blob: d170b664975b0fcb8b5c6883aad07c40a16b039d [file] [log] [blame]
Tristan Matthews0a329cc2013-07-17 13:20:14 -04001/* $Id$ */
2/*
3 * Copyright (C) 2008-2011 Teluu Inc. (http://www.teluu.com)
4 * Copyright (C) 2003-2008 Benny Prijono <benny@prijono.org>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19 */
20#include <pjsua-lib/pjsua.h>
21#include <pjsua-lib/pjsua_internal.h>
22
23
24#define THIS_FILE "pjsua_core.c"
25
26
27/* Internal prototypes */
28static void resolve_stun_entry(pjsua_stun_resolve *sess);
29
30
31/* PJSUA application instance. */
32struct pjsua_data pjsua_var;
33
34
35PJ_DEF(struct pjsua_data*) pjsua_get_var(void)
36{
37 return &pjsua_var;
38}
39
40
41/* Display error */
42PJ_DEF(void) pjsua_perror( const char *sender, const char *title,
43 pj_status_t status)
44{
45 char errmsg[PJ_ERR_MSG_SIZE];
46
47 pj_strerror(status, errmsg, sizeof(errmsg));
48 PJ_LOG(1,(sender, "%s: %s [status=%d]", title, errmsg, status));
49}
50
51
52static void init_data()
53{
54 unsigned i;
55
56 pj_bzero(&pjsua_var, sizeof(pjsua_var));
57
58 for (i=0; i<PJ_ARRAY_SIZE(pjsua_var.acc); ++i)
59 pjsua_var.acc[i].index = i;
60
61 for (i=0; i<PJ_ARRAY_SIZE(pjsua_var.tpdata); ++i)
62 pjsua_var.tpdata[i].index = i;
63
64 pjsua_var.stun_status = PJ_EUNKNOWN;
65 pjsua_var.nat_status = PJ_EPENDING;
66 pj_list_init(&pjsua_var.stun_res);
67 pj_list_init(&pjsua_var.outbound_proxy);
68
69 pjsua_config_default(&pjsua_var.ua_cfg);
70
71 for (i=0; i<PJSUA_MAX_VID_WINS; ++i) {
72 pjsua_vid_win_reset(i);
73 }
74}
75
76
77PJ_DEF(void) pjsua_logging_config_default(pjsua_logging_config *cfg)
78{
79 pj_bzero(cfg, sizeof(*cfg));
80
81 cfg->msg_logging = PJ_TRUE;
82 cfg->level = 5;
83 cfg->console_level = 4;
84 cfg->decor = PJ_LOG_HAS_SENDER | PJ_LOG_HAS_TIME |
85 PJ_LOG_HAS_MICRO_SEC | PJ_LOG_HAS_NEWLINE |
86 PJ_LOG_HAS_SPACE | PJ_LOG_HAS_THREAD_SWC |
87 PJ_LOG_HAS_INDENT;
88#if (defined(PJ_WIN32) && PJ_WIN32 != 0) || (defined(PJ_WIN64) && PJ_WIN64 != 0)
89 cfg->decor |= PJ_LOG_HAS_COLOR;
90#endif
91}
92
93PJ_DEF(void) pjsua_logging_config_dup(pj_pool_t *pool,
94 pjsua_logging_config *dst,
95 const pjsua_logging_config *src)
96{
97 pj_memcpy(dst, src, sizeof(*src));
98 pj_strdup_with_null(pool, &dst->log_filename, &src->log_filename);
99}
100
101PJ_DEF(void) pjsua_config_default(pjsua_config *cfg)
102{
103 pj_bzero(cfg, sizeof(*cfg));
104
105 cfg->max_calls = ((PJSUA_MAX_CALLS) < 4) ? (PJSUA_MAX_CALLS) : 4;
106 cfg->thread_cnt = 1;
107 cfg->nat_type_in_sdp = 1;
108 cfg->stun_ignore_failure = PJ_TRUE;
109 cfg->force_lr = PJ_TRUE;
110 cfg->enable_unsolicited_mwi = PJ_TRUE;
111 cfg->use_srtp = PJSUA_DEFAULT_USE_SRTP;
112 cfg->srtp_secure_signaling = PJSUA_DEFAULT_SRTP_SECURE_SIGNALING;
113 cfg->hangup_forked_call = PJ_TRUE;
114
115 cfg->use_timer = PJSUA_SIP_TIMER_OPTIONAL;
116 pjsip_timer_setting_default(&cfg->timer_setting);
117}
118
119PJ_DEF(void) pjsua_config_dup(pj_pool_t *pool,
120 pjsua_config *dst,
121 const pjsua_config *src)
122{
123 unsigned i;
124
125 pj_memcpy(dst, src, sizeof(*src));
126
127 for (i=0; i<src->outbound_proxy_cnt; ++i) {
128 pj_strdup_with_null(pool, &dst->outbound_proxy[i],
129 &src->outbound_proxy[i]);
130 }
131
132 for (i=0; i<src->cred_count; ++i) {
133 pjsip_cred_dup(pool, &dst->cred_info[i], &src->cred_info[i]);
134 }
135
136 pj_strdup_with_null(pool, &dst->user_agent, &src->user_agent);
137 pj_strdup_with_null(pool, &dst->stun_domain, &src->stun_domain);
138 pj_strdup_with_null(pool, &dst->stun_host, &src->stun_host);
139
140 for (i=0; i<src->stun_srv_cnt; ++i) {
141 pj_strdup_with_null(pool, &dst->stun_srv[i], &src->stun_srv[i]);
142 }
143}
144
145PJ_DEF(void) pjsua_msg_data_init(pjsua_msg_data *msg_data)
146{
147 pj_bzero(msg_data, sizeof(*msg_data));
148 pj_list_init(&msg_data->hdr_list);
149 pjsip_media_type_init(&msg_data->multipart_ctype, NULL, NULL);
150 pj_list_init(&msg_data->multipart_parts);
151}
152
153PJ_DEF(pjsua_msg_data*) pjsua_msg_data_clone(pj_pool_t *pool,
154 const pjsua_msg_data *rhs)
155{
156 pjsua_msg_data *msg_data;
157 const pjsip_hdr *hdr;
158 const pjsip_multipart_part *mpart;
159
160 PJ_ASSERT_RETURN(pool && rhs, NULL);
161
162 msg_data = PJ_POOL_ZALLOC_T(pool, pjsua_msg_data);
163 PJ_ASSERT_RETURN(msg_data != NULL, NULL);
164
165 pj_strdup(pool, &msg_data->target_uri, &rhs->target_uri);
166
167 pj_list_init(&msg_data->hdr_list);
168 hdr = rhs->hdr_list.next;
169 while (hdr != &rhs->hdr_list) {
170 pj_list_push_back(&msg_data->hdr_list, pjsip_hdr_clone(pool, hdr));
171 hdr = hdr->next;
172 }
173
174 pj_strdup(pool, &msg_data->content_type, &rhs->content_type);
175 pj_strdup(pool, &msg_data->msg_body, &rhs->msg_body);
176
177 pjsip_media_type_cp(pool, &msg_data->multipart_ctype,
178 &rhs->multipart_ctype);
179
180 pj_list_init(&msg_data->multipart_parts);
181 mpart = rhs->multipart_parts.next;
182 while (mpart != &rhs->multipart_parts) {
183 pj_list_push_back(&msg_data->multipart_parts,
184 pjsip_multipart_clone_part(pool, mpart));
185 mpart = mpart->next;
186 }
187
188 return msg_data;
189}
190
191PJ_DEF(void) pjsua_transport_config_default(pjsua_transport_config *cfg)
192{
193 pj_bzero(cfg, sizeof(*cfg));
194 pjsip_tls_setting_default(&cfg->tls_setting);
195}
196
197PJ_DEF(void) pjsua_transport_config_dup(pj_pool_t *pool,
198 pjsua_transport_config *dst,
199 const pjsua_transport_config *src)
200{
201 pj_memcpy(dst, src, sizeof(*src));
202 pj_strdup(pool, &dst->public_addr, &src->public_addr);
203 pj_strdup(pool, &dst->bound_addr, &src->bound_addr);
204}
205
206PJ_DEF(void) pjsua_ice_config_from_media_config( pj_pool_t *pool,
207 pjsua_ice_config *dst,
208 const pjsua_media_config *src)
209{
210 PJ_UNUSED_ARG(pool);
211
212 dst->enable_ice = src->enable_ice;
213 dst->ice_max_host_cands = src->ice_max_host_cands;
214 dst->ice_opt = src->ice_opt;
215 dst->ice_no_rtcp = src->ice_no_rtcp;
216 dst->ice_always_update = src->ice_always_update;
217}
218
219PJ_DEF(void) pjsua_ice_config_dup( pj_pool_t *pool,
220 pjsua_ice_config *dst,
221 const pjsua_ice_config *src)
222{
223 PJ_UNUSED_ARG(pool);
224 pj_memcpy(dst, src, sizeof(*src));
225}
226
227PJ_DEF(void) pjsua_turn_config_from_media_config(pj_pool_t *pool,
228 pjsua_turn_config *dst,
229 const pjsua_media_config *src)
230{
231 dst->enable_turn = src->enable_turn;
232 dst->turn_conn_type = src->turn_conn_type;
233 if (pool == NULL) {
234 dst->turn_server = src->turn_server;
235 dst->turn_auth_cred = src->turn_auth_cred;
236 } else {
237 if (pj_stricmp(&dst->turn_server, &src->turn_server))
238 pj_strdup(pool, &dst->turn_server, &src->turn_server);
239 pj_stun_auth_cred_dup(pool, &dst->turn_auth_cred,
240 &src->turn_auth_cred);
241 }
242}
243
244PJ_DEF(void) pjsua_turn_config_dup(pj_pool_t *pool,
245 pjsua_turn_config *dst,
246 const pjsua_turn_config *src)
247{
248 pj_memcpy(dst, src, sizeof(*src));
249 if (pool) {
250 pj_strdup(pool, &dst->turn_server, &src->turn_server);
251 pj_stun_auth_cred_dup(pool, &dst->turn_auth_cred,
252 &src->turn_auth_cred);
253 }
254}
255
256PJ_DEF(void) pjsua_acc_config_default(pjsua_acc_config *cfg)
257{
258 pjsua_media_config med_cfg;
259
260 pj_bzero(cfg, sizeof(*cfg));
261
262 cfg->reg_timeout = PJSUA_REG_INTERVAL;
263 cfg->reg_delay_before_refresh = PJSIP_REGISTER_CLIENT_DELAY_BEFORE_REFRESH;
264 cfg->unreg_timeout = PJSUA_UNREG_TIMEOUT;
265 pjsip_publishc_opt_default(&cfg->publish_opt);
266 cfg->unpublish_max_wait_time_msec = PJSUA_UNPUBLISH_MAX_WAIT_TIME_MSEC;
267 cfg->transport_id = PJSUA_INVALID_ID;
268 cfg->allow_contact_rewrite = PJ_TRUE;
269 cfg->allow_via_rewrite = PJ_TRUE;
270 cfg->require_100rel = pjsua_var.ua_cfg.require_100rel;
271 cfg->use_timer = pjsua_var.ua_cfg.use_timer;
272 cfg->timer_setting = pjsua_var.ua_cfg.timer_setting;
273 cfg->lock_codec = 1;
274 cfg->ka_interval = 15;
275 cfg->ka_data = pj_str("\r\n");
276 cfg->vid_cap_dev = PJMEDIA_VID_DEFAULT_CAPTURE_DEV;
277 cfg->vid_rend_dev = PJMEDIA_VID_DEFAULT_RENDER_DEV;
278#if PJMEDIA_HAS_VIDEO
279 pjmedia_vid_stream_rc_config_default(&cfg->vid_stream_rc_cfg);
280#endif
281 pjsua_transport_config_default(&cfg->rtp_cfg);
282
283 pjsua_media_config_default(&med_cfg);
284 pjsua_ice_config_from_media_config(NULL, &cfg->ice_cfg, &med_cfg);
285 pjsua_turn_config_from_media_config(NULL, &cfg->turn_cfg, &med_cfg);
286
287 cfg->use_srtp = pjsua_var.ua_cfg.use_srtp;
288 cfg->srtp_secure_signaling = pjsua_var.ua_cfg.srtp_secure_signaling;
289 cfg->srtp_optional_dup_offer = pjsua_var.ua_cfg.srtp_optional_dup_offer;
290 cfg->reg_retry_interval = PJSUA_REG_RETRY_INTERVAL;
291 cfg->contact_rewrite_method = PJSUA_CONTACT_REWRITE_METHOD;
292 cfg->use_rfc5626 = PJ_TRUE;
293 cfg->reg_use_proxy = PJSUA_REG_USE_OUTBOUND_PROXY |
294 PJSUA_REG_USE_ACC_PROXY;
295#if defined(PJMEDIA_STREAM_ENABLE_KA) && PJMEDIA_STREAM_ENABLE_KA!=0
296 cfg->use_stream_ka = (PJMEDIA_STREAM_ENABLE_KA != 0);
297#endif
298 pj_list_init(&cfg->reg_hdr_list);
299 pj_list_init(&cfg->sub_hdr_list);
300 cfg->call_hold_type = PJSUA_CALL_HOLD_TYPE_DEFAULT;
301 cfg->register_on_acc_add = PJ_TRUE;
302 cfg->mwi_expires = PJSIP_MWI_DEFAULT_EXPIRES;
303}
304
305PJ_DEF(void) pjsua_buddy_config_default(pjsua_buddy_config *cfg)
306{
307 pj_bzero(cfg, sizeof(*cfg));
308}
309
310PJ_DEF(void) pjsua_media_config_default(pjsua_media_config *cfg)
311{
312 pj_bzero(cfg, sizeof(*cfg));
313
314 cfg->clock_rate = PJSUA_DEFAULT_CLOCK_RATE;
315 cfg->snd_clock_rate = 0;
316 cfg->channel_count = 1;
317 cfg->audio_frame_ptime = PJSUA_DEFAULT_AUDIO_FRAME_PTIME;
318 cfg->max_media_ports = PJSUA_MAX_CONF_PORTS;
319 cfg->has_ioqueue = PJ_TRUE;
320 cfg->thread_cnt = 1;
321 cfg->quality = PJSUA_DEFAULT_CODEC_QUALITY;
322 cfg->ilbc_mode = PJSUA_DEFAULT_ILBC_MODE;
323 cfg->ec_tail_len = PJSUA_DEFAULT_EC_TAIL_LEN;
324 cfg->snd_rec_latency = PJMEDIA_SND_DEFAULT_REC_LATENCY;
325 cfg->snd_play_latency = PJMEDIA_SND_DEFAULT_PLAY_LATENCY;
326 cfg->jb_init = cfg->jb_min_pre = cfg->jb_max_pre = cfg->jb_max = -1;
327 cfg->snd_auto_close_time = 1;
328
329 cfg->ice_max_host_cands = -1;
330 cfg->ice_always_update = PJ_TRUE;
331 pj_ice_sess_options_default(&cfg->ice_opt);
332
333 cfg->turn_conn_type = PJ_TURN_TP_UDP;
334 cfg->vid_preview_enable_native = PJ_TRUE;
335}
336
337/*****************************************************************************
338 * This is a very simple PJSIP module, whose sole purpose is to display
339 * incoming and outgoing messages to log. This module will have priority
340 * higher than transport layer, which means:
341 *
342 * - incoming messages will come to this module first before reaching
343 * transaction layer.
