diff --git a/apps/app_osplookup.c b/apps/app_osplookup.c index f857164db4bdc273bbfeea2b477a8e46c6dbbad2..c2f64240dba19851a1ad20e3c4c8be594c2fa457 100644 --- a/apps/app_osplookup.c +++ b/apps/app_osplookup.c @@ -18,7 +18,7 @@ /*! * \file - * \brief Open Settlement Protocol Applications + * \brief Open Settlement Protocol (OSP) Applications * * \author Mark Spencer <markster@digium.com> * @@ -34,91 +34,953 @@ ASTERISK_FILE_VERSION(__FILE__, "$Revision$") +#include <sys/types.h> #include <stdio.h> -#include <stdlib.h> -#include <unistd.h> #include <string.h> -#include <ctype.h> +#include <unistd.h> +#include <errno.h> +#include <osp/osp.h> +#include <osp/osputils.h> #include "asterisk/lock.h" -#include "asterisk/file.h" -#include "asterisk/logger.h" -#include "asterisk/channel.h" -#include "asterisk/pbx.h" -#include "asterisk/options.h" #include "asterisk/config.h" -#include "asterisk/module.h" #include "asterisk/utils.h" #include "asterisk/causes.h" -#include "asterisk/astosp.h" +#include "asterisk/channel.h" #include "asterisk/app.h" +#include "asterisk/module.h" +#include "asterisk/pbx.h" #include "asterisk/options.h" +#include "asterisk/cli.h" +#include "asterisk/logger.h" +#include "asterisk/astosp.h" -static char *app1= "OSPAuth"; -static char *synopsis1 = "OSP authentication"; -static char *descrip1 = -" OSPAuth([provider[|options]]): Authenticate a SIP INVITE by OSP and sets\n" -"the variables:\n" -" ${OSPINHANDLE}: The in_bound call transaction handle\n" -" ${OSPINTIMELIMIT}: The in_bound call duration limit in seconds\n" -"\n" -"The option string may contain the following character:\n" -" 'j' -- jump to n+101 priority if the authentication was NOT successful\n" -"This application sets the following channel variable upon completion:\n" -" OSPAUTHSTATUS The status of the OSP Auth attempt as a text string, one of\n" -" SUCCESS | FAILED | ERROR\n"; +/* OSP Buffer Sizes */ +#define OSP_INTSTR_SIZE ((unsigned int)16) /* OSP signed/unsigned int string buffer size */ +#define OSP_NORSTR_SIZE ((unsigned int)256) /* OSP normal string buffer size */ +#define OSP_TOKSTR_SIZE ((unsigned int)4096) /* OSP token string buffer size */ + +/* OSP Constants */ +#define OSP_INVALID_HANDLE ((int)-1) /* Invalid OSP handle, provider, transaction etc. */ +#define OSP_CONFIG_FILE ((const char*)"osp.conf") /* OSP configuration file name */ +#define OSP_GENERAL_CAT ((const char*)"general") /* OSP global configuration context name */ +#define OSP_DEF_PROVIDER ((const char*)"default") /* OSP default provider context name */ +#define OSP_MAX_CERTS ((unsigned int)10) /* OSP max number of cacerts */ +#define OSP_MAX_SRVS ((unsigned int)10) /* OSP max number of service points */ +#define OSP_DEF_MAXCONNECTIONS ((unsigned int)20) /* OSP default max_connections */ +#define OSP_MIN_MAXCONNECTIONS ((unsigned int)1) /* OSP min max_connections */ +#define OSP_MAX_MAXCONNECTIONS ((unsigned int)1000) /* OSP max max_connections */ +#define OSP_DEF_RETRYDELAY ((unsigned int)0) /* OSP default retry delay */ +#define OSP_MIN_RETRYDELAY ((unsigned int)0) /* OSP min retry delay */ +#define OSP_MAX_RETRYDELAY ((unsigned int)10) /* OSP max retry delay */ +#define OSP_DEF_RETRYLIMIT ((unsigned int)2) /* OSP default retry times */ +#define OSP_MIN_RETRYLIMIT ((unsigned int)0) /* OSP min retry times */ +#define OSP_MAX_RETRYLIMIT ((unsigned int)100) /* OSP max retry times */ +#define OSP_DEF_TIMEOUT ((unsigned int)500) /* OSP default timeout in ms */ +#define OSP_MIN_TIMEOUT ((unsigned int)200) /* OSP min timeout in ms */ +#define OSP_MAX_TIMEOUT ((unsigned int)10000) /* OSP max timeout in ms */ +#define OSP_DEF_AUTHPOLICY ((enum osp_authpolicy)OSP_AUTH_YES) +#define OSP_AUDIT_URL ((const char*)"localhost") /* OSP default Audit URL */ +#define OSP_LOCAL_VALIDATION ((int)1) /* Validate OSP token locally */ +#define OSP_SSL_LIFETIME ((unsigned int)300) /* SSL life time, in seconds */ +#define OSP_HTTP_PERSISTENCE ((int)1) /* In seconds */ +#define OSP_CUSTOMER_ID ((const char*)"") /* OSP customer ID */ +#define OSP_DEVICE_ID ((const char*)"") /* OSP device ID */ +#define OSP_DEF_DESTINATIONS ((unsigned int)5) /* OSP default max number of destinations */ +#define OSP_DEF_TIMELIMIT ((unsigned int)0) /* OSP default duration limit, no limit */ + +/* OSP Authentication Policy */ +enum osp_authpolicy { + OSP_AUTH_NO, /* Accept any call */ + OSP_AUTH_YES, /* Accept call with valid OSP token or without OSP token */ + OSP_AUTH_EXCLUSIVE /* Only accept call with valid OSP token */ +}; + +/* OSP Provider */ +struct osp_provider { + char name[OSP_NORSTR_SIZE]; /* OSP provider context name */ + char privatekey[OSP_NORSTR_SIZE]; /* OSP private key file name */ + char localcert[OSP_NORSTR_SIZE]; /* OSP local cert file name */ + unsigned int cacount; /* Number of cacerts */ + char cacerts[OSP_MAX_CERTS][OSP_NORSTR_SIZE]; /* Cacert file names */ + unsigned int spcount; /* Number of service points */ + char srvpoints[OSP_MAX_SRVS][OSP_NORSTR_SIZE]; /* Service point URLs */ + int maxconnections; /* Max number of connections */ + int retrydelay; /* Retry delay */ + int retrylimit; /* Retry limit */ + int timeout; /* Timeout in ms */ + char source[OSP_NORSTR_SIZE]; /* IP of self */ + enum osp_authpolicy authpolicy; /* OSP authentication policy */ + OSPTPROVHANDLE handle; /* OSP provider handle */ + struct osp_provider* next; /* Pointer to next OSP provider */ +}; + +/* OSP Application In/Output Results */ +struct osp_result { + int inhandle; /* Inbound transaction handle */ + int outhandle; /* Outbound transaction handle */ + unsigned int intimelimit; /* Inbound duration limit */ + unsigned int outtimelimit; /* Outbound duration limit */ + char tech[20]; /* Asterisk TECH string */ + char dest[OSP_NORSTR_SIZE]; /* Destination in called@IP format */ + char calling[OSP_NORSTR_SIZE]; /* Calling number, may be translated */ + char token[OSP_TOKSTR_SIZE]; /* Outbound OSP token */ + int numresults; /* Number of remain destinations */ +}; + +/* OSP Module Global Variables */ +AST_MUTEX_DEFINE_STATIC(osplock); /* Lock of OSP provider list */ +static int osp_initialized = 0; /* Init flag */ +static int osp_hardware = 0; /* Hardware accelleration flag */ +static struct osp_provider* ospproviders = NULL; /* OSP provider list */ +static unsigned int osp_tokenformat = TOKEN_ALGO_SIGNED; /* Token format supported */ + +/* OSP Client Wrapper APIs */ -static char *app2= "OSPLookup"; -static char *synopsis2 = "Lookup destination by OSP"; -static char *descrip2 = -" OSPLookup(exten[|provider[|options]]): Looks up an extension via OSP and sets\n" -"the variables, where 'n' is the number of the result beginning with 1:\n" -" ${OSPOUTHANDLE}: The OSP Handle for anything remaining\n" -" ${OSPTECH}: The technology to use for the call\n" -" ${OSPDEST}: The destination to use for the call\n" -" ${OSPCALLING}: The calling number to use for the call\n" -" ${OSPOUTTOKEN}: The actual OSP token as a string\n" -" ${OSPOUTTIMELIMIT}: The out_bound call duration limit in seconds\n" -" ${OSPRESULTS}: The number of OSP results total remaining\n" -"\n" -"The option string may contain the following character:\n" -" 'j' -- jump to n+101 priority if the lookup was NOT successful\n" -"This application sets the following channel variable upon completion:\n" -" OSPLOOKUPSTATUS The status of the OSP Lookup attempt as a text string, one of\n" -" SUCCESS | FAILED | ERROR\n"; +/*! + * \brief Create OSP provider handle according to configuration + * \param cfg OSP configuration + * \param provider OSP provider context name + * \return 1 Success, 0 Failed, -1 Error + */ +static int osp_create_provider( + struct ast_config* cfg, /* OSP configuration */ + const char* provider) /* OSP provider context name */ +{ + int res; + unsigned int t, i, j; + struct osp_provider* p; + struct ast_variable* v; + OSPTPRIVATEKEY privatekey; + OSPTCERT localcert; + const char* psrvpoints[OSP_MAX_SRVS]; + OSPTCERT cacerts[OSP_MAX_CERTS]; + const OSPTCERT* pcacerts[OSP_MAX_CERTS]; + int error = OSPC_ERR_NO_ERROR; + + if (!(p = ast_calloc(1, sizeof(*p)))) { + ast_log(LOG_ERROR, "Out of memory\n"); + return -1; + } -static char *app3 = "OSPNext"; -static char *synopsis3 = "Lookup next destination by OSP"; -static char *descrip3 = -" OSPNext(cause[|options]): Looks up the next OSP Destination for ${OSPOUTHANDLE}\n" -"See OSPLookup for more information\n" -"\n" -"The option string may contain the following character:\n" -" 'j' -- jump to n+101 priority if the lookup was NOT successful\n" -"This application sets the following channel variable upon completion:\n" -" OSPNEXTSTATUS The status of the OSP Next attempt as a text string, one of\n" -" SUCCESS | FAILED |ERROR\n"; + ast_copy_string(p->name, provider, sizeof(p->name)); + snprintf(p->privatekey, sizeof(p->privatekey), "%s/%s-privatekey.pem", ast_config_AST_KEY_DIR, provider); + snprintf(p->localcert, sizeof(p->localcert), "%s/%s-localcert.pem", ast_config_AST_KEY_DIR, provider); + p->maxconnections = OSP_DEF_MAXCONNECTIONS; + p->retrydelay = OSP_DEF_RETRYDELAY; + p->retrylimit = OSP_DEF_RETRYLIMIT; + p->timeout = OSP_DEF_TIMEOUT; + p->authpolicy = OSP_DEF_AUTHPOLICY; + p->handle = OSP_INVALID_HANDLE; + + v = ast_variable_browse(cfg, provider); + while(v) { + if (!strcasecmp(v->name, "privatekey")) { + if (v->value[0] == '/') { + ast_copy_string(p->privatekey, v->value, sizeof(p->privatekey)); + } else { + snprintf(p->privatekey, sizeof(p->privatekey), "%s/%s", ast_config_AST_KEY_DIR, v->value); + } + ast_log(LOG_DEBUG, "OSP: privatekey '%s'\n", p->privatekey); + } else if (!strcasecmp(v->name, "localcert")) { + if (v->value[0] == '/') { + ast_copy_string(p->localcert, v->value, sizeof(p->localcert)); + } else { + snprintf(p->localcert, sizeof(p->localcert), "%s/%s", ast_config_AST_KEY_DIR, v->value); + } + ast_log(LOG_DEBUG, "OSP: localcert '%s'\n", p->localcert); + } else if (!strcasecmp(v->name, "cacert")) { + if (p->cacount < OSP_MAX_CERTS) { + if (v->value[0] == '/') { + ast_copy_string(p->cacerts[p->cacount], v->value, sizeof(p->cacerts[0])); + } else { + snprintf(p->cacerts[p->cacount], sizeof(p->cacerts[0]), "%s/%s", ast_config_AST_KEY_DIR, v->value); + } + ast_log(LOG_DEBUG, "OSP: cacert[%d]: '%s'\n", p->cacount, p->cacerts[p->cacount]); + p->cacount++; + } else { + ast_log(LOG_WARNING, "OSP: Too many CA Certificates at line %d\n", v->lineno); + } + } else if (!strcasecmp(v->name, "servicepoint")) { + if (p->spcount < OSP_MAX_SRVS) { + ast_copy_string(p->srvpoints[p->spcount], v->value, sizeof(p->srvpoints[0])); + ast_log(LOG_DEBUG, "OSP: servicepoint[%d]: '%s'\n", p->spcount, p->srvpoints[p->spcount]); + p->spcount++; + } else { + ast_log(LOG_WARNING, "OSP: Too many Service Points at line %d\n", v->lineno); + } + } else if (!strcasecmp(v->name, "maxconnections")) { + if ((sscanf(v->value, "%d", &t) == 1) && (t >= OSP_MIN_MAXCONNECTIONS) && (t <= OSP_MAX_MAXCONNECTIONS)) { + p->maxconnections = t; + ast_log(LOG_DEBUG, "OSP: maxconnections '%d'\n", t); + } else { + ast_log(LOG_WARNING, "OSP: maxconnections should be an integer from %d to %d, not '%s' at line %d\n", + OSP_MIN_MAXCONNECTIONS, OSP_MAX_MAXCONNECTIONS, v->value, v->lineno); + } + } else if (!strcasecmp(v->name, "retrydelay")) { + if ((sscanf(v->value, "%d", &t) == 1) && (t >= OSP_MIN_RETRYDELAY) && (t <= OSP_MAX_RETRYDELAY)) { + p->retrydelay = t; + ast_log(LOG_DEBUG, "OSP: retrydelay '%d'\n", t); + } else { + ast_log(LOG_WARNING, "OSP: retrydelay should be an integer from %d to %d, not '%s' at line %d\n", + OSP_MIN_RETRYDELAY, OSP_MAX_RETRYDELAY, v->value, v->lineno); + } + } else if (!strcasecmp(v->name, "retrylimit")) { + if ((sscanf(v->value, "%d", &t) == 1) && (t >= OSP_MIN_RETRYLIMIT) && (t <= OSP_MAX_RETRYLIMIT)) { + p->retrylimit = t; + ast_log(LOG_DEBUG, "OSP: retrylimit '%d'\n", t); + } else { + ast_log(LOG_WARNING, "OSP: retrylimit should be an integer from %d to %d, not '%s' at line %d\n", + OSP_MIN_RETRYLIMIT, OSP_MAX_RETRYLIMIT, v->value, v->lineno); + } + } else if (!strcasecmp(v->name, "timeout")) { + if ((sscanf(v->value, "%d", &t) == 1) && (t >= OSP_MIN_TIMEOUT) && (t <= OSP_MAX_TIMEOUT)) { + p->timeout = t; + ast_log(LOG_DEBUG, "OSP: timeout '%d'\n", t); + } else { + ast_log(LOG_WARNING, "OSP: timeout should be an integer from %d to %d, not '%s' at line %d\n", + OSP_MIN_TIMEOUT, OSP_MAX_TIMEOUT, v->value, v->lineno); + } + } else if (!strcasecmp(v->name, "source")) { + ast_copy_string(p->source, v->value, sizeof(p->source)); + ast_log(LOG_DEBUG, "OSP: source '%s'\n", p->source); + } else if (!strcasecmp(v->name, "authpolicy")) { + if ((sscanf(v->value, "%d", &t) == 1) && ((t == OSP_AUTH_NO) || (t == OSP_AUTH_YES) || (t == OSP_AUTH_EXCLUSIVE))) { + p->authpolicy = t; + ast_log(LOG_DEBUG, "OSP: authpolicy '%d'\n", t); + } else { + ast_log(LOG_WARNING, "OSP: authpolicy should be %d, %d or %d, not '%s' at line %d\n", + OSP_AUTH_NO, OSP_AUTH_YES, OSP_AUTH_EXCLUSIVE, v->value, v->lineno); + } + } + v = v->next; + } -static char *app4 = "OSPFinish"; -static char *synopsis4 = "Record OSP entry"; -static char *descrip4 = -" OSPFinish([status[|options]]): Records call state for ${OSPINHANDLE}, according to\n" -"status, which should be one of BUSY, CONGESTION, ANSWER, NOANSWER, or CHANUNAVAIL\n" -"or coincidentally, just what the Dial application stores in its ${DIALSTATUS}.