authdebug)
|
|
|
|
if (authdebug && !p)
|
|
|
|
ast_log(LOG_NOTICE, "No registration for peer '%s' (from %s)\n", peer, ast_inet_ntoa(sin->sin_addr));
|
|
|
|
ast_log(LOG_NOTICE, "No registration for peer '%s' (from %s)\n", peer, ast_inet_ntoa(sin->sin_addr));
|
|
|
|
return -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -5173,8 +5174,8 @@ static int register_verify(int callno, struct sockaddr_in *sin, struct iax_ies *
|
|
|
|
|
|
|
|
|
|
|
|
if (ast_test_flag(p, IAX_TEMPONLY))
|
|
|
|
if (ast_test_flag(p, IAX_TEMPONLY))
|
|
|
|
destroy_peer(p);
|
|
|
|
destroy_peer(p);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int authenticate(const char *challenge, const char *secret, const char *keyn, int authmethods, struct iax_ie_data *ied, struct sockaddr_in *sin, aes_encrypt_ctx *ecx, aes_decrypt_ctx *dcx)
|
|
|
|
static int authenticate(const char *challenge, const char *secret, const char *keyn, int authmethods, struct iax_ie_data *ied, struct sockaddr_in *sin, aes_encrypt_ctx *ecx, aes_decrypt_ctx *dcx)
|
|
|
@ -5909,7 +5910,6 @@ static int auth_fail(int callno, int failcode)
|
|
|
|
{
|
|
|
|
{
|
|
|
|
/* Schedule sending the authentication failure in one second, to prevent
|
|
|
|
/* Schedule sending the authentication failure in one second, to prevent
|
|
|
|
guessing */
|
|
|
|
guessing */
|
|
|
|
ast_mutex_lock(&iaxsl[callno]);
|
|
|
|
|
|
|
|
if (iaxs[callno]) {
|
|
|
|
if (iaxs[callno]) {
|
|
|
|
iaxs[callno]->authfail = failcode;
|
|
|
|
iaxs[callno]->authfail = failcode;
|
|
|
|
if (delayreject) {
|
|
|
|
if (delayreject) {
|
|
|
@ -5919,7 +5919,6 @@ static int auth_fail(int callno, int failcode)
|
|
|
|
} else
|
|
|
|
} else
|
|
|
|
auth_reject((void *)(long)callno);
|
|
|
|
auth_reject((void *)(long)callno);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ast_mutex_unlock(&iaxsl[callno]);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
@ -7618,10 +7617,18 @@ retryowner2:
|
|
|
|
if (delayreject)
|
|
|
|
if (delayreject)
|
|
|
|
send_command_immediate(iaxs[fr->callno], AST_FRAME_IAX, IAX_COMMAND_ACK, fr->ts, NULL, 0,fr->iseqno);
|
|
|
|
send_command_immediate(iaxs[fr->callno], AST_FRAME_IAX, IAX_COMMAND_ACK, fr->ts, NULL, 0,fr->iseqno);
|
|
|
|
if (register_verify(fr->callno, &sin, &ies)) {
|
|
|
|
if (register_verify(fr->callno, &sin, &ies)) {
|
|
|
|
|
|
|
|
if (!iaxs[fr->callno]) {
|
|
|
|
|
|
|
|
ast_mutex_unlock(&iaxsl[fr->callno]);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
}
|
|
|
|
/* Send delayed failure */
|
|
|
|
/* Send delayed failure */
|
|
|
|
auth_fail(fr->callno, IAX_COMMAND_REGREJ);
|
|
|
|
auth_fail(fr->callno, IAX_COMMAND_REGREJ);
|
|
|
|
break;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!iaxs[fr->callno]) {
|
|
|
|
|
|
|
|
ast_mutex_unlock(&iaxsl[fr->callno]);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
}
|
|
|
|
if ((ast_strlen_zero(iaxs[fr->callno]->secret) && ast_strlen_zero(iaxs[fr->callno]->inkeys)) ||
|
|
|
|
if ((ast_strlen_zero(iaxs[fr->callno]->secret) && ast_strlen_zero(iaxs[fr->callno]->inkeys)) ||
|
|
|
|
ast_test_flag(&iaxs[fr->callno]->state, IAX_STATE_AUTHENTICATED | IAX_STATE_UNCHANGED)) {
|
|
|
|
ast_test_flag(&iaxs[fr->callno]->state, IAX_STATE_AUTHENTICATED | IAX_STATE_UNCHANGED)) {
|
|
|
|
if (f.subclass == IAX_COMMAND_REGREL)
|
|
|
|
if (f.subclass == IAX_COMMAND_REGREL)
|
|
|
|