344 *
345 * - outgoing messages will come to this module last, after the message
346 * has been 'printed' to contiguous buffer by transport layer and
347 * appropriate transport instance has been decided for this message.
348 *
349 */
350
351/* Notification on incoming messages */
352static pj_bool_t logging_on_rx_msg(pjsip_rx_data *rdata)
353{
354 PJ_LOG(4,(THIS_FILE, "RX %d bytes %s from %s %s:%d:\n"
355 "%.*s\n"
356 "--end msg--",
357 rdata->msg_info.len,
358 pjsip_rx_data_get_info(rdata),
359 rdata->tp_info.transport->type_name,
360 rdata->pkt_info.src_name,
361 rdata->pkt_info.src_port,
362 (int)rdata->msg_info.len,
363 rdata->msg_info.msg_buf));
364
365 /* Always return false, otherwise messages will not get processed! */
366 return PJ_FALSE;
367}
368
369/* Notification on outgoing messages */
370static pj_status_t logging_on_tx_msg(pjsip_tx_data *tdata)
371{
372
373 /* Important note:
374 * tp_info field is only valid after outgoing messages has passed
375 * transport layer. So don't try to access tp_info when the module
376 * has lower priority than transport layer.
377 */
378
379 PJ_LOG(4,(THIS_FILE, "TX %d bytes %s to %s %s:%d:\n"
380 "%.*s\n"
381 "--end msg--",
382 (tdata->buf.cur - tdata->buf.start),
383 pjsip_tx_data_get_info(tdata),
384 tdata->tp_info.transport->type_name,
385 tdata->tp_info.dst_name,
386 tdata->tp_info.dst_port,
387 (int)(tdata->buf.cur - tdata->buf.start),
388 tdata->buf.start));
389
390 /* Always return success, otherwise message will not get sent! */
391 return PJ_SUCCESS;
392}
393
394/* The module instance. */
395static pjsip_module pjsua_msg_logger =
396{
397 NULL, NULL, /* prev, next. */
398 { "mod-pjsua-log", 13 }, /* Name. */
399 -1, /* Id */
400 PJSIP_MOD_PRIORITY_TRANSPORT_LAYER-1,/* Priority */
401 NULL, /* load() */
402 NULL, /* start() */
403 NULL, /* stop() */
404 NULL, /* unload() */
405 &logging_on_rx_msg, /* on_rx_request() */
406 &logging_on_rx_msg, /* on_rx_response() */
407 &logging_on_tx_msg, /* on_tx_request. */
408 &logging_on_tx_msg, /* on_tx_response() */
409 NULL, /* on_tsx_state() */
410
411};
412
413
414/*****************************************************************************
415 * Another simple module to handle incoming OPTIONS request
416 */
417
418/* Notification on incoming request */
419static pj_bool_t options_on_rx_request(pjsip_rx_data *rdata)
420{
421 pjsip_tx_data *tdata;
422 pjsip_response_addr res_addr;
423 const pjsip_hdr *cap_hdr;
424 pj_status_t status;
425
426 /* Only want to handle OPTIONS requests */
427 if (pjsip_method_cmp(&rdata->msg_info.msg->line.req.method,
428 pjsip_get_options_method()) != 0)
429 {
430 return PJ_FALSE;
431 }
432
433 /* Don't want to handle if shutdown is in progress */
434 if (pjsua_var.thread_quit_flag) {
435 pjsip_endpt_respond_stateless(pjsua_var.endpt, rdata,
436 PJSIP_SC_TEMPORARILY_UNAVAILABLE, NULL,
437 NULL, NULL);
438 return PJ_TRUE;
439 }
440
441 /* Create basic response. */
442 status = pjsip_endpt_create_response(pjsua_var.endpt, rdata, 200, NULL,
443 &tdata);
444 if (status != PJ_SUCCESS) {
445 pjsua_perror(THIS_FILE, "Unable to create OPTIONS response", status);
446 return PJ_TRUE;
447 }
448
449 /* Add Allow header */
450 cap_hdr = pjsip_endpt_get_capability(pjsua_var.endpt, PJSIP_H_ALLOW, NULL);
451 if (cap_hdr) {
452 pjsip_msg_add_hdr(tdata->msg,
453 (pjsip_hdr*) pjsip_hdr_clone(tdata->pool, cap_hdr));
454 }
455
456 /* Add Accept header */
457 cap_hdr = pjsip_endpt_get_capability(pjsua_var.endpt, PJSIP_H_ACCEPT, NULL);
458 if (cap_hdr) {
459 pjsip_msg_add_hdr(tdata->msg,
460 (pjsip_hdr*) pjsip_hdr_clone(tdata->pool, cap_hdr));
461 }
462
463 /* Add Supported header */
464 cap_hdr = pjsip_endpt_get_capability(pjsua_var.endpt, PJSIP_H_SUPPORTED, NULL);
465 if (cap_hdr) {
466 pjsip_msg_add_hdr(tdata->msg,
467 (pjsip_hdr*) pjsip_hdr_clone(tdata->pool, cap_hdr));
468 }
469
470 /* Add Allow-Events header from the evsub module */
471 cap_hdr = pjsip_evsub_get_allow_events_hdr(NULL);
472 if (cap_hdr) {
473 pjsip_msg_add_hdr(tdata->msg,
474 (pjsip_hdr*) pjsip_hdr_clone(tdata->pool, cap_hdr));
475 }
476
477 /* Add User-Agent header */
478 if (pjsua_var.ua_cfg.user_agent.slen) {
479 const pj_str_t USER_AGENT = { "User-Agent", 10};
480 pjsip_hdr *h;
481
482 h = (pjsip_hdr*) pjsip_generic_string_hdr_create(tdata->pool,
483 &USER_AGENT,
484 &pjsua_var.ua_cfg.user_agent);
485 pjsip_msg_add_hdr(tdata->msg, h);
486 }
487
488 /* Get media socket info, make sure transport is ready */
489#if DISABLED_FOR_TICKET_1185
490 if (pjsua_var.calls[0].med_tp) {
491 pjmedia_transport_info tpinfo;
492 pjmedia_sdp_session *sdp;
493
494 pjmedia_transport_info_init(&tpinfo);
495 pjmedia_transport_get_info(pjsua_var.calls[0].med_tp, &tpinfo);
496
497 /* Add SDP body, using call0's RTP address */
498 status = pjmedia_endpt_create_sdp(pjsua_var.med_endpt, tdata->pool, 1,
499 &tpinfo.sock_info, &sdp);
500 if (status == PJ_SUCCESS) {
501 pjsip_create_sdp_body(tdata->pool, sdp, &tdata->msg->body);
502 }
503 }
504#endif
505
506 /* Send response */
507 pjsip_get_response_addr(tdata->pool, rdata, &res_addr);
508 status = pjsip_endpt_send_response(pjsua_var.endpt, &res_addr, tdata, NULL, NULL);
509 if (status != PJ_SUCCESS)
510 pjsip_tx_data_dec_ref(tdata);
511
512 return PJ_TRUE;
513}
514
515
516/* The module instance. */
517static pjsip_module pjsua_options_handler =
518{
519 NULL, NULL, /* prev, next. */
520 { "mod-pjsua-options", 17 }, /* Name. */
521 -1, /* Id */
522 PJSIP_MOD_PRIORITY_APPLICATION, /* Priority */
523 NULL, /* load() */
524 NULL, /* start() */
525 NULL, /* stop() */
526 NULL, /* unload() */
527 &options_on_rx_request, /* on_rx_request() */
528 NULL, /* on_rx_response() */
529 NULL, /* on_tx_request. */
530 NULL, /* on_tx_response() */
531 NULL, /* on_tsx_state() */
532
533};
534
535
536/*****************************************************************************
537 * These two functions are the main callbacks registered to PJSIP stack
538 * to receive SIP request and response messages that are outside any
539 * dialogs and any transactions.
540 */
541
542/*
543 * Handler for receiving incoming requests.
544 *
545 * This handler serves multiple purposes:
546 * - it receives requests outside dialogs.
547 * - it receives requests inside dialogs, when the requests are
548 * unhandled by other dialog usages. Example of these
549 * requests are: MESSAGE.
550 */
551static pj_bool_t mod_pjsua_on_rx_request(pjsip_rx_data *rdata)
552{
553 pj_bool_t processed = PJ_FALSE;
554
555 PJSUA_LOCK();
556
557 if (rdata->msg_info.msg->line.req.method.id == PJSIP_INVITE_METHOD) {
558
559 processed = pjsua_call_on_incoming(rdata);
560 }
561
562 PJSUA_UNLOCK();
563
564 return processed;
565}
566
567
568/*
569 * Handler for receiving incoming responses.
570 *
571 * This handler serves multiple purposes:
572 * - it receives strayed responses (i.e. outside any dialog and
573 * outside any transactions).
574 * - it receives responses coming to a transaction, when pjsua
575 * module is set as transaction user for the transaction.
576 * - it receives responses inside a dialog, when these responses
577 * are unhandled by other dialog usages.
578 */
579static pj_bool_t mod_pjsua_on_rx_response(pjsip_rx_data *rdata)
580{
581 PJ_UNUSED_ARG(rdata);
582 return PJ_FALSE;
583}
584
585
586/*****************************************************************************
587 * Logging.
588 */
589
590/* Log callback */
591static void log_writer(int level, const char *buffer, int len)
592{
593 /* Write to file, stdout or application callback. */
594
595 if (pjsua_var.log_file) {
596 pj_ssize_t size = len;
597 pj_file_write(pjsua_var.log_file, buffer, &size);
598 /* This will slow things down considerably! Don't do it!
599 pj_file_flush(pjsua_var.log_file);
600 */
601 }
602
603 if (level <= (int)pjsua_var.log_cfg.console_level) {
604 if (pjsua_var.log_cfg.cb)
605 (*pjsua_var.log_cfg.cb)(level, buffer, len);
606 else
607 pj_log_write(level, buffer, len);
608 }
609}
610
611
612/*
613 * Application can call this function at any time (after pjsua_create(), of
614 * course) to change logging settings.
615 */
616PJ_DEF(pj_status_t) pjsua_reconfigure_logging(const pjsua_logging_config *cfg)
617{
618 pj_status_t status;
619
620 /* Save config. */
621 pjsua_logging_config_dup(pjsua_var.pool, &pjsua_var.log_cfg, cfg);
622
623 /* Redirect log function to ours */
624 pj_log_set_log_func( &log_writer );
625
626 /* Set decor */
627 pj_log_set_decor(pjsua_var.log_cfg.decor);
628
629 /* Set log level */
630 pj_log_set_level(pjsua_var.log_cfg.level);
631
632 /* Close existing file, if any */
633 if (pjsua_var.log_file) {
634 pj_file_close(pjsua_var.log_file);
635 pjsua_var.log_file = NULL;
636 }
637
638 /* If output log file is desired, create the file: */
639 if (pjsua_var.log_cfg.log_filename.slen) {
640 unsigned flags = PJ_O_WRONLY;
641 flags |= pjsua_var.log_cfg.log_file_flags;
642 status = pj_file_open(pjsua_var.pool,
643 pjsua_var.log_cfg.log_filename.ptr,
644 flags,
645 &pjsua_var.log_file);
646
647 if (status != PJ_SUCCESS) {
648 pjsua_perror(THIS_FILE, "Error creating log file", status);
649 return status;
650 }
651 }
652
653 /* Unregister msg logging if it's previously registered */
654 if (pjsua_msg_logger.id >= 0) {
655 pjsip_endpt_unregister_module(pjsua_var.endpt, &pjsua_msg_logger);
656 pjsua_msg_logger.id = -1;
657 }
658
659 /* Enable SIP message logging */
660 if (pjsua_var.log_cfg.msg_logging)
661 pjsip_endpt_register_module(pjsua_var.endpt, &pjsua_msg_logger);
662
663 return PJ_SUCCESS;
664}
665
666
667/*****************************************************************************
668 * PJSUA Base API.
669 */
670
671/* Worker thread function. */
672static int worker_thread(void *arg)
673{
674 enum { TIMEOUT = 10 };
675
676 PJ_UNUSED_ARG(arg);
677
678 while (!pjsua_var.thread_quit_flag) {
679 int count;
680
681 count = pjsua_handle_events(TIMEOUT);
682 if (count < 0)
683 pj_thread_sleep(TIMEOUT);
684 }
685
686 return 0;
687}
688
689
690/* Init random seed */
691static void init_random_seed(void)
692{
693 pj_sockaddr addr;
694 const pj_str_t *hostname;
695 pj_uint32_t pid;
696 pj_time_val t;
697 unsigned seed=0;
698
699 /* Add hostname */
700 hostname = pj_gethostname();
701 seed = pj_hash_calc(seed, hostname->ptr, (int)hostname->slen);
702
703 /* Add primary IP address */
704 if (pj_gethostip(pj_AF_INET(), &addr)==PJ_SUCCESS)
705 seed = pj_hash_calc(seed, &addr.ipv4.sin_addr, 4);
706
707 /* Get timeofday */
708 pj_gettimeofday(&t);
709 seed = pj_hash_calc(seed, &t, sizeof(t));
710
711 /* Add PID */
712 pid = pj_getpid();
713 seed = pj_hash_calc(seed, &pid, sizeof(pid));
714
715 /* Init random seed */
716 pj_srand(seed);
717}
718
719/*
720 * Instantiate pjsua application.