\n" -"\n" -"The option string may contain the following character:\n" -" 'j' -- jump to n+101 priority if the finish attempt was NOT successful\n" -"This application sets the following channel variable upon completion:\n" -" OSPFINISHSTATUS The status of the OSP Finish attempt as a text string, one of\n" -" SUCCESS | FAILED |ERROR \n"; + error = OSPPUtilLoadPEMPrivateKey(p->privatekey, &privatekey); + if (error != OSPC_ERR_NO_ERROR) { + ast_log(LOG_WARNING, "OSP: Unable to load privatekey '%s', error '%d'\n", p->privatekey, error); + free(p); + return 0; + } -LOCAL_USER_DECL; + error = OSPPUtilLoadPEMCert(p->localcert, &localcert); + if (error != OSPC_ERR_NO_ERROR) { + ast_log(LOG_WARNING, "OSP: Unable to load localcert '%s', error '%d'\n", p->localcert, error); + if (privatekey.PrivateKeyData) { + free(privatekey.PrivateKeyData); + } + free(p); + return 0; + } + + if (p->cacount < 1) { + snprintf(p->cacerts[p->cacount], sizeof(p->cacerts[0]), "%s/%s-cacert.pem", ast_config_AST_KEY_DIR, provider); + ast_log(LOG_DEBUG, "OSP: cacert[%d]: '%s'\n", p->cacount, p->cacerts[p->cacount]); + p->cacount++; + } + for (i = 0; i < p->cacount; i++) { + error = OSPPUtilLoadPEMCert(p->cacerts[i], &cacerts[i]); + if (error != OSPC_ERR_NO_ERROR) { + ast_log(LOG_WARNING, "OSP: Unable to load cacert '%s', error '%d'\n", p->cacerts[i], error); + for (j = 0; j < i; j++) { + if (cacerts[j].CertData) { + free(cacerts[j].CertData); + } + } + if (localcert.CertData) { + free(localcert.CertData); + } + if (privatekey.PrivateKeyData) { + free(privatekey.PrivateKeyData); + } + free(p); + return 0; + } + pcacerts[i] = &cacerts[i]; + } + + for (i = 0; i < p->spcount; i++) { + psrvpoints[i] = p->srvpoints[i]; + } + + error = OSPPProviderNew( + p->spcount, psrvpoints, + NULL, + OSP_AUDIT_URL, + &privatekey, + &localcert, + p->cacount, pcacerts, + OSP_LOCAL_VALIDATION, + OSP_SSL_LIFETIME, + p->maxconnections, + OSP_HTTP_PERSISTENCE, + p->retrydelay, + p->retrylimit, + p->timeout, + OSP_CUSTOMER_ID, + OSP_DEVICE_ID, + &p->handle); + if (error != OSPC_ERR_NO_ERROR) { + ast_log(LOG_WARNING, "OSP: Unable to create provider '%s', error '%d'\n", provider, error); + free(p); + res = -1; + } else { + ast_log(LOG_DEBUG, "OSP: provider '%s'\n", provider); + ast_mutex_lock(&osplock); + p->next = ospproviders; + ospproviders = p; + ast_mutex_unlock(&osplock); + res = 1; + } + + for (i = 0; i < p->cacount; i++) { + if (cacerts[i].CertData) { + free(cacerts[i].CertData); + } + } + if (localcert.CertData) { + free(localcert.CertData); + } + if (privatekey.PrivateKeyData) { + free(privatekey.PrivateKeyData); + } + + return res; +} + +/*! + * \brief Get OSP authenticiation policy of provider + * \param provider OSP provider context name + * \param policy OSP authentication policy, output + * \return 1 Success, 0 Failed, -1 Error + */ +static int osp_get_policy( + const char* provider, /* OSP provider context name */ + int* policy) /* OSP authentication policy, output */ +{ + int res = 0; + struct osp_provider* p; + + ast_mutex_lock(&osplock); + p = ospproviders; + while(p) { + if (!strcasecmp(p->name, provider)) { + *policy = p->authpolicy; + ast_log(LOG_DEBUG, "OSP: authpolicy '%d'\n", *policy); + res = 1; + break; + } + p = p->next; + } + ast_mutex_unlock(&osplock); + + return res; +} -static int ospauth_exec(struct ast_channel *chan, void *data) +/*! + * \brief Create OSP transaction handle + * \param provider OSP provider context name + * \param transaction OSP transaction handle, output + * \param sourcesize Size of source buffer, in/output + * \param source Source of provider, output + * \return 1 Success, 0 Failed, -1 Error + */ +static int osp_create_transaction( + const char* provider, /* OSP provider context name */ + int* transaction, /* OSP transaction handle, output */ + unsigned int sourcesize, /* Size of source buffer, in/output */ + char* source) /* Source of provider context, output */ { int res = 0; + struct osp_provider* p; + int error; + + ast_mutex_lock(&osplock); + p = ospproviders; + while(p) { + if (!strcasecmp(p->name, provider)) { + error = OSPPTransactionNew(p->handle, transaction); + if (error == OSPC_ERR_NO_ERROR) { + ast_log(LOG_DEBUG, "OSP: transaction '%d'\n", *transaction); + ast_copy_string(source, p->source, sourcesize); + ast_log(LOG_DEBUG, "OSP: source '%s'\n", source); + res = 1; + } else { + *transaction = OSP_INVALID_HANDLE; + ast_log(LOG_DEBUG, "OSP: Unable to create transaction handle, error '%d'\n", error); + res = -1; + } + break; + } + p = p->next; + } + ast_mutex_unlock(&osplock); + + return res; +} + +/*! + * \brief Validate OSP token of inbound call + * \param transaction OSP transaction handle + * \param source Source of inbound call + * \param dest Destination of inbound call + * \param calling Calling number + * \param called Called number + * \param token OSP token, may be empty + * \param timelimit Call duration limit, output + * \return 1 Success, 0 Failed, -1 Error + */ +static int osp_validate_token( + int transaction, /* OSP transaction handle */ + const char* source, /* Source of inbound call */ + const char* dest, /* Destination of inbound call */ + const char* calling, /* Calling number */ + const char* called, /* Called number */ + const char* token, /* OSP token, may be empty */ + unsigned int* timelimit) /* Call duration limit, output */ +{ + int res; + int tokenlen; + char tokenstr[OSP_TOKSTR_SIZE]; + unsigned int authorised; + unsigned int dummy = 0; + int error; + + tokenlen = ast_base64decode(tokenstr, token, strlen(token)); + error = OSPPTransactionValidateAuthorisation( + transaction, + source, dest, NULL, NULL, + calling ? calling : "", OSPC_E164, + called, OSPC_E164, + 0, NULL, + tokenlen, tokenstr, + &authorised, + timelimit, + &dummy, NULL, + osp_tokenformat); + if (error != OSPC_ERR_NO_ERROR) { + ast_log(LOG_DEBUG, "OSP: Unable to validate inbound token\n"); + res = -1; + } else if (authorised) { + ast_log(LOG_DEBUG, "OSP: Authorised\n"); + res = 1; + } else { + ast_log(LOG_DEBUG, "OSP: Unauthorised\n"); + res = 0; + } + + return res; +} + +/*! + * \brief Choose min duration limit + * \param in Inbound duration limit + * \param out Outbound duration limit + * \return min duration limit + */ +static unsigned int osp_choose_timelimit( + unsigned int in, /* Inbound duration timelimit */ + unsigned int out) /* Outbound duration timelimit */ +{ + if (in == OSP_DEF_TIMELIMIT) { + return out; + } else if (out == OSP_DEF_TIMELIMIT) { + return in; + } else { + return in < out ? in : out; + } +} + +/*! + * \brief Choose min duration limit + * \param called Called number + * \param calling Calling number + * \param destination Destination IP in '[x.x.x.x]' format + * \param tokenlen OSP token length + * \param token OSP token + * \param reason Failure reason, output + * \param result OSP lookup results, in/output + * \return 1 Success, 0 Failed, -1 Error + */ +static int osp_check_destination( + const char* called, /* Called number */ + const char* calling, /* Calling number */ + char* destination, /* Destination IP in '[x.x.x.x]' format */ + unsigned int tokenlen, /* OSP token length */ + const char* token, /* OSP token */ + enum OSPEFAILREASON* reason, /* Failure reason, output */ + struct osp_result* result) /* OSP lookup results, in/output */ +{ + int res; + OSPE_DEST_OSP_ENABLED enabled; + OSPE_DEST_PROT protocol; + int error; + + if (strlen(destination) <= 2) { + ast_log(LOG_DEBUG, "OSP: Wrong destination format '%s'\n", destination); + *reason = OSPC_FAIL_NORMAL_UNSPECIFIED; + return -1; + } + + if ((error = OSPPTransactionIsDestOSPEnabled(result->outhandle, &enabled)) != OSPC_ERR_NO_ERROR) { + ast_log(LOG_DEBUG, "OSP: Unable to get destination OSP version, error '%d'\n", error); + *reason = OSPC_FAIL_NORMAL_UNSPECIFIED; + return -1; + } + + if (enabled == OSPE_OSP_FALSE) { + result->token[0] = '\0'; + } else { + ast_base64encode(result->token, token, tokenlen, sizeof(result->token) - 1); + } + + if ((error = OSPPTransactionGetDestProtocol(result->outhandle, &protocol)) != OSPC_ERR_NO_ERROR) { + ast_log(LOG_DEBUG, "OSP: Unable to get destination protocol, error '%d'\n", error); + *reason = OSPC_FAIL_NORMAL_UNSPECIFIED; + result->token[0] = '\0'; + return -1; + } + + res = 1; + /* Strip leading and trailing brackets */ + destination[strlen(destination) - 1] = '\0'; + switch(protocol) { + case OSPE_DEST_PROT_H323_SETUP: + ast_log(LOG_DEBUG, "OSP: protocol '%d'\n", protocol); + ast_copy_string(result->tech, "H323", sizeof(result->tech)); + snprintf(result->dest, sizeof(result->dest), "%s@%s", called, destination + 1); + ast_copy_string(result->calling, calling, sizeof(result->calling)); + break; + case OSPE_DEST_PROT_SIP: + ast_log(LOG_DEBUG, "OSP: protocol '%d'\n", protocol); + ast_copy_string(result->tech, "SIP", sizeof(result->tech)); + snprintf(result->dest, sizeof(result->dest), "%s@%s", called, destination + 1); + ast_copy_string(result->calling, calling, sizeof(result->calling)); + break; + case OSPE_DEST_PROT_IAX: + ast_log(LOG_DEBUG, "OSP: protocol '%d'\n", protocol); + ast_copy_string(result->tech, "IAX", sizeof(result->tech)); + snprintf(result->dest, sizeof(result->dest), "%s@%s", called, destination + 1); + ast_copy_string(result->calling, calling, sizeof(result->calling)); + break; + default: + ast_log(LOG_DEBUG, "OSP: Unknown protocol '%d'\n", protocol); + *reason = OSPC_FAIL_PROTOCOL_ERROR; + result->token[0] = '\0'; + res = 0; + } + + return res; +} + +/*! + * \brief Convert Asterisk status to TC code + * \param cause Asterisk hangup cause + * \return OSP TC code + */ +static enum OSPEFAILREASON asterisk2osp( + int cause) /* Asterisk hangup cause */ +{ + return (enum OSPEFAILREASON)cause; +} + +/*! + * \brief OSP Authentication function + * \param provider OSP provider context name + * \param transaction OSP transaction handle, output + * \param source Source of inbound call + * \param calling Calling number + * \param called Called number + * \param token OSP token, may be empty + * \param timelimit Call duration limit, output + * \return 1 Authenricated, 0 Unauthenticated, -1 Error + */ +static int osp_auth( + const char* provider, /* OSP provider context name */ + int* transaction, /* OSP transaction handle, output */ + const char* source, /* Source of inbound call */ + const char* calling, /* Calling number */ + const char* called, /* Called number */ + const char* token, /* OSP token, may be empty */ + unsigned int* timelimit) /* Call duration limit, output */ +{ + int res; + int policy; + char dest[OSP_NORSTR_SIZE]; + + *transaction = OSP_INVALID_HANDLE; + *timelimit = OSP_DEF_TIMELIMIT; + + if ((res = osp_get_policy(provider, &policy)) <= 0) { + ast_log(LOG_DEBUG, "OSP: Unabe to find OSP authentication policy\n"); + return res; + } + + switch (policy) { + case OSP_AUTH_NO: + res = 1; + break; + case OSP_AUTH_EXCLUSIVE: + if (ast_strlen_zero(token)) { + res = 0; + } else if ((res = osp_create_transaction(provider, transaction, sizeof(dest), dest)) <= 0) { + ast_log(LOG_DEBUG, "OSP: Unable to generate transaction handle\n"); + *transaction = OSP_INVALID_HANDLE; + res = 0; + } else if((res = osp_validate_token(*transaction, source, dest, calling, called, token, timelimit)) <= 0) { + OSPPTransactionRecordFailure(*transaction, OSPC_FAIL_CALL_REJECTED); + } + break; + case OSP_AUTH_YES: + default: + if (ast_strlen_zero(token)) { + res = 1; + } else if ((res = osp_create_transaction(provider, transaction, sizeof(dest), dest)) <= 0) { + ast_log(LOG_DEBUG, "OSP: Unable to generate transaction handle\n"); + *transaction = OSP_INVALID_HANDLE; + res = 0; + } else if((res = osp_validate_token(*transaction, source, dest, calling, called, token, timelimit)) <= 0) { + OSPPTransactionRecordFailure(*transaction, OSPC_FAIL_CALL_REJECTED); + } + break; + } + + return res; +} + +/*! + * \brief OSP Lookup function + * \param provider OSP provider context name + * \param srcdev Source device of outbound call + * \param calling Calling number + * \param called Called number + * \param result Lookup results + * \return 1 Found , 0 No route, -1 Error + */ +static int osp_lookup( + const char* provider, /* OSP provider conttext name */ + const char* srcdev, /* Source device of outbound call */ + const char* calling, /* Calling number */ + const char* called, /* Called number */ + struct osp_result* result) /* OSP lookup results, in/output */ +{ + int res; + char source[OSP_NORSTR_SIZE]; + unsigned int callidlen; + char callid[OSPC_CALLID_MAXSIZE]; + char callingnum[OSP_NORSTR_SIZE]; + char callednum[OSP_NORSTR_SIZE]; + char destination[OSP_NORSTR_SIZE]; + unsigned int tokenlen; + char token[OSP_TOKSTR_SIZE]; + unsigned int dummy = 0; + enum OSPEFAILREASON reason; + int error; + + result->outhandle = OSP_INVALID_HANDLE; + result->tech[0] = '\0'; + result->dest[0] = '\0'; + result->calling[0] = '\0'; + result->token[0] = '\0'; + result->numresults = 0; + result->outtimelimit = OSP_DEF_TIMELIMIT; + + if ((res = osp_create_transaction(provider, &result->outhandle, sizeof(source), source)) <= 0) { + ast_log(LOG_DEBUG, "OSP: Unable to generate transaction handle\n"); + result->outhandle = OSP_INVALID_HANDLE; + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); + } + return -1; + } + + result->numresults = OSP_DEF_DESTINATIONS; + error = OSPPTransactionRequestAuthorisation( + result->outhandle, + source, srcdev, + calling ? calling : "", OSPC_E164, + called, OSPC_E164, + NULL, + 0, NULL, + NULL, + &result->numresults, + &dummy, NULL); + if (error != OSPC_ERR_NO_ERROR) { + ast_log(LOG_DEBUG, "OSP: Unable to request authorization\n"); + result->numresults = 0; + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); + } + return -1; + } + + if (!result->numresults) { + ast_log(LOG_DEBUG, "OSP: No more destination\n"); + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); + } + return 0; + } + + callidlen = sizeof(callid); + tokenlen = sizeof(token); + error = OSPPTransactionGetFirstDestination( + result->outhandle, + 0, NULL, NULL, + &result->outtimelimit, + &callidlen, callid, + sizeof(callednum), callednum, + sizeof(callingnum), callingnum, + sizeof(destination), destination, + 0, NULL, + &tokenlen, token); + if (error != OSPC_ERR_NO_ERROR) { + ast_log(LOG_DEBUG, "OSP: Unable to get first route\n"); + result->numresults = 0; + result->outtimelimit = OSP_DEF_TIMELIMIT; + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); + } + return -1; + } + + result->numresults--; + result->outtimelimit = osp_choose_timelimit(result->intimelimit, result->outtimelimit); + ast_log(LOG_DEBUG, "OSP: outtimelimit '%d'\n", result->outtimelimit); + ast_log(LOG_DEBUG, "OSP: called '%s'\n", callednum); + ast_log(LOG_DEBUG, "OSP: calling '%s'\n", callingnum); + ast_log(LOG_DEBUG, "OSP: destination '%s'\n", destination); + ast_log(LOG_DEBUG, "OSP: token size '%d'\n", tokenlen); + + if ((res = osp_check_destination(callednum, callingnum, destination, tokenlen, token, &reason, result)) > 0) { + return 1; + } + + if (!result->numresults) { + ast_log(LOG_DEBUG, "OSP: No more destination\n"); + result->outtimelimit = OSP_DEF_TIMELIMIT; + OSPPTransactionRecordFailure(result->outhandle, reason); + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); + } + return 0; + } + + while(result->numresults) { + callidlen = sizeof(callid); + tokenlen = sizeof(token); + error = OSPPTransactionGetNextDestination( + result->outhandle, + reason, + 0, NULL, NULL, + &result->outtimelimit, + &callidlen, callid, + sizeof(callednum), callednum, + sizeof(callingnum), callingnum, + sizeof(destination), destination, + 0, NULL, + &tokenlen, token); + if (error == OSPC_ERR_NO_ERROR) { + result->numresults--; + result->outtimelimit = osp_choose_timelimit(result->intimelimit, result->outtimelimit); + ast_log(LOG_DEBUG, "OSP: outtimelimit '%d'\n", result->outtimelimit); + ast_log(LOG_DEBUG, "OSP: called '%s'\n", callednum); + ast_log(LOG_DEBUG, "OSP: calling '%s'\n", callingnum); + ast_log(LOG_DEBUG, "OSP: destination '%s'\n", destination); + ast_log(LOG_DEBUG, "OSP: token size '%d'\n", tokenlen); + if ((res = osp_check_destination(callednum, callingnum, destination, tokenlen, token, &reason, result)) > 0) { + break; + } else if (!result->numresults) { + ast_log(LOG_DEBUG, "OSP: No more destination\n"); + OSPPTransactionRecordFailure(result->outhandle, reason); + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); + } + res = 0; + break; + } + } else { + ast_log(LOG_DEBUG, "OSP: Unable to get route, error '%d'\n", error); + result->numresults = 0; + result->outtimelimit = OSP_DEF_TIMELIMIT; + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); + } + res = -1; + break; + } + } + return res; +} + +/*! + * \brief OSP Lookup Next function + * \param cause Asterisk hangup cuase + * \param result Lookup results, in/output + * \return 1 Found , 0 No route, -1 Error + */ +static int osp_next( + int cause, /* Asterisk hangup cuase */ + struct osp_result* result) /* OSP lookup results, in/output */ +{ + int res; + unsigned int callidlen; + char callid[OSPC_CALLID_MAXSIZE]; + char callingnum[OSP_NORSTR_SIZE]; + char callednum[OSP_NORSTR_SIZE]; + char destination[OSP_NORSTR_SIZE]; + unsigned int tokenlen; + char token[OSP_TOKSTR_SIZE]; + enum OSPEFAILREASON reason; + int