721 */
722PJ_DEF(pj_status_t) pjsua_create(void)
723{
724 pj_status_t status;
725
726 /* Init pjsua data */
727 init_data();
728
729 /* Set default logging settings */
730 pjsua_logging_config_default(&pjsua_var.log_cfg);
731
732 /* Init PJLIB: */
733 status = pj_init();
734 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
735
736 pj_log_push_indent();
737
738 /* Init random seed */
739 init_random_seed();
740
741 /* Init PJLIB-UTIL: */
742 status = pjlib_util_init();
743 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
744
745 /* Init PJNATH */
746 status = pjnath_init();
747 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
748
749 /* Set default sound device ID */
750 pjsua_var.cap_dev = PJMEDIA_AUD_DEFAULT_CAPTURE_DEV;
751 pjsua_var.play_dev = PJMEDIA_AUD_DEFAULT_PLAYBACK_DEV;
752
753 /* Set default video device ID */
754 pjsua_var.vcap_dev = PJMEDIA_VID_DEFAULT_CAPTURE_DEV;
755 pjsua_var.vrdr_dev = PJMEDIA_VID_DEFAULT_RENDER_DEV;
756
757 /* Init caching pool. */
758 pj_caching_pool_init(&pjsua_var.cp, NULL, 0);
759
760 /* Create memory pool for application. */
761 pjsua_var.pool = pjsua_pool_create("pjsua", 1000, 1000);
762
763 PJ_ASSERT_RETURN(pjsua_var.pool, PJ_ENOMEM);
764
765 /* Create mutex */
766 status = pj_mutex_create_recursive(pjsua_var.pool, "pjsua",
767 &pjsua_var.mutex);
768 if (status != PJ_SUCCESS) {
769 pj_log_pop_indent();
770 pjsua_perror(THIS_FILE, "Unable to create mutex", status);
771 return status;
772 }
773
774 /* Must create SIP endpoint to initialize SIP parser. The parser
775 * is needed for example when application needs to call pjsua_verify_url().
776 */
777 status = pjsip_endpt_create(&pjsua_var.cp.factory,
778 pj_gethostname()->ptr,
779 &pjsua_var.endpt);
780 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
781
782 /* Init timer entry list */
783 pj_list_init(&pjsua_var.timer_list);
784
785 /* Create timer mutex */
786 status = pj_mutex_create_recursive(pjsua_var.pool, "pjsua_timer",
787 &pjsua_var.timer_mutex);
788 if (status != PJ_SUCCESS) {
789 pj_log_pop_indent();
790 pjsua_perror(THIS_FILE, "Unable to create mutex", status);
791 return status;
792 }
793
794 pjsua_set_state(PJSUA_STATE_CREATED);
795 pj_log_pop_indent();
796 return PJ_SUCCESS;
797}
798
799
800/*
801 * Initialize pjsua with the specified settings. All the settings are
802 * optional, and the default values will be used when the config is not
803 * specified.
804 */
805PJ_DEF(pj_status_t) pjsua_init( const pjsua_config *ua_cfg,
806 const pjsua_logging_config *log_cfg,
807 const pjsua_media_config *media_cfg)
808{
809 pjsua_config default_cfg;
810 pjsua_media_config default_media_cfg;
811 const pj_str_t STR_OPTIONS = { "OPTIONS", 7 };
812 pjsip_ua_init_param ua_init_param;
813 unsigned i;
814 pj_status_t status;
815
816 pj_log_push_indent();
817
818 /* Create default configurations when the config is not supplied */
819
820 if (ua_cfg == NULL) {
821 pjsua_config_default(&default_cfg);
822 ua_cfg = &default_cfg;
823 }
824
825 if (media_cfg == NULL) {
826 pjsua_media_config_default(&default_media_cfg);
827 media_cfg = &default_media_cfg;
828 }
829
830 /* Initialize logging first so that info/errors can be captured */
831 if (log_cfg) {
832 status = pjsua_reconfigure_logging(log_cfg);
833 if (status != PJ_SUCCESS)
834 goto on_error;
835 }
836
837#if defined(PJ_IPHONE_OS_HAS_MULTITASKING_SUPPORT) && \
838 PJ_IPHONE_OS_HAS_MULTITASKING_SUPPORT != 0
839 if (!(pj_get_sys_info()->flags & PJ_SYS_HAS_IOS_BG)) {
840 PJ_LOG(5, (THIS_FILE, "Device does not support "
841 "background mode"));
842 pj_activesock_enable_iphone_os_bg(PJ_FALSE);
843 }
844#endif
845
846 /* If nameserver is configured, create DNS resolver instance and
847 * set it to be used by SIP resolver.
848 */
849 if (ua_cfg->nameserver_count) {
850#if PJSIP_HAS_RESOLVER
851 unsigned i;
852
853 /* Create DNS resolver */
854 status = pjsip_endpt_create_resolver(pjsua_var.endpt,
855 &pjsua_var.resolver);
856 if (status != PJ_SUCCESS) {
857 pjsua_perror(THIS_FILE, "Error creating resolver", status);
858 goto on_error;
859 }
860
861 /* Configure nameserver for the DNS resolver */
862 status = pj_dns_resolver_set_ns(pjsua_var.resolver,
863 ua_cfg->nameserver_count,
864 ua_cfg->nameserver, NULL);
865 if (status != PJ_SUCCESS) {
866 pjsua_perror(THIS_FILE, "Error setting nameserver", status);
867 goto on_error;
868 }
869
870 /* Set this DNS resolver to be used by the SIP resolver */
871 status = pjsip_endpt_set_resolver(pjsua_var.endpt, pjsua_var.resolver);
872 if (status != PJ_SUCCESS) {
873 pjsua_perror(THIS_FILE, "Error setting DNS resolver", status);
874 goto on_error;
875 }
876
877 /* Print nameservers */
878 for (i=0; i<ua_cfg->nameserver_count; ++i) {
879 PJ_LOG(4,(THIS_FILE, "Nameserver %.*s added",
880 (int)ua_cfg->nameserver[i].slen,
881 ua_cfg->nameserver[i].ptr));
882 }
883#else
884 PJ_LOG(2,(THIS_FILE,
885 "DNS resolver is disabled (PJSIP_HAS_RESOLVER==0)"));
886#endif
887 }
888
889 /* Init SIP UA: */
890
891 /* Initialize transaction layer: */
892 status = pjsip_tsx_layer_init_module(pjsua_var.endpt);
893 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
894
895
896 /* Initialize UA layer module: */
897 pj_bzero(&ua_init_param, sizeof(ua_init_param));
898 if (ua_cfg->hangup_forked_call) {
899 ua_init_param.on_dlg_forked = &on_dlg_forked;
900 }
901 status = pjsip_ua_init_module( pjsua_var.endpt, &ua_init_param);
902 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
903
904
905 /* Initialize Replaces support. */
906 status = pjsip_replaces_init_module( pjsua_var.endpt );
907 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
908
909 /* Initialize 100rel support */
910 status = pjsip_100rel_init_module(pjsua_var.endpt);
911 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
912
913 /* Initialize session timer support */
914 status = pjsip_timer_init_module(pjsua_var.endpt);
915 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
916
917 /* Initialize and register PJSUA application module. */
918 {
919 const pjsip_module mod_initializer =
920 {
921 NULL, NULL, /* prev, next. */
922 { "mod-pjsua", 9 }, /* Name. */
923 -1, /* Id */
924 PJSIP_MOD_PRIORITY_APPLICATION, /* Priority */
925 NULL, /* load() */
926 NULL, /* start() */
927 NULL, /* stop() */
928 NULL, /* unload() */
929 &mod_pjsua_on_rx_request, /* on_rx_request() */
930 &mod_pjsua_on_rx_response, /* on_rx_response() */
931 NULL, /* on_tx_request. */
932 NULL, /* on_tx_response() */
933 NULL, /* on_tsx_state() */
934 };
935
936 pjsua_var.mod = mod_initializer;
937
938 status = pjsip_endpt_register_module(pjsua_var.endpt, &pjsua_var.mod);
939 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
940 }
941
942 /* Parse outbound proxies */
943 for (i=0; i<ua_cfg->outbound_proxy_cnt; ++i) {
944 pj_str_t tmp;
945 pj_str_t hname = { "Route", 5};
946 pjsip_route_hdr *r;
947
948 pj_strdup_with_null(pjsua_var.pool, &tmp, &ua_cfg->outbound_proxy[i]);
949
950 r = (pjsip_route_hdr*)
951 pjsip_parse_hdr(pjsua_var.pool, &hname, tmp.ptr,
952 (unsigned)tmp.slen, NULL);
953 if (r == NULL) {
954 pjsua_perror(THIS_FILE, "Invalid outbound proxy URI",
955 PJSIP_EINVALIDURI);
956 status = PJSIP_EINVALIDURI;
957 goto on_error;
958 }
959
960 if (pjsua_var.ua_cfg.force_lr) {
961 pjsip_sip_uri *sip_url;
962 if (!PJSIP_URI_SCHEME_IS_SIP(r->name_addr.uri) &&
963 !PJSIP_URI_SCHEME_IS_SIPS(r->name_addr.uri))
964 {
965 status = PJSIP_EINVALIDSCHEME;
966 goto on_error;
967 }
968 sip_url = (pjsip_sip_uri*)r->name_addr.uri;
969 sip_url->lr_param = 1;
970 }
971
972 pj_list_push_back(&pjsua_var.outbound_proxy, r);
973 }
974
975
976 /* Initialize PJSUA call subsystem: */
977 status = pjsua_call_subsys_init(ua_cfg);
978 if (status != PJ_SUCCESS)
979 goto on_error;
980
981 /* Convert deprecated STUN settings */
982 if (pjsua_var.ua_cfg.stun_srv_cnt==0) {
983 if (pjsua_var.ua_cfg.stun_domain.slen) {
984 pjsua_var.ua_cfg.stun_srv[pjsua_var.ua_cfg.stun_srv_cnt++] =
985 pjsua_var.ua_cfg.stun_domain;
986 }
987 if (pjsua_var.ua_cfg.stun_host.slen) {
988 pjsua_var.ua_cfg.stun_srv[pjsua_var.ua_cfg.stun_srv_cnt++] =
989 pjsua_var.ua_cfg.stun_host;
990 }
991 }
992
993 /* Start resolving STUN server */
994 status = resolve_stun_server(PJ_FALSE);
995 if (status != PJ_SUCCESS && status != PJ_EPENDING) {
996 pjsua_perror(THIS_FILE, "Error resolving STUN server", status);
997 goto on_error;
998 }
999
1000 /* Initialize PJSUA media subsystem */
1001 status = pjsua_media_subsys_init(media_cfg);
1002 if (status != PJ_SUCCESS)
1003 goto on_error;
1004
1005
1006 /* Init core SIMPLE module : */
1007 status = pjsip_evsub_init_module(pjsua_var.endpt);
1008 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
1009
1010
1011 /* Init presence module: */
1012 status = pjsip_pres_init_module( pjsua_var.endpt, pjsip_evsub_instance());
1013 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
1014
1015 /* Initialize MWI support */
1016 status = pjsip_mwi_init_module(pjsua_var.endpt, pjsip_evsub_instance());
1017
1018 /* Init PUBLISH module */
1019 pjsip_publishc_init_module(pjsua_var.endpt);
1020
1021 /* Init xfer/REFER module */
1022 status = pjsip_xfer_init_module( pjsua_var.endpt );
1023 PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
1024
1025 /* Init pjsua presence handler: */
1026 status = pjsua_pres_init();
1027 if (status != PJ_SUCCESS)
1028 goto on_error;
1029
1030 /* Init out-of-dialog MESSAGE request handler. */
1031 status = pjsua_im_init();
1032 if (status != PJ_SUCCESS)
1033 goto on_error;
1034
1035 /* Register OPTIONS handler */
1036 pjsip_endpt_register_module(pjsua_var.endpt, &pjsua_options_handler);
1037
1038 /* Add OPTIONS in Allow header */
1039 pjsip_endpt_add_capability(pjsua_var.endpt, NULL, PJSIP_H_ALLOW,
1040 NULL, 1, &STR_OPTIONS);
1041
1042 /* Start worker thread if needed. */
1043 if (pjsua_var.ua_cfg.thread_cnt) {
1044 unsigned i;
1045
1046 if (pjsua_var.ua_cfg.thread_cnt > PJ_ARRAY_SIZE(pjsua_var.thread))
1047 pjsua_var.ua_cfg.thread_cnt = PJ_ARRAY_SIZE(pjsua_var.thread);
1048
1049 for (i=0; i<pjsua_var.ua_cfg.thread_cnt; ++i) {
1050 status = pj_thread_create(pjsua_var.pool, "pjsua", &worker_thread,
1051 NULL, 0, 0, &pjsua_var.thread[i]);
1052 if (status != PJ_SUCCESS)
1053 goto on_error;
1054 }
1055 PJ_LOG(4,(THIS_FILE, "%d SIP worker threads created",
1056 pjsua_var.ua_cfg.thread_cnt));
1057 } else {
1058 PJ_LOG(4,(THIS_FILE, "No SIP worker threads created"));
1059 }
1060
1061 /* Done! */
1062
1063 PJ_LOG(3,(THIS_FILE, "pjsua version %s for %s initialized",
1064 pj_get_version(), pj_get_sys_info()->info.ptr));
1065
1066 pjsua_set_state(PJSUA_STATE_INIT);
1067 pj_log_pop_indent();
1068 return PJ_SUCCESS;
1069
1070on_error:
1071 pjsua_destroy();
1072 pj_log_pop_indent();
1073 return status;
1074}
1075
1076
1077/* Sleep with polling */
1078static void busy_sleep(unsigned msec)
1079{
1080 pj_time_val timeout, now;
1081
1082 pj_gettickcount(&timeout);
1083 timeout.msec += msec;
1084 pj_time_val_normalize(&timeout);
1085
1086 do {
1087 int i;
1088 i = msec / 10;
1089 while (pjsua_handle_events(10) > 0 && i > 0)
1090 --i;
1091 pj_gettickcount(&now);
1092 } while (PJ_TIME_VAL_LT(now, timeout));
1093}
1094
1095static void stun_resolve_add_ref(pjsua_stun_resolve *sess)
1096{
1097 ++sess->ref_cnt;
1098}
1099
1100static void destroy_stun_resolve(pjsua_stun_resolve *sess)
1101{
1102 sess->destroy_flag = PJ_TRUE;
1103 if (sess->ref_cnt > 0)
1104 return;
1105
1106 PJSUA_LOCK();
1107 pj_list_erase(sess);
1108 PJSUA_UNLOCK();
1109
1110 pj_assert(sess->stun_sock==NULL);
1111 pj_pool_release(sess->pool);
1112}
1113
1114static void stun_resolve_dec_ref(pjsua_stun_resolve *sess)
1115{
1116 --sess->ref_cnt;
1117 if (sess->ref_cnt <= 0 && sess->destroy_flag)
1118 destroy_stun_resolve(sess);
1119}
1120
1121
1122/* This is the internal function to be called when STUN resolution
1123 * session (pj_stun_resolve) has completed.
1124 */
1125static void stun_resolve_complete(pjsua_stun_resolve *sess)
1126{
1127 pj_stun_resolve_result result;
1128
1129 if (sess->has_result)
1130 goto on_return;
1131
1132 pj_bzero(&result, sizeof(result));
1133 result.token = sess->token;
1134 result.status = sess->status;
1135 result.name = sess->srv[sess->idx];
1136 pj_memcpy(&result.addr, &sess->addr, sizeof(result.addr));
1137 sess->has_result = PJ_TRUE;
1138
1139 if (result.status == PJ_SUCCESS) {
1140 char addr[PJ_INET6_ADDRSTRLEN+10];
1141 pj_sockaddr_print(&result.addr, addr, sizeof(addr), 3);
1142 PJ_LOG(4,(THIS_FILE,
1143 "STUN resolution success, using %.*s, address is %s",
1144 (int)sess->srv[sess->idx].slen,
1145 sess->srv[sess->idx].ptr,
1146 addr));
1147 } else {
1148 char errmsg[PJ_ERR_MSG_SIZE];
1149 pj_strerror(result.status, errmsg, sizeof(errmsg));
1150 PJ_LOG(1,(THIS_FILE, "STUN resolution failed: %s", errmsg));
1151 }
1152
1153 stun_resolve_add_ref(sess);
1154 sess->cb(&result);
1155 stun_resolve_dec_ref(sess);
1156
1157on_return:
1158 if (!sess->blocking) {
1159 destroy_stun_resolve(sess);
1160 }
1161}
1162
1163/* This is the callback called by the STUN socket (pj_stun_sock)
1164 * to report it's state. We use this as part of testing the
1165 * STUN server.
1166 */
1167static pj_bool_t test_stun_on_status(pj_stun_sock *stun_sock,
1168 pj_stun_sock_op op,
1169 pj_status_t status)
1170{
1171 pjsua_stun_resolve *sess;
1172
1173 sess = (pjsua_stun_resolve*) pj_stun_sock_get_user_data(stun_sock);
1174 pj_assert(stun_sock == sess->stun_sock);
1175
1176 if (status != PJ_SUCCESS) {
1177 char errmsg[PJ_ERR_MSG_SIZE];
1178 pj_strerror(status, errmsg, sizeof(errmsg));
1179
1180 PJ_LOG(4,(THIS_FILE, "STUN resolution for %.*s failed: %s",
1181 (int)sess->srv[sess->idx].slen,
1182 sess->srv[sess->idx].ptr, errmsg));
1183
1184 sess->status = status;
1185
1186 pj_stun_sock_destroy(stun_sock);
1187 sess->stun_sock = NULL;
1188
1189 ++sess->idx;
1190 resolve_stun_entry(sess);
1191
1192 return PJ_FALSE;
1193
1194 } else if (op == PJ_STUN_SOCK_BINDING_OP) {
1195 pj_stun_sock_info ssi;
1196
1197 pj_stun_sock_get_info(stun_sock, &ssi);
1198 pj_memcpy(&sess->addr, &ssi.srv_addr, sizeof(sess->addr));
1199
1200 sess->status = PJ_SUCCESS;
1201 pj_stun_sock_destroy(stun_sock);
1202 sess->stun_sock = NULL;
1203
1204 stun_resolve_complete(sess);
1205
1206 return PJ_FALSE;
1207
1208 } else
1209 return PJ_TRUE;
1210
1211}
1212
1213/* This is an internal function to resolve and test current
1214 * server entry in pj_stun_resolve session. It is called by
1215 * pjsua_resolve_stun_servers() and test_stun_on_status() above
1216 */
1217static void resolve_stun_entry(pjsua_stun_resolve *sess)
1218{
1219 stun_resolve_add_ref(sess);
1220
1221 /* Loop while we have entry to try */
1222 for (; sess->idx < sess->count; ++sess->idx) {
1223 const int af = pj_AF_INET();
1224 char target[64];
1225 pj_str_t hostpart;
1226 pj_uint16_t port;
1227 pj_stun_sock_cb stun_sock_cb;
1228
1229 pj_assert(sess->idx < sess->count);
1230
1231 pj_ansi_snprintf(target, sizeof(target), "%.*s",
1232 (int)sess->srv[sess->idx].slen,
1233 sess->srv[sess->idx].ptr);
1234
1235 /* Parse the server entry into host:port */
1236 sess->status = pj_sockaddr_parse2(af, 0, &sess->srv[sess->idx],
1237 &hostpart, &port, NULL);
1238 if (sess->status != PJ_SUCCESS) {
1239 PJ_LOG(2,(THIS_FILE, "Invalid STUN server entry %s", target));
1240 continue;
1241 }
1242
1243 /* Use default port if not specified */
1244 if (port == 0)
1245 port = PJ_STUN_PORT;
1246
1247 pj_assert(sess->stun_sock == NULL);
1248
1249 PJ_LOG(4,(THIS_FILE, "Trying STUN server %s (%d of %d)..",
1250 target, sess->idx+1, sess->count));
1251
1252 /* Use STUN_sock to test this entry */
1253 pj_bzero(&stun_sock_cb, sizeof(stun_sock_cb));
1254 stun_sock_cb.on_status = &test_stun_on_status;
1255 sess->status = pj_stun_sock_create(&pjsua_var.stun_cfg, "stunresolve",
1256 pj_AF_INET(), &stun_sock_cb,
1257 NULL, sess, &sess->stun_sock);
1258 if (sess->status != PJ_SUCCESS) {
1259 char errmsg[PJ_ERR_MSG_SIZE];
1260 pj_strerror(sess->status, errmsg, sizeof(errmsg));
1261 PJ_LOG(4,(THIS_FILE,
1262 "Error creating STUN socket for %s: %s",
1263 target, errmsg));
1264
1265 continue;
1266 }
1267
1268 sess->status = pj_stun_sock_start(sess->stun_sock, &hostpart,
1269 port, pjsua_var.resolver);
1270 if (sess->status != PJ_SUCCESS) {
1271 char errmsg[PJ_ERR_MSG_SIZE];
1272 pj_strerror(sess->status, errmsg, sizeof(errmsg));
1273 PJ_LOG(4,(THIS_FILE,
1274 "Error starting STUN socket for %s: %s",
1275 target, errmsg));
1276
1277 if (sess->stun_sock) {
1278 pj_stun_sock_destroy(sess->stun_sock);
1279 sess->stun_sock = NULL;
1280 }
1281 continue;
1282 }
1283
1284 /* Done for now, testing will resume/complete asynchronously in
1285 * stun_sock_cb()
1286 */
1287 goto on_return;
1288 }
1289
1290 if (sess->idx >= sess->count) {
1291 /* No more entries to try */
1292 PJ_ASSERT_ON_FAIL(sess->status != PJ_SUCCESS,
1293 sess->status = PJ_EUNKNOWN);
1294 stun_resolve_complete(sess);
1295 }
1296
1297on_return:
1298 stun_resolve_dec_ref(sess);
1299}
1300
1301
1302/*
1303 * Resolve STUN server.
1304 */
1305PJ_DEF(pj_status_t) pjsua_resolve_stun_servers( unsigned count,
1306 pj_str_t srv[],
1307 pj_bool_t wait,
1308 void *token,
1309 pj_stun_resolve_cb cb)
1310{
1311 pj_pool_t *pool;
1312 pjsua_stun_resolve *sess;
1313 pj_status_t status;
1314 unsigned i;
1315
1316 PJ_ASSERT_RETURN(count && srv && cb, PJ_EINVAL);
1317
1318 pool = pjsua_pool_create("stunres", 256, 256);
1319 if (!pool)
1320 return PJ_ENOMEM;
1321
1322 sess = PJ_POOL_ZALLOC_T(pool, pjsua_stun_resolve);
1323 sess->pool = pool;
1324 sess->token = token;
1325 sess->cb = cb;
1326 sess->count = count;
1327 sess->blocking = wait;
1328 sess->status = PJ_EPENDING;
1329 sess->srv = (pj_str_t*) pj_pool_calloc(pool, count, sizeof(pj_str_t));
1330 for (i=0; i<count; ++i) {
1331 pj_strdup(pool, &sess->srv[i], &srv[i]);
1332 }
1333
1334 PJSUA_LOCK();
1335 pj_list_push_back(&pjsua_var.stun_res, sess);
1336 PJSUA_UNLOCK();
1337
1338 resolve_stun_entry(sess);
1339
1340 if (!wait)
1341 return PJ_SUCCESS;
1342
1343 while (sess->status == PJ_EPENDING) {
1344 pjsua_handle_events(50);
1345 }
1346
1347 status = sess->status;
1348 destroy_stun_resolve(sess);
1349
1350 return status;
1351}
1352
1353/*
1354 * Cancel pending STUN resolution.
1355 */
1356PJ_DEF(pj_status_t) pjsua_cancel_stun_resolution( void *token,
1357 pj_bool_t notify_cb)
1358{
1359 pjsua_stun_resolve *sess;
1360 unsigned cancelled_count = 0;
1361
1362 PJSUA_LOCK();
1363 sess = pjsua_var.stun_res.next;
1364 while (sess != &pjsua_var.stun_res) {
1365 pjsua_stun_resolve *next = sess->next;
1366
1367 if (sess->token == token) {
1368 if (notify_cb) {
1369 pj_stun_resolve_result result;
1370
1371 pj_bzero(&result, sizeof(result));
1372 result.token = token;
1373 result.status = PJ_ECANCELLED;
1374
1375 sess->cb(&result);
1376 }
1377
1378 destroy_stun_resolve(sess);
1379 ++cancelled_count;
1380 }
1381
1382 sess = next;
1383 }
1384 PJSUA_UNLOCK();
1385
1386 return cancelled_count ? PJ_SUCCESS : PJ_ENOTFOUND;
1387}
1388
1389static void internal_stun_resolve_cb(const pj_stun_resolve_result *result)
1390{
1391 pjsua_var.stun_status = result->status;
1392 if (result->status == PJ_SUCCESS) {
1393 pj_memcpy(&pjsua_var.stun_srv, &result->addr, sizeof(result->addr));
1394 }
1395}
1396
1397/*
1398 * Resolve STUN server.
1399 */
1400pj_status_t resolve_stun_server(pj_bool_t wait)
1401{
1402 if (pjsua_var.stun_status == PJ_EUNKNOWN) {
1403 pj_status_t status;
1404
1405 /* Initialize STUN configuration */
1406 pj_stun_config_init(&pjsua_var.stun_cfg, &pjsua_var.cp.factory, 0,
1407 pjsip_endpt_get_ioqueue(pjsua_var.endpt),
1408 pjsip_endpt_get_timer_heap(pjsua_var.endpt));
1409
1410 /* Start STUN server resolution */
1411 if (pjsua_var.ua_cfg.stun_srv_cnt) {
1412 pjsua_var.stun_status = PJ_EPENDING;
1413 status = pjsua_resolve_stun_servers(pjsua_var.ua_cfg.stun_srv_cnt,
1414 pjsua_var.ua_cfg.stun_srv,
1415 wait, NULL,
1416 &internal_stun_resolve_cb);
1417 if (wait || status != PJ_SUCCESS) {
1418 pjsua_var.stun_status = status;
1419 }
1420 } else {
1421 pjsua_var.stun_status = PJ_SUCCESS;
1422 }
1423
1424 } else if (pjsua_var.stun_status == PJ_EPENDING) {
1425 /* STUN server resolution has been started, wait for the
1426 * result.
1427 */
1428 if (wait) {
1429 while (pjsua_var.stun_status == PJ_EPENDING) {
1430 if (pjsua_var.thread[0] == NULL)
1431 pjsua_handle_events(10);
1432 else
1433 pj_thread_sleep(10);
1434 }
1435 }
1436 }
1437
1438 if (pjsua_var.stun_status != PJ_EPENDING &&
1439 pjsua_var.stun_status != PJ_SUCCESS &&
1440 pjsua_var.ua_cfg.stun_ignore_failure)
1441 {
1442 PJ_LOG(2,(THIS_FILE,
1443 "Ignoring STUN resolution failure (by setting)"));
1444 pjsua_var.stun_status = PJ_SUCCESS;
1445 }
1446
1447 return pjsua_var.stun_status;
1448}
1449
1450/*
1451 * Destroy pjsua.
1452 */
1453PJ_DEF(pj_status_t) pjsua_destroy2(unsigned flags)
1454{
1455 int i; /* Must be signed */
1456
1457 if (pjsua_var.endpt) {
1458 PJ_LOG(4,(THIS_FILE, "Shutting down, flags=%d...", flags));
1459 }
1460
1461 if (pjsua_var.state > PJSUA_STATE_NULL &&
1462 pjsua_var.state < PJSUA_STATE_CLOSING)
1463 {
1464 pjsua_set_state(PJSUA_STATE_CLOSING);
1465 }
1466
1467 /* Signal threads to quit: */
1468 pjsua_var.thread_quit_flag = 1;
1469
1470 /* Wait worker threads to quit: */
1471 for (i=0; i<(int)pjsua_var.ua_cfg.thread_cnt; ++i) {
1472 if (pjsua_var.thread[i]) {
1473 pj_status_t status;
1474 status = pj_thread_join(pjsua_var.thread[i]);
1475 if (status != PJ_SUCCESS) {
1476 PJ_PERROR(4,(THIS_FILE, status, "Error joining worker thread"));
1477 pj_thread_sleep(1000);
1478 }
1479 pj_thread_destroy(pjsua_var.thread[i]);
1480 pjsua_var.thread[i] = NULL;
1481 }
1482 }
1483
1484 if (pjsua_var.endpt) {
1485 unsigned max_wait;
1486
1487 pj_log_push_indent();
1488
1489 /* Terminate all calls. */
1490 if ((flags & PJSUA_DESTROY_NO_TX_MSG) == 0) {
1491 pjsua_call_hangup_all();
1492 }
1493
1494 /* Set all accounts to offline */
1495 for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1496 if (!pjsua_var.acc[i].valid)
1497 continue;
1498 pjsua_var.acc[i].online_status = PJ_FALSE;
1499 pj_bzero(&pjsua_var.acc[i].rpid, sizeof(pjrpid_element));
1500 }
1501
1502 /* Terminate all presence subscriptions. */
1503 pjsua_pres_shutdown(flags);
1504
1505 /* Destroy media (to shutdown media transports etc) */
1506 pjsua_media_subsys_destroy(flags);
1507
1508 /* Wait for sometime until all publish client sessions are done
1509 * (ticket #364)
1510 */
1511 /* First stage, get the maximum wait time */
1512 max_wait = 100;
1513 for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1514 if (!pjsua_var.acc[i].valid)
1515 continue;
1516 if (pjsua_var.acc[i].cfg.unpublish_max_wait_time_msec > max_wait)
1517 max_wait = pjsua_var.acc[i].cfg.unpublish_max_wait_time_msec;
1518 }
1519
1520 /* No waiting if RX is disabled */
1521 if (flags & PJSUA_DESTROY_NO_RX_MSG) {
1522 max_wait = 0;
1523 }
1524
1525 /* Second stage, wait for unpublications to complete */
1526 for (i=0; i<(int)(max_wait/50); ++i) {
1527 unsigned j;
1528 for (j=0; j<PJ_ARRAY_SIZE(pjsua_var.acc); ++j) {
1529 if (!pjsua_var.acc[j].valid)
1530 continue;
1531
1532 if (pjsua_var.acc[j].publish_sess)
1533 break;
1534 }
1535 if (j != PJ_ARRAY_SIZE(pjsua_var.acc))
1536 busy_sleep(50);
1537 else
1538 break;
1539 }
1540
1541 /* Third stage, forcefully destroy unfinished unpublications */
1542 for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1543 if (pjsua_var.acc[i].publish_sess) {
1544 pjsip_publishc_destroy(pjsua_var.acc[i].publish_sess);
1545 pjsua_var.acc[i].publish_sess = NULL;
1546 }
1547 }
1548
1549 /* Unregister all accounts */
1550 for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1551 if (!pjsua_var.acc[i].valid)
1552 continue;
1553
1554 if (pjsua_var.acc[i].regc && (flags & PJSUA_DESTROY_NO_TX_MSG)==0)
1555 {
1556 pjsua_acc_set_registration(i, PJ_FALSE);
1557 }
1558 }
1559
1560 /* Terminate any pending STUN resolution */
1561 if (!pj_list_empty(&pjsua_var.stun_res)) {
1562 pjsua_stun_resolve *sess = pjsua_var.stun_res.next;
1563 while (sess != &pjsua_var.stun_res) {
1564 pjsua_stun_resolve *next = sess->next;
1565 destroy_stun_resolve(sess);
1566 sess = next;
1567 }
1568 }
1569
1570 /* Wait until all unregistrations are done (ticket #364) */
1571 /* First stage, get the maximum wait time */
1572 max_wait = 100;
1573 for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1574 if (!pjsua_var.acc[i].valid)
1575 continue;
1576 if (pjsua_var.acc[i].cfg.unreg_timeout > max_wait)
1577 max_wait = pjsua_var.acc[i].cfg.unreg_timeout;
1578 }
1579
1580 /* No waiting if RX is disabled */
1581 if (flags & PJSUA_DESTROY_NO_RX_MSG) {
1582 max_wait = 0;
1583 }
1584
1585 /* Second stage, wait for unregistrations to complete */
1586 for (i=0; i<(int)(max_wait/50); ++i) {
1587 unsigned j;
1588 for (j=0; j<PJ_ARRAY_SIZE(pjsua_var.acc); ++j) {
1589 if (!pjsua_var.acc[j].valid)
1590 continue;
1591
1592 if (pjsua_var.acc[j].regc)
1593 break;
1594 }
1595 if (j != PJ_ARRAY_SIZE(pjsua_var.acc))
1596 busy_sleep(50);
1597 else
1598 break;
1599 }
1600 /* Note variable 'i' is used below */
1601
1602 /* Wait for some time to allow unregistration and ICE/TURN
1603 * transports shutdown to complete:
1604 */
1605 if (i < 20 && (flags & PJSUA_DESTROY_NO_RX_MSG) == 0) {
1606 busy_sleep(1000 - i*50);
1607 }
1608
1609 PJ_LOG(4,(THIS_FILE, "Destroying..."));
1610
1611 /* Must destroy endpoint first before destroying pools in
1612 * buddies or accounts, since shutting down transaction layer
1613 * may emit events which trigger some buddy or account callbacks
1614 * to be called.
1615 */
1616 pjsip_endpt_destroy(pjsua_var.endpt);
1617 pjsua_var.endpt = NULL;
1618
1619 /* Destroy pool in the buddy object */
1620 for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.buddy); ++i) {
1621 if (pjsua_var.buddy[i].pool) {
1622 pj_pool_release(pjsua_var.buddy[i].pool);
1623 pjsua_var.buddy[i].pool = NULL;
1624 }
1625 }
1626
1627 /* Destroy accounts */
1628 for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1629 if (pjsua_var.acc[i].pool) {
1630 pj_pool_release(pjsua_var.acc[i].pool);
1631 pjsua_var.acc[i].pool = NULL;
1632 }
1633 }
1634 }
1635
1636 /* Destroy mutex */
1637 if (pjsua_var.mutex) {
1638 pj_mutex_destroy(pjsua_var.mutex);
1639 pjsua_var.mutex = NULL;
1640 }
1641
1642 if (pjsua_var.timer_mutex) {
1643 pj_mutex_destroy(pjsua_var.timer_mutex);
1644 pjsua_var.timer_mutex = NULL;
1645 }
1646
1647 /* Destroy pool and pool factory. */
1648 if (pjsua_var.pool) {
1649 pj_pool_release(pjsua_var.pool);
1650 pjsua_var.pool = NULL;
1651 pj_caching_pool_destroy(&pjsua_var.cp);
1652
1653 pjsua_set_state(PJSUA_STATE_NULL);
1654
1655 PJ_LOG(4,(THIS_FILE, "PJSUA destroyed..."));
1656
1657 /* End logging */
1658 if (pjsua_var.log_file) {
1659 pj_file_close(pjsua_var.log_file);
1660 pjsua_var.log_file = NULL;
1661 }
1662
1663 pj_log_pop_indent();
1664
1665 /* Shutdown PJLIB */
1666 pj_shutdown();
1667 }
1668
1669 /* Clear pjsua_var */
1670 pj_bzero(&pjsua_var, sizeof(pjsua_var));
1671
1672 /* Done. */
1673 return PJ_SUCCESS;
1674}
1675
1676void pjsua_set_state(pjsua_state new_state)
1677{
1678 const char *state_name[] = {
1679 "NULL",
1680 "CREATED",
1681 "INIT",
1682 "STARTING",
1683 "RUNNING",
1684 "CLOSING"
1685 };
1686 pjsua_state old_state = pjsua_var.state;
1687
1688 pjsua_var.state = new_state;
1689 PJ_LOG(4,(THIS_FILE, "PJSUA state changed: %s --> %s",
1690 state_name[old_state], state_name[new_state]));
1691}
1692
1693/* Get state */
1694PJ_DEF(pjsua_state) pjsua_get_state(void)
1695{
1696 return pjsua_var.state;
1697}
1698
1699PJ_DEF(pj_status_t) pjsua_destroy(void)
1700{
1701 return pjsua_destroy2(0);
1702}
1703
1704
1705/**
1706 * Application is recommended to call this function after all initialization
1707 * is done, so that the library can do additional checking set up
1708 * additional
1709 *
1710 * @return PJ_SUCCESS on success, or the appropriate error code.
1711 */
1712PJ_DEF(pj_status_t) pjsua_start(void)
1713{
1714 pj_status_t status;
1715
1716 pjsua_set_state(PJSUA_STATE_STARTING);
1717 pj_log_push_indent();
1718
1719 status = pjsua_call_subsys_start();
1720 if (status != PJ_SUCCESS)
1721 goto on_return;
1722
1723 status = pjsua_media_subsys_start();
1724 if (status != PJ_SUCCESS)
1725 goto on_return;
1726
1727 status = pjsua_pres_start();
1728 if (status != PJ_SUCCESS)
1729 goto on_return;
1730
1731 pjsua_set_state(PJSUA_STATE_RUNNING);
1732
1733on_return:
1734 pj_log_pop_indent();
1735 return status;
1736}
1737
1738
1739/**
1740 * Poll pjsua for events, and if necessary block the caller thread for
1741 * the specified maximum interval (in miliseconds).
1742 */
1743PJ_DEF(int) pjsua_handle_events(unsigned msec_timeout)
1744{
1745#if defined(PJ_SYMBIAN) && PJ_SYMBIAN != 0
1746
1747 return pj_symbianos_poll(-1, msec_timeout);
1748
1749#else
1750
1751 unsigned count = 0;
1752 pj_time_val tv;
1753 pj_status_t status;
1754
1755 tv.sec = 0;
1756 tv.msec = msec_timeout;
1757 pj_time_val_normalize(&tv);
1758
1759 status = pjsip_endpt_handle_events2(pjsua_var.endpt, &tv, &count);
1760
1761 if (status != PJ_SUCCESS)
1762 return -status;
1763
1764 return count;
1765
1766#endif
1767}
1768
1769
1770/*
1771 * Create memory pool.
1772 */
1773PJ_DEF(pj_pool_t*) pjsua_pool_create( const char *name, pj_size_t init_size,
1774 pj_size_t increment)
1775{
1776 /* Pool factory is thread safe, no need to lock */
1777 return pj_pool_create(&pjsua_var.cp.factory, name, init_size, increment,
1778 NULL);
1779}
1780
1781
1782/*
1783 * Internal function to get SIP endpoint instance of pjsua, which is
1784 * needed for example to register module, create transports, etc.
1785 * Probably is only valid after #pjsua_init() is called.
1786 */
1787PJ_DEF(pjsip_endpoint*) pjsua_get_pjsip_endpt(void)
1788{
1789 return pjsua_var.endpt;
1790}
1791
1792/*
1793 * Internal function to get media endpoint instance.
1794 * Only valid after #pjsua_init() is called.
1795 */
1796PJ_DEF(pjmedia_endpt*) pjsua_get_pjmedia_endpt(void)
1797{
1798 return pjsua_var.med_endpt;
1799}
1800
1801/*
1802 * Internal function to get PJSUA pool factory.
1803 */
1804PJ_DEF(pj_pool_factory*) pjsua_get_pool_factory(void)
1805{
1806 return &pjsua_var.cp.factory;
1807}
1808
1809/*****************************************************************************
1810 * PJSUA SIP Transport API.
1811 */
1812
1813/*
1814 * Tools to get address string.
1815 */
1816static const char *addr_string(const pj_sockaddr_t *addr)
1817{
1818 static char str[128];
1819 str[0] = '\0';
1820 pj_inet_ntop(((const pj_sockaddr*)addr)->addr.sa_family,
1821 pj_sockaddr_get_addr(addr),
1822 str, sizeof(str));
1823 return str;
1824}
1825
1826void pjsua_acc_on_tp_state_changed(pjsip_transport *tp,
1827 pjsip_transport_state state,
1828 const pjsip_transport_state_info *info);
1829
1830/* Callback to receive transport state notifications */
1831static void on_tp_state_callback(pjsip_transport *tp,
1832 pjsip_transport_state state,
1833 const pjsip_transport_state_info *info)
1834{
1835 if (pjsua_var.ua_cfg.cb.on_transport_state) {
1836 (*pjsua_var.ua_cfg.cb.on_transport_state)(tp, state, info);
1837 }
1838 if (pjsua_var.old_tp_cb) {
1839 (*pjsua_var.old_tp_cb)(tp, state, info);
1840 }
1841 pjsua_acc_on_tp_state_changed(tp, state, info);
1842}
1843
1844/*
1845 * Create and initialize SIP socket (and possibly resolve public
1846 * address via STUN, depending on config).
1847 */
1848static pj_status_t create_sip_udp_sock(int af,
1849 const pjsua_transport_config *cfg,
1850 pj_sock_t *p_sock,
1851 pj_sockaddr *p_pub_addr)
1852{
1853 char stun_ip_addr[PJ_INET6_ADDRSTRLEN];
1854 unsigned port = cfg->port;
1855 pj_str_t stun_srv;
1856 pj_sock_t sock;
1857 pj_sockaddr bind_addr;
1858 pj_status_t status;
1859
1860 /* Make sure STUN server resolution has completed */
1861 status = resolve_stun_server(PJ_TRUE);
1862 if (status != PJ_SUCCESS) {
1863 pjsua_perror(THIS_FILE, "Error resolving STUN server", status);
1864 return status;
1865 }
1866
1867 /* Initialize bound address */
1868 if (cfg->bound_addr.slen) {
1869 status = pj_sockaddr_init(af, &bind_addr, &cfg->bound_addr,
1870 (pj_uint16_t)port);
1871 if (status != PJ_SUCCESS) {
1872 pjsua_perror(THIS_FILE,
1873 "Unable to resolve transport bound address",
1874 status);
1875 return status;
1876 }
1877 } else {
1878 pj_sockaddr_init(af, &bind_addr, NULL, (pj_uint16_t)port);
1879 }
1880
1881 /* Create socket */
1882 status = pj_sock_socket(af, pj_SOCK_DGRAM(), 0, &sock);
1883 if (status != PJ_SUCCESS) {
1884 pjsua_perror(THIS_FILE, "socket() error", status);
1885 return status;
1886 }
1887
1888 /* Apply QoS, if specified */
1889 status = pj_sock_apply_qos2(sock, cfg->qos_type,
1890 &cfg->qos_params,
1891 2, THIS_FILE, "SIP UDP socket");
1892
1893 /* Bind socket */
1894 status = pj_sock_bind(sock, &bind_addr, pj_sockaddr_get_len(&bind_addr));
1895 if (status != PJ_SUCCESS) {
1896 pjsua_perror(THIS_FILE, "bind() error", status);
1897 pj_sock_close(sock);
1898 return status;
1899 }
1900
1901 /* If port is zero, get the bound port */
1902 if (port == 0) {
1903 pj_sockaddr bound_addr;
1904 int namelen = sizeof(bound_addr);
1905 status = pj_sock_getsockname(sock, &bound_addr, &namelen);
1906 if (status != PJ_SUCCESS) {
1907 pjsua_perror(THIS_FILE, "getsockname() error", status);
1908 pj_sock_close(sock);
1909 return status;
1910 }
1911
1912 port = pj_sockaddr_get_port(&bound_addr);
1913 }
1914
1915 if (pjsua_var.stun_srv.addr.sa_family != 0) {
1916 pj_ansi_strcpy(stun_ip_addr,pj_inet_ntoa(pjsua_var.stun_srv.ipv4.sin_addr));
1917 stun_srv = pj_str(stun_ip_addr);
1918 } else {
1919 stun_srv.slen = 0;
1920 }
1921
1922 /* Get the published address, either by STUN or by resolving
1923 * the name of local host.
1924 */
1925 if (pj_sockaddr_has_addr(p_pub_addr)) {
1926 /*
1927 * Public address is already specified, no need to resolve the
1928 * address, only set the port.
1929 */
1930 if (pj_sockaddr_get_port(p_pub_addr) == 0)
1931 pj_sockaddr_set_port(p_pub_addr, (pj_uint16_t)port);
1932
1933 } else if (stun_srv.slen) {
1934 pjstun_setting stun_opt;
1935
1936 /*
1937 * STUN is specified, resolve the address with STUN.
1938 */
1939 if (af != pj_AF_INET()) {
1940 pjsua_perror(THIS_FILE, "Cannot use STUN", PJ_EAFNOTSUP);
1941 pj_sock_close(sock);
1942 return PJ_EAFNOTSUP;
1943 }
1944
1945 pj_bzero(&stun_opt, sizeof(stun_opt));
1946 stun_opt.use_stun2 = pjsua_var.ua_cfg.stun_map_use_stun2;
1947 stun_opt.srv1 = stun_opt.srv2 = stun_srv;
1948 stun_opt.port1 = stun_opt.port2 =
1949 pj_ntohs(pjsua_var.stun_srv.ipv4.sin_port);
1950 status = pjstun_get_mapped_addr2(&pjsua_var.cp.factory, &stun_opt,
1951 1, &sock, &p_pub_addr->ipv4);
1952 if (status != PJ_SUCCESS) {
1953 pjsua_perror(THIS_FILE, "Error contacting STUN server", status);
1954 pj_sock_close(sock);
1955 return status;
1956 }
1957
1958 } else {
1959 pj_bzero(p_pub_addr, sizeof(pj_sockaddr));
1960
1961 if (pj_sockaddr_has_addr(&bind_addr)) {
1962 pj_sockaddr_copy_addr(p_pub_addr, &bind_addr);
1963 } else {
1964 status = pj_gethostip(af, p_pub_addr);
1965 if (status != PJ_SUCCESS) {
1966 pjsua_perror(THIS_FILE, "Unable to get local host IP", status);
1967 pj_sock_close(sock);
1968 return status;
1969 }
1970 }
1971
1972 p_pub_addr->addr.sa_family = (pj_uint16_t)af;
1973 pj_sockaddr_set_port(p_pub_addr, (pj_uint16_t)port);
1974 }
1975
1976 *p_sock = sock;
1977
1978 PJ_LOG(4,(THIS_FILE, "SIP UDP socket reachable at %s:%d",
1979 addr_string(p_pub_addr),
1980 (int)pj_sockaddr_get_port(p_pub_addr)));
1981
1982 return PJ_SUCCESS;
1983}
1984
1985
1986/*
1987 * Create SIP transport.
1988 */
1989PJ_DEF(pj_status_t) pjsua_transport_create( pjsip_transport_type_e type,
1990 const pjsua_transport_config *cfg,
1991 pjsua_transport_id *p_id)
1992{
1993 pjsip_transport *tp;
1994 unsigned id;
1995 pj_status_t status;
1996
1997 PJSUA_LOCK();
1998
1999 /* Find empty transport slot */
2000 for (id=0; id < PJ_ARRAY_SIZE(pjsua_var.tpdata); ++id) {
2001 if (pjsua_var.tpdata[id].data.ptr == NULL)
2002 break;
2003 }
2004
2005 if (id == PJ_ARRAY_SIZE(pjsua_var.tpdata)) {
2006 status = PJ_ETOOMANY;
2007 pjsua_perror(THIS_FILE, "Error creating transport", status);
2008 goto on_return;
2009 }
2010
2011 /* Create the transport */
2012 if (type==PJSIP_TRANSPORT_UDP || type==PJSIP_TRANSPORT_UDP6) {
2013 /*
2014 * Create UDP transport (IPv4 or IPv6).
2015 */
2016 pjsua_transport_config config;
2017 char hostbuf[PJ_INET6_ADDRSTRLEN];
2018 pj_sock_t sock = PJ_INVALID_SOCKET;
2019 pj_sockaddr pub_addr;
2020 pjsip_host_port addr_name;
2021
2022 /* Supply default config if it's not specified */
2023 if (cfg == NULL) {
2024 pjsua_transport_config_default(&config);
2025 cfg = &config;
2026 }
2027
2028 /* Initialize the public address from the config, if any */
2029 pj_sockaddr_init(pjsip_transport_type_get_af(type), &pub_addr,
2030 NULL, (pj_uint16_t)cfg->port);
2031 if (cfg->public_addr.slen) {
2032 status = pj_sockaddr_set_str_addr(pjsip_transport_type_get_af(type),
2033 &pub_addr, &cfg->public_addr);
2034 if (status != PJ_SUCCESS) {
2035 pjsua_perror(THIS_FILE,
2036 "Unable to resolve transport public address",
2037 status);
2038 goto on_return;
2039 }
2040 }
2041
2042 /* Create the socket and possibly resolve the address with STUN
2043 * (only when public address is not specified).
2044 */
2045 status = create_sip_udp_sock(pjsip_transport_type_get_af(type),
2046 cfg, &sock, &pub_addr);
2047 if (status != PJ_SUCCESS)
2048 goto on_return;
2049
2050 pj_ansi_strcpy(hostbuf, addr_string(&pub_addr));
2051 addr_name.host = pj_str(hostbuf);
2052 addr_name.port = pj_sockaddr_get_port(&pub_addr);
2053
2054 /* Create UDP transport */
2055 status = pjsip_udp_transport_attach2(pjsua_var.endpt, type, sock,
2056 &addr_name, 1, &tp);
2057 if (status != PJ_SUCCESS) {
2058 pjsua_perror(THIS_FILE, "Error creating SIP UDP transport",
2059 status);
2060 pj_sock_close(sock);
2061 goto on_return;
2062 }
2063
2064
2065 /* Save the transport */
2066 pjsua_var.tpdata[id].type = type;
2067 pjsua_var.tpdata[id].local_name = tp->local_name;
2068 pjsua_var.tpdata[id].data.tp = tp;
2069
2070#if defined(PJ_HAS_TCP) && PJ_HAS_TCP!=0
2071
2072 } else if (type == PJSIP_TRANSPORT_TCP || type == PJSIP_TRANSPORT_TCP6) {
2073 /*
2074 * Create TCP transport.
2075 */
2076 pjsua_transport_config config;
2077 pjsip_tpfactory *tcp;
2078 pjsip_tcp_transport_cfg tcp_cfg;
2079 int af;
2080
2081 af = (type==PJSIP_TRANSPORT_TCP6) ? pj_AF_INET6() : pj_AF_INET();
2082 pjsip_tcp_transport_cfg_default(&tcp_cfg, af);
2083
2084 /* Supply default config if it's not specified */
2085 if (cfg == NULL) {
2086 pjsua_transport_config_default(&config);
2087 cfg = &config;
2088 }
2089
2090 /* Configure bind address */
2091 if (cfg->port)
2092 pj_sockaddr_set_port(&tcp_cfg.bind_addr, (pj_uint16_t)cfg->port);
2093
2094 if (cfg->bound_addr.slen) {
2095 status = pj_sockaddr_set_str_addr(tcp_cfg.af,
2096 &tcp_cfg.bind_addr,
2097 &cfg->bound_addr);
2098 if (status != PJ_SUCCESS) {
2099 pjsua_perror(THIS_FILE,
2100 "Unable to resolve transport bound address",
2101 status);
2102 goto on_return;
2103 }
2104 }
2105
2106 /* Set published name */
2107 if (cfg->public_addr.slen)
2108 tcp_cfg.addr_name.host = cfg->public_addr;
2109
2110 /* Copy the QoS settings */
2111 tcp_cfg.qos_type = cfg->qos_type;
2112 pj_memcpy(&tcp_cfg.qos_params, &cfg->qos_params,
2113 sizeof(cfg->qos_params));
2114
2115 /* Create the TCP transport */
2116 status = pjsip_tcp_transport_start3(pjsua_var.endpt, &tcp_cfg, &tcp);
2117
2118 if (status != PJ_SUCCESS) {
2119 pjsua_perror(THIS_FILE, "Error creating SIP TCP listener",
2120 status);
2121 goto on_return;
2122 }
2123
2124 /* Save the transport */
2125 pjsua_var.tpdata[id].type = type;
2126 pjsua_var.tpdata[id].local_name = tcp->addr_name;
2127 pjsua_var.tpdata[id].data.factory = tcp;
2128
2129#endif /* PJ_HAS_TCP */
2130
2131#if defined(PJSIP_HAS_TLS_TRANSPORT) && PJSIP_HAS_TLS_TRANSPORT!=0
2132 } else if (type == PJSIP_TRANSPORT_TLS || type == PJSIP_TRANSPORT_TLS6) {
2133 /*
2134 * Create TLS transport.
2135 */
2136 pjsua_transport_config config;
2137 pjsip_host_port a_name;
2138 pjsip_tpfactory *tls;
2139 pj_sockaddr local_addr;
2140 int af;
2141
2142 /* Supply default config if it's not specified */
2143 if (cfg == NULL) {
2144 pjsua_transport_config_default(&config);
2145 config.port = 5061;
2146 cfg = &config;
2147 }
2148
2149 /* Init local address */
2150 af = (type==PJSIP_TRANSPORT_TLS) ? pj_AF_INET() : pj_AF_INET6();
2151 pj_sockaddr_init(af, &local_addr, NULL, 0);
2152
2153 if (cfg->port)
2154 pj_sockaddr_set_port(&local_addr, (pj_uint16_t)cfg->port);
2155
2156 if (cfg->bound_addr.slen) {
2157 status = pj_sockaddr_set_str_addr(af, &local_addr,
2158 &cfg->bound_addr);
2159 if (status != PJ_SUCCESS) {
2160 pjsua_perror(THIS_FILE,
2161 "Unable to resolve transport bound address",
2162 status);
2163 goto on_return;
2164 }
2165 }
2166
2167 /* Init published name */
2168 pj_bzero(&a_name, sizeof(pjsip_host_port));
2169 if (cfg->public_addr.slen)
2170 a_name.host = cfg->public_addr;
2171
2172 status = pjsip_tls_transport_start2(pjsua_var.endpt,
2173 &cfg->tls_setting,
2174 &local_addr, &a_name, 1, &tls);
2175 if (status != PJ_SUCCESS) {
2176 pjsua_perror(THIS_FILE, "Error creating SIP TLS listener",
2177 status);
2178 goto on_return;
2179 }
2180
2181 /* Save the transport */
2182 pjsua_var.tpdata[id].type = type;
2183 pjsua_var.tpdata[id].local_name = tls->addr_name;
2184 pjsua_var.tpdata[id].data.factory = tls;
2185#endif
2186
2187 } else {
2188 status = PJSIP_EUNSUPTRANSPORT;
2189 pjsua_perror(THIS_FILE, "Error creating transport", status);
2190 goto on_return;
2191 }
2192
2193 /* Set transport state callback */
2194 {
2195 pjsip_tp_state_callback tpcb;
2196 pjsip_tpmgr *tpmgr;
2197
2198 tpmgr = pjsip_endpt_get_tpmgr(pjsua_var.endpt);
2199 tpcb = pjsip_tpmgr_get_state_cb(tpmgr);
2200
2201 if (tpcb != &on_tp_state_callback) {
2202 pjsua_var.old_tp_cb = tpcb;
2203 pjsip_tpmgr_set_state_cb(tpmgr, &on_tp_state_callback);
2204 }
2205 }
2206
2207 /* Return the ID */
2208 if (p_id) *p_id = id;
2209
2210 status = PJ_SUCCESS;
2211
2212on_return:
2213
2214 PJSUA_UNLOCK();
2215
2216 return status;
2217}
2218
2219
2220/*
2221 * Register transport that has been created by application.
2222 */
2223PJ_DEF(pj_status_t) pjsua_transport_register( pjsip_transport *tp,
2224 pjsua_transport_id *p_id)
2225{
2226 unsigned id;
2227
2228 PJSUA_LOCK();
2229
2230 /* Find empty transport slot */
2231 for (id=0; id < PJ_ARRAY_SIZE(pjsua_var.tpdata); ++id) {
2232 if (pjsua_var.tpdata[id].data.ptr == NULL)
2233 break;
2234 }
2235
2236 if (id == PJ_ARRAY_SIZE(pjsua_var.tpdata)) {
2237 pjsua_perror(THIS_FILE, "Error creating transport", PJ_ETOOMANY);
2238 PJSUA_UNLOCK();
2239 return PJ_ETOOMANY;
2240 }
2241
2242 /* Save the transport */
2243 pjsua_var.tpdata[id].type = (pjsip_transport_type_e) tp->key.type;
2244 pjsua_var.tpdata[id].local_name = tp->local_name;
2245 pjsua_var.tpdata[id].data.tp = tp;
2246
2247 /* Return the ID */
2248 if (p_id) *p_id = id;
2249
2250 PJSUA_UNLOCK();
2251
2252 return PJ_SUCCESS;
2253}
2254
2255
2256/*
2257 * Enumerate all transports currently created in the system.
2258 */
2259PJ_DEF(pj_status_t) pjsua_enum_transports( pjsua_transport_id id[],
2260 unsigned *p_count )
2261{
2262 unsigned i, count;
2263
2264 PJSUA_LOCK();
2265
2266 for (i=0, count=0; i<PJ_ARRAY_SIZE(pjsua_var.tpdata) && count<*p_count;
2267 ++i)
2268 {
2269 if (!pjsua_var.tpdata[i].data.ptr)
2270 continue;
2271
2272 id[count++] = i;
2273 }
2274
2275 *p_count = count;
2276
2277 PJSUA_UNLOCK();
2278
2279 return PJ_SUCCESS;
2280}
2281
2282
2283/*
2284 * Get information about transports.
2285 */
2286PJ_DEF(pj_status_t) pjsua_transport_get_info( pjsua_transport_id id,
2287 pjsua_transport_info *info)
2288{
2289 pjsua_transport_data *t = &pjsua_var.tpdata[id];
2290 pj_status_t status;
2291
2292 pj_bzero(info, sizeof(*info));
2293
2294 /* Make sure id is in range. */
2295 PJ_ASSERT_RETURN(id>=0 && id<(int)PJ_ARRAY_SIZE(pjsua_var.tpdata),
2296 PJ_EINVAL);
2297
2298 /* Make sure that transport exists */
2299 PJ_ASSERT_RETURN(pjsua_var.tpdata[id].data.ptr != NULL, PJ_EINVAL);
2300
2301 PJSUA_LOCK();
2302
2303 if (t->type == PJSIP_TRANSPORT_UDP) {
2304
2305 pjsip_transport *tp = t->data.tp;
2306
2307 if (tp == NULL) {
2308 PJSUA_UNLOCK();
2309 return PJ_EINVALIDOP;
2310 }
2311
2312 info->id = id;
2313 info->type = (pjsip_transport_type_e) tp->key.type;
2314 info->type_name = pj_str(tp->type_name);
2315 info->info = pj_str(tp->info);
2316 info->flag = tp->flag;
2317 info->addr_len = tp->addr_len;
2318 info->local_addr = tp->local_addr;
2319 info->local_name = tp->local_name;
2320 info->usage_count = pj_atomic_get(tp->ref_cnt);
2321
2322 status = PJ_SUCCESS;
2323
2324 } else if (t->type == PJSIP_TRANSPORT_TCP ||
2325 t->type == PJSIP_TRANSPORT_TLS)
2326 {
2327
2328 pjsip_tpfactory *factory = t->data.factory;
2329
2330 if (factory == NULL) {
2331 PJSUA_UNLOCK();
2332 return PJ_EINVALIDOP;
2333 }
2334
2335 info->id = id;
2336 info->type = t->type;
2337 info->type_name = (t->type==PJSIP_TRANSPORT_TCP)? pj_str("TCP"):
2338 pj_str("TLS");
2339 info->info = (t->type==PJSIP_TRANSPORT_TCP)? pj_str("TCP transport"):
2340 pj_str("TLS transport");
2341 info->flag = factory->flag;
2342 info->addr_len = sizeof(factory->local_addr);
2343 info->local_addr = factory->local_addr;
2344 info->local_name = factory->addr_name;
2345 info->usage_count = 0;
2346
2347 status = PJ_SUCCESS;
2348
2349 } else {
2350 pj_assert(!"Unsupported transport");
2351 status = PJ_EINVALIDOP;
2352 }
2353
2354
2355 PJSUA_UNLOCK();
2356
2357 return status;
2358}
2359
2360
2361/*
2362 * Disable a transport or re-enable it.
2363 */
2364PJ_DEF(pj_status_t) pjsua_transport_set_enable( pjsua_transport_id id,
2365 pj_bool_t enabled)
2366{
2367 /* Make sure id is in range. */
2368 PJ_ASSERT_RETURN(id>=0 && id<(int)PJ_ARRAY_SIZE(pjsua_var.tpdata),
2369 PJ_EINVAL);
2370
2371 /* Make sure that transport exists */
2372 PJ_ASSERT_RETURN(pjsua_var.tpdata[id].data.ptr != NULL, PJ_EINVAL);
2373
2374
2375 /* To be done!! */
2376 PJ_TODO(pjsua_transport_set_enable);
2377 PJ_UNUSED_ARG(enabled);
2378
2379 return PJ_EINVALIDOP;
2380}
2381
2382
2383/*
2384 * Close the transport.
2385 */
2386PJ_DEF(pj_status_t) pjsua_transport_close( pjsua_transport_id id,
2387 pj_bool_t force )
2388{
2389 pj_status_t status;
2390
2391 /* Make sure id is in range. */
2392 PJ_ASSERT_RETURN(id>=0 && id<(int)PJ_ARRAY_SIZE(pjsua_var.tpdata),
2393 PJ_EINVAL);
2394
2395 /* Make sure that transport exists */
2396 PJ_ASSERT_RETURN(pjsua_var.tpdata[id].data.ptr != NULL, PJ_EINVAL);
2397
2398 /* Note: destroy() may not work if there are objects still referencing
2399 * the transport.
2400 */
2401 if (force) {
2402 switch (pjsua_var.tpdata[id].type) {
2403 case PJSIP_TRANSPORT_UDP:
2404 status = pjsip_transport_shutdown(pjsua_var.tpdata[id].data.tp);
2405 if (status != PJ_SUCCESS)
2406 return status;
2407 status = pjsip_transport_destroy(pjsua_var.tpdata[id].data.tp);
2408 if (status != PJ_SUCCESS)
2409 return status;
2410 break;
2411
2412 case PJSIP_TRANSPORT_TLS:
2413 case PJSIP_TRANSPORT_TCP:
2414 /* This will close the TCP listener, but existing TCP/TLS
2415 * connections (if any) will still linger
2416 */
2417 status = (*pjsua_var.tpdata[id].data.factory->destroy)
2418 (pjsua_var.tpdata[id].data.factory);
2419 if (status != PJ_SUCCESS)
2420 return status;
2421
2422 break;
2423
2424 default:
2425 return PJ_EINVAL;
2426 }
2427
2428 } else {
2429 /* If force is not specified, transports will be closed at their
2430 * convenient time. However this will leak PJSUA-API transport
2431 * descriptors as PJSUA-API wouldn't know when exactly the
2432 * transport is closed thus it can't cleanup PJSUA transport
2433 * descriptor.
2434 */
2435 switch (pjsua_var.tpdata[id].type) {
2436 case PJSIP_TRANSPORT_UDP:
2437 return pjsip_transport_shutdown(pjsua_var.tpdata[id].data.tp);
2438 case PJSIP_TRANSPORT_TLS:
2439 case PJSIP_TRANSPORT_TCP:
2440 return (*pjsua_var.tpdata[id].data.factory->destroy)
2441 (pjsua_var.tpdata[id].data.factory);
2442 default:
2443 return PJ_EINVAL;
2444 }
2445 }
2446
2447 /* Cleanup pjsua data when force is applied */
2448 if (force) {
2449 pjsua_var.tpdata[id].type = PJSIP_TRANSPORT_UNSPECIFIED;
2450 pjsua_var.tpdata[id].data.ptr = NULL;
2451 }
2452
2453 return PJ_SUCCESS;
2454}
2455
2456
2457/*
2458 * Add additional headers etc in msg_data specified by application
2459 * when sending requests.
2460 */
2461void pjsua_process_msg_data(pjsip_tx_data *tdata,
2462 const pjsua_msg_data *msg_data)
2463{
2464 pj_bool_t allow_body;
2465 const pjsip_hdr *hdr;
2466
2467 /* Always add User-Agent */
2468 if (pjsua_var.ua_cfg.user_agent.slen &&
2469 tdata->msg->type == PJSIP_REQUEST_MSG)
2470 {
2471 const pj_str_t STR_USER_AGENT = { "User-Agent", 10 };
2472 pjsip_hdr *h;
2473 h = (pjsip_hdr*)pjsip_generic_string_hdr_create(tdata->pool,
2474 &STR_USER_AGENT,
2475 &pjsua_var.ua_cfg.user_agent);
2476 pjsip_msg_add_hdr(tdata->msg, h);
2477 }
2478
2479 if (!msg_data)
2480 return;
2481
2482 hdr = msg_data->hdr_list.next;
2483 while (hdr && hdr != &msg_data->hdr_list) {
2484 pjsip_hdr *new_hdr;
2485
2486 new_hdr = (pjsip_hdr*) pjsip_hdr_clone(tdata->pool, hdr);
2487 pjsip_msg_add_hdr(tdata->msg, new_hdr);
2488
2489 hdr = hdr->next;
2490 }
2491
2492 allow_body = (tdata->msg->body == NULL);
2493
2494 if (allow_body && msg_data->content_type.slen && msg_data->msg_body.slen) {
2495 pjsip_media_type ctype;
2496 pjsip_msg_body *body;
2497
2498 pjsua_parse_media_type(tdata->pool, &msg_data->content_type, &ctype);
2499 body = pjsip_msg_body_create(tdata->pool, &ctype.type, &ctype.subtype,
2500 &msg_data->msg_body);
2501 tdata->msg->body = body;
2502 }
2503
2504 /* Multipart */
2505 if (!pj_list_empty(&msg_data->multipart_parts) &&
2506 msg_data->multipart_ctype.type.slen)
2507 {
2508 pjsip_msg_body *bodies;
2509 pjsip_multipart_part *part;
2510 pj_str_t *boundary = NULL;
2511
2512 bodies = pjsip_multipart_create(tdata->pool,
2513 &msg_data->multipart_ctype,
2514 boundary);
2515 part = msg_data->multipart_parts.next;
2516 while (part != &msg_data->multipart_parts) {
2517 pjsip_multipart_part *part_copy;
2518
2519 part_copy = pjsip_multipart_clone_part(tdata->pool, part);
2520 pjsip_multipart_add_part(tdata->pool, bodies, part_copy);
2521 part = part->next;
2522 }
2523
2524 if (tdata->msg->body) {
2525 part = pjsip_multipart_create_part(tdata->pool);
2526 part->body = tdata->msg->body;
2527 pjsip_multipart_add_part(tdata->pool, bodies, part);
2528
2529 tdata->msg->body = NULL;
2530 }
2531
2532 tdata->msg->body = bodies;
2533 }
2534}
2535
2536
2537/*
2538 * Add route_set to outgoing requests
2539 */
2540void pjsua_set_msg_route_set( pjsip_tx_data *tdata,
2541 const pjsip_route_hdr *route_set )
2542{
2543 const pjsip_route_hdr *r;
2544
2545 r = route_set->next;
2546 while (r != route_set) {
2547 pjsip_route_hdr *new_r;
2548
2549 new_r = (pjsip_route_hdr*) pjsip_hdr_clone(tdata->pool, r);
2550 pjsip_msg_add_hdr(tdata->msg, (pjsip_hdr*)new_r);
2551
2552 r = r->next;
2553 }
2554}
2555
2556
2557/*
2558 * Simple version of MIME type parsing (it doesn't support parameters)
2559 */
2560void pjsua_parse_media_type( pj_pool_t *pool,
2561 const pj_str_t *mime,
2562 pjsip_media_type *media_type)
2563{
2564 pj_str_t tmp;
2565 char *pos;
2566
2567 pj_bzero(media_type, sizeof(*media_type));
2568
2569 pj_strdup_with_null(pool, &tmp, mime);
2570
2571 pos = pj_strchr(&tmp, '/');
2572 if (pos) {
2573 media_type->type.ptr = tmp.ptr;
2574 media_type->type.slen = (pos-tmp.ptr);
2575 media_type->subtype.ptr = pos+1;
2576 media_type->subtype.slen = tmp.ptr+tmp.slen-pos-1;
2577 } else {
2578 media_type->type = tmp;
2579 }
2580}
2581
2582
2583/*
2584 * Internal function to init transport selector from transport id.
2585 */
2586void pjsua_init_tpselector(pjsua_transport_id tp_id,
2587 pjsip_tpselector *sel)
2588{
2589 pjsua_transport_data *tpdata;
2590 unsigned flag;
2591
2592 pj_bzero(sel, sizeof(*sel));
2593 if (tp_id == PJSUA_INVALID_ID)
2594 return;
2595
2596 pj_assert(tp_id >= 0 && tp_id < (int)PJ_ARRAY_SIZE(pjsua_var.tpdata));
2597 tpdata = &pjsua_var.tpdata[tp_id];
2598
2599 flag = pjsip_transport_get_flag_from_type(tpdata->type);
2600
2601 if (flag & PJSIP_TRANSPORT_DATAGRAM) {
2602 sel->type = PJSIP_TPSELECTOR_TRANSPORT;
2603 sel->u.transport = tpdata->data.tp;
2604 } else {
2605 sel->type = PJSIP_TPSELECTOR_LISTENER;
2606 sel->u.listener = tpdata->data.factory;
2607 }
2608}
2609
2610
2611/* Callback upon NAT detection completion */
2612static void nat_detect_cb(void *user_data,
2613 const pj_stun_nat_detect_result *res)
2614{
2615 PJ_UNUSED_ARG(user_data);
2616
2617 pjsua_var.nat_in_progress = PJ_FALSE;
2618 pjsua_var.nat_status = res->status;
2619 pjsua_var.nat_type = res->nat_type;
2620
2621 if (pjsua_var.ua_cfg.cb.on_nat_detect) {
2622 (*pjsua_var.ua_cfg.cb.on_nat_detect)(res);
2623 }
2624}
2625
2626
2627/*
2628 * Detect NAT type.
2629 */
2630PJ_DEF(pj_status_t) pjsua_detect_nat_type()
2631{
2632 pj_status_t status;
2633
2634 if (pjsua_var.nat_in_progress)
2635 return PJ_SUCCESS;
2636
2637 /* Make sure STUN server resolution has completed */
2638 status = resolve_stun_server(PJ_TRUE);
2639 if (status != PJ_SUCCESS) {
2640 pjsua_var.nat_status = status;
2641 pjsua_var.nat_type = PJ_STUN_NAT_TYPE_ERR_UNKNOWN;
2642 return status;
2643 }
2644
2645 /* Make sure we have STUN */
2646 if (pjsua_var.stun_srv.ipv4.sin_family == 0) {
2647 pjsua_var.nat_status = PJNATH_ESTUNINSERVER;
2648 return PJNATH_ESTUNINSERVER;
2649 }
2650
2651 status = pj_stun_detect_nat_type(&pjsua_var.stun_srv.ipv4,
2652 &pjsua_var.stun_cfg,
2653 NULL, &nat_detect_cb);
2654
2655 if (status != PJ_SUCCESS) {
2656 pjsua_var.nat_status = status;
2657 pjsua_var.nat_type = PJ_STUN_NAT_TYPE_ERR_UNKNOWN;
2658 return status;
2659 }
2660
2661 pjsua_var.nat_in_progress = PJ_TRUE;
2662
2663 return PJ_SUCCESS;
2664}
2665
2666
2667/*
2668 * Get NAT type.
2669 */
2670PJ_DEF(pj_status_t) pjsua_get_nat_type(pj_stun_nat_type *type)
2671{
2672 *type = pjsua_var.nat_type;
2673 return pjsua_var.nat_status;
2674}
2675
2676/*
2677 * Verify that valid url is given.
2678 */
2679PJ_DEF(pj_status_t) pjsua_verify_url(const char *c_url)
2680{
2681 pjsip_uri *p;
2682 pj_pool_t *pool;
2683 char *url;
2684 pj_size_t len = (c_url ? pj_ansi_strlen(c_url) : 0);
2685
2686 if (!len) return PJSIP_EINVALIDURI;
2687
2688 pool = pj_pool_create(&pjsua_var.cp.factory, "check%p", 1024, 0, NULL);
2689 if (!pool) return PJ_ENOMEM;
2690
2691 url = (char*) pj_pool_alloc(pool, len+1);
2692 pj_ansi_strcpy(url, c_url);
2693
2694 p = pjsip_parse_uri(pool, url, len, 0);
2695
2696 pj_pool_release(pool);
2697 return p ? 0 : PJSIP_EINVALIDURI;
2698}
2699
2700/*
2701 * Verify that valid SIP url is given.
2702 */
2703PJ_DEF(pj_status_t) pjsua_verify_sip_url(const char *c_url)
2704{
2705 pjsip_uri *p;
2706 pj_pool_t *pool;
2707 char *url;
2708 pj_size_t len = (c_url ? pj_ansi_strlen(c_url) : 0);
2709
2710 if (!len) return PJSIP_EINVALIDURI;
2711
2712 pool = pj_pool_create(&pjsua_var.cp.factory, "check%p", 1024, 0, NULL);
2713 if (!pool) return PJ_ENOMEM;
2714
2715 url = (char*) pj_pool_alloc(pool, len+1);
2716 pj_ansi_strcpy(url, c_url);
2717
2718 p = pjsip_parse_uri(pool, url, len, 0);
2719 if (!p || (pj_stricmp2(pjsip_uri_get_scheme(p), "sip") != 0 &&
2720 pj_stricmp2(pjsip_uri_get_scheme(p), "sips") != 0))
2721 {
2722 p = NULL;
2723 }
2724
2725 pj_pool_release(pool);
2726 return p ? 0 : PJSIP_EINVALIDURI;
2727}
2728
2729/*
2730 * Schedule a timer entry.
2731 */
2732#if PJ_TIMER_DEBUG
2733PJ_DEF(pj_status_t) pjsua_schedule_timer_dbg( pj_timer_entry *entry,
2734 const pj_time_val *delay,
2735 const char *src_file,
2736 int src_line)
2737{
2738 return pjsip_endpt_schedule_timer_dbg(pjsua_var.endpt, entry, delay,
2739 src_file, src_line);
2740}
2741#else
2742PJ_DEF(pj_status_t) pjsua_schedule_timer( pj_timer_entry *entry,
2743 const pj_time_val *delay)
2744{
2745 return pjsip_endpt_schedule_timer(pjsua_var.endpt, entry, delay);
2746}
2747#endif
2748
2749/* Timer callback */
2750static void timer_cb( pj_timer_heap_t *th,
2751 pj_timer_entry *entry)
2752{
2753 pjsua_timer_list *tmr = (pjsua_timer_list *)entry->user_data;
2754 void (*cb)(void *user_data) = tmr->cb;
2755 void *user_data = tmr->user_data;
2756
2757 PJ_UNUSED_ARG(th);
2758
2759 pj_mutex_lock(pjsua_var.timer_mutex);
2760 pj_list_push_back(&pjsua_var.timer_list, tmr);
2761 pj_mutex_unlock(pjsua_var.timer_mutex);
2762
2763 if (cb)
2764 (*cb)(user_data);
2765}
2766
2767/*
2768 * Schedule a timer callback.
2769 */
2770#if PJ_TIMER_DEBUG
2771PJ_DEF(pj_status_t) pjsua_schedule_timer2_dbg( void (*cb)(void *user_data),
2772 void *user_data,
2773 unsigned msec_delay,
2774 const char *src_file,
2775 int src_line)
2776#else
2777PJ_DEF(pj_status_t) pjsua_schedule_timer2( void (*cb)(void *user_data),
2778 void *user_data,
2779 unsigned msec_delay)
2780#endif
2781{
2782 pjsua_timer_list *tmr = NULL;
2783 pj_status_t status;
2784 pj_time_val delay;
2785
2786 pj_mutex_lock(pjsua_var.timer_mutex);
2787
2788 if (pj_list_empty(&pjsua_var.timer_list)) {
2789 tmr = PJ_POOL_ALLOC_T(pjsua_var.pool, pjsua_timer_list);
2790 } else {
2791 tmr = pjsua_var.timer_list.next;
2792 pj_list_erase(tmr);
2793 }
2794 pj_timer_entry_init(&tmr->entry, 0, tmr, timer_cb);
2795 tmr->cb = cb;
2796 tmr->user_data = user_data;
2797 delay.sec = 0;
2798 delay.msec = msec_delay;
2799
2800#if PJ_TIMER_DEBUG
2801 status = pjsip_endpt_schedule_timer_dbg(pjsua_var.endpt, &tmr->entry,
2802 &delay, src_file, src_line);
2803#else
2804 status = pjsip_endpt_schedule_timer(pjsua_var.endpt, &tmr->entry, &delay);
2805#endif
2806 if (status != PJ_SUCCESS) {
2807 pj_list_push_back(&pjsua_var.timer_list, tmr);
2808 }
2809
2810 pj_mutex_unlock(pjsua_var.timer_mutex);
2811
2812 return status;
2813}
2814
2815/*
2816 * Cancel the previously scheduled timer.
2817 *
2818 */
2819PJ_DEF(void) pjsua_cancel_timer(pj_timer_entry *entry)
2820{
2821 pjsip_endpt_cancel_timer(pjsua_var.endpt, entry);
2822}
2823
2824/**
2825 * Normalize route URI (check for ";lr" and append one if it doesn't
2826 * exist and pjsua_config.force_lr is set.
2827 */
2828pj_status_t normalize_route_uri(pj_pool_t *pool, pj_str_t *uri)
2829{
2830 pj_str_t tmp_uri;
2831 pj_pool_t *tmp_pool;
2832 pjsip_uri *uri_obj;
2833 pjsip_sip_uri *sip_uri;
2834
2835 tmp_pool = pjsua_pool_create("tmplr%p", 512, 512);
2836 if (!tmp_pool)
2837 return PJ_ENOMEM;
2838
2839 pj_strdup_with_null(tmp_pool, &tmp_uri, uri);
2840
2841 uri_obj = pjsip_parse_uri(tmp_pool, tmp_uri.ptr, tmp_uri.slen, 0);
2842 if (!uri_obj) {
2843 PJ_LOG(1,(THIS_FILE, "Invalid route URI: %.*s",
2844 (int)uri->slen, uri->ptr));
2845 pj_pool_release(tmp_pool);
2846 return PJSIP_EINVALIDURI;
2847 }
2848
2849 if (!PJSIP_URI_SCHEME_IS_SIP(uri_obj) &&
2850 !PJSIP_URI_SCHEME_IS_SIPS(uri_obj))
2851 {
2852 PJ_LOG(1,(THIS_FILE, "Route URI must be SIP URI: %.*s",
2853 (int)uri->slen, uri->ptr));
2854 pj_pool_release(tmp_pool);
2855 return PJSIP_EINVALIDSCHEME;
2856 }
2857
2858 sip_uri = (pjsip_sip_uri*) pjsip_uri_get_uri(uri_obj);
2859
2860 /* Done if force_lr is disabled or if lr parameter is present */
2861 if (!pjsua_var.ua_cfg.force_lr || sip_uri->lr_param) {
2862 pj_pool_release(tmp_pool);
2863 return PJ_SUCCESS;
2864 }
2865
2866 /* Set lr param */
2867 sip_uri->lr_param = 1;
2868
2869 /* Print the URI */
2870 tmp_uri.ptr = (char*) pj_pool_alloc(tmp_pool, PJSIP_MAX_URL_SIZE);
2871 tmp_uri.slen = pjsip_uri_print(PJSIP_URI_IN_ROUTING_HDR, uri_obj,
2872 tmp_uri.ptr, PJSIP_MAX_URL_SIZE);
2873 if (tmp_uri.slen < 1) {
2874 PJ_LOG(1,(THIS_FILE, "Route URI is too long: %.*s",
2875 (int)uri->slen, uri->ptr));
2876 pj_pool_release(tmp_pool);
2877 return PJSIP_EURITOOLONG;
2878 }
2879
2880 /* Clone the URI */
2881 pj_strdup_with_null(pool, uri, &tmp_uri);
2882
2883 pj_pool_release(tmp_pool);
2884 return PJ_SUCCESS;
2885}
2886
2887/*
2888 * This is a utility function to dump the stack states to log, using
2889 * verbosity level 3.
2890 */
2891PJ_DEF(void) pjsua_dump(pj_bool_t detail)
2892{
2893 unsigned old_decor;
2894 unsigned i;
2895
2896 PJ_LOG(3,(THIS_FILE, "Start dumping application states:"));
2897
2898 old_decor = pj_log_get_decor();
2899 pj_log_set_decor(old_decor & (PJ_LOG_HAS_NEWLINE | PJ_LOG_HAS_CR));
2900
2901 if (detail)
2902 pj_dump_config();
2903
2904 pjsip_endpt_dump(pjsua_get_pjsip_endpt(), detail);
2905
2906 pjmedia_endpt_dump(pjsua_get_pjmedia_endpt());
2907
2908 PJ_LOG(3,(THIS_FILE, "Dumping media transports:"));
2909 for (i=0; i<pjsua_var.ua_cfg.max_calls; ++i) {
2910 pjsua_call *call = &pjsua_var.calls[i];
2911 pjsua_acc_config *acc_cfg;
2912 pjmedia_transport *tp[PJSUA_MAX_CALL_MEDIA*2];
2913 unsigned tp_cnt = 0;
2914 unsigned j;
2915
2916 /* Collect media transports in this call */
2917 for (j = 0; j < call->med_cnt; ++j) {
2918 if (call->media[j].tp != NULL)
2919 tp[tp_cnt++] = call->media[j].tp;
2920 }
2921 for (j = 0; j < call->med_prov_cnt; ++j) {
2922 pjmedia_transport *med_tp = call->media_prov[j].tp;
2923 if (med_tp) {
2924 unsigned k;
2925 pj_bool_t used = PJ_FALSE;
2926 for (k = 0; k < tp_cnt; ++k) {
2927 if (med_tp == tp[k]) {
2928 used = PJ_TRUE;
2929 break;
2930 }
2931 }
2932 if (!used)
2933 tp[tp_cnt++] = med_tp;
2934 }
2935 }
2936
2937 acc_cfg = &pjsua_var.acc[call->acc_id].cfg;
2938
2939 /* Dump the media transports in this call */
2940 for (j = 0; j < tp_cnt; ++j) {
2941 pjmedia_transport_info tpinfo;
2942 char addr_buf[80];
2943
2944 pjmedia_transport_info_init(&tpinfo);
2945 pjmedia_transport_get_info(tp[j], &tpinfo);
2946 PJ_LOG(3,(THIS_FILE, " %s: %s",
2947 (acc_cfg->ice_cfg.enable_ice ? "ICE" : "UDP"),
2948 pj_sockaddr_print(&tpinfo.sock_info.rtp_addr_name,
2949 addr_buf,
2950 sizeof(addr_buf), 3)));
2951 }
2952 }
2953
2954 pjsip_tsx_layer_dump(detail);
2955 pjsip_ua_dump(detail);
2956
2957// Dumping complete call states may require a 'large' buffer
2958// (about 3KB per call session, including RTCP XR).
2959#if 0
2960 /* Dump all invite sessions: */
2961 PJ_LOG(3,(THIS_FILE, "Dumping invite sessions:"));
2962
2963 if (pjsua_call_get_count() == 0) {
2964
2965 PJ_LOG(3,(THIS_FILE, " - no sessions -"));
2966
2967 } else {
2968 unsigned i;
2969
2970 for (i=0; i<pjsua_var.ua_cfg.max_calls; ++i) {
2971 if (pjsua_call_is_active(i)) {
2972 /* Tricky logging, since call states log string tends to be
2973 * longer than PJ_LOG_MAX_SIZE.
2974 */
2975 char buf[1024 * 3];
2976 unsigned call_dump_len;
2977 unsigned part_len;
2978 unsigned part_idx;
2979 unsigned log_decor;
2980
2981 pjsua_call_dump(i, detail, buf, sizeof(buf), " ");
2982 call_dump_len = strlen(buf);
2983
2984 log_decor = pj_log_get_decor();
2985 pj_log_set_decor(log_decor & ~(PJ_LOG_HAS_NEWLINE |
2986 PJ_LOG_HAS_CR));
2987 PJ_LOG(3,(THIS_FILE, "\n"));
2988 pj_log_set_decor(0);
2989
2990 part_idx = 0;
2991 part_len = PJ_LOG_MAX_SIZE-80;
2992 while (part_idx < call_dump_len) {
2993 char p_orig, *p;
2994
2995 p = &buf[part_idx];
2996 if (part_idx + part_len > call_dump_len)
2997 part_len = call_dump_len - part_idx;
2998 p_orig = p[part_len];
2999 p[part_len] = '\0';
3000 PJ_LOG(3,(THIS_FILE, "%s", p));
3001 p[part_len] = p_orig;
3002 part_idx += part_len;
3003 }
3004 pj_log_set_decor(log_decor);
3005 }
3006 }
3007 }
3008#endif
3009
3010 /* Dump presence status */
3011 pjsua_pres_dump(detail);
3012
3013 pj_log_set_decor(old_decor);
3014 PJ_LOG(3,(THIS_FILE, "Dump complete"));
3015}
3016