error; + + result->tech[0] = '\0'; + result->dest[0] = '\0'; + result->calling[0] = '\0'; + result->token[0] = '\0'; + result->outtimelimit = OSP_DEF_TIMELIMIT; + + if (result->outhandle == OSP_INVALID_HANDLE) { + ast_log(LOG_DEBUG, "OSP: Transaction handle undefined\n"); + result->numresults = 0; + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); + } + return -1; + } + + reason = asterisk2osp(cause); + + if (!result->numresults) { + ast_log(LOG_DEBUG, "OSP: No more destination\n"); + OSPPTransactionRecordFailure(result->outhandle, reason); + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); + } + return 0; + } + + while(result->numresults) { + callidlen = sizeof(callid); + tokenlen = sizeof(token); + error = OSPPTransactionGetNextDestination( + result->outhandle, + reason, + 0, NULL, NULL, + &result->outtimelimit, + &callidlen, callid, + sizeof(callednum), callednum, + sizeof(callingnum), callingnum, + sizeof(destination), destination, + 0, NULL, + &tokenlen, token); + if (error == OSPC_ERR_NO_ERROR) { + result->numresults--; + result->outtimelimit = osp_choose_timelimit(result->intimelimit, result->outtimelimit); + ast_log(LOG_DEBUG, "OSP: outtimelimit '%d'\n", result->outtimelimit); + ast_log(LOG_DEBUG, "OSP: called '%s'\n", callednum); + ast_log(LOG_DEBUG, "OSP: calling '%s'\n", callingnum); + ast_log(LOG_DEBUG, "OSP: destination '%s'\n", destination); + ast_log(LOG_DEBUG, "OSP: token size '%d'\n", tokenlen); + if ((res = osp_check_destination(callednum, callingnum, destination, tokenlen, token, &reason, result)) > 0) { + res = 1; + break; + } else if (!result->numresults) { + ast_log(LOG_DEBUG, "OSP: No more destination\n"); + OSPPTransactionRecordFailure(result->outhandle, reason); + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); + } + res = 0; + break; + } + } else { + ast_log(LOG_DEBUG, "OSP: Unable to get route, error '%d'\n", error); + result->token[0] = '\0'; + result->numresults = 0; + result->outtimelimit = OSP_DEF_TIMELIMIT; + if (result->inhandle != OSP_INVALID_HANDLE) { + OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); + } + res = -1; + break; + } + } + + return res; +} + +/*! + * \brief OSP Finish function + * \param handle OSP in/outbound transaction handle + * \param recorded If failure reason has been recorded + * \param cause Asterisk hangup cause + * \param start Call start time + * \param connect Call connect time + * \param end Call end time + * \param release Who release first, 0 source, 1 destination + * \return 1 Success, 0 Failed, -1 Error + */ +static int osp_finish( + int handle, /* OSP in/outbound transaction handle */ + int recorded, /* If failure reason has been recorded */ + int cause, /* Asterisk hangup cause */ + time_t start, /* Call start time */ + time_t connect, /* Call connect time */ + time_t end, /* Call end time */ + unsigned int release) /* Who release first, 0 source, 1 destination */ +{ + int res; + enum OSPEFAILREASON reason; + time_t alert = 0; + unsigned isPddInfoPresent = 0; + unsigned pdd = 0; + unsigned char* confId = ""; + unsigned int dummy = 0; + int error; + + if (handle == OSP_INVALID_HANDLE) { + return 0; + } + + if (!recorded) { + reason = asterisk2osp(cause); + OSPPTransactionRecordFailure(handle, reason); + } + + error = OSPPTransactionReportUsage( + handle, + difftime(end, connect), start, end, alert, connect, + isPddInfoPresent, pdd, + release, + confId, + 0, 0, 0, 0, + &dummy, NULL); + if (error == OSPC_ERR_NO_ERROR) { + ast_log(LOG_DEBUG, "OSP: Usage reported\n"); + res = 1; + } else { + ast_log(LOG_DEBUG, "OSP: Unable to report usage, error '%d'\n", error); + res = -1; + } + OSPPTransactionDelete(handle); + + return res; +} + +/* OSP Application APIs */ + +/*! + * \brief OSP Application OSPAuth + * \param chan Channel + * \param data Parameter + * \return 0 Success, -1 Failed + */ +static int ospauth_exec(struct ast_channel* chan, void* data) +{ + int res; struct localuser* u; - char* provider = OSP_DEF_PROVIDER; + const char* provider = OSP_DEF_PROVIDER; int priority_jump = 0; struct varshead* headp; struct ast_var_t* current; @@ -126,9 +988,9 @@ static int ospauth_exec(struct ast_channel *chan, void *data) const char* token = ""; int handle; unsigned int timelimit; - char* tmp; char buffer[OSP_INTSTR_SIZE]; - char* status; + const char* status; + char* tmp; AST_DECLARE_APP_ARGS(args, AST_APP_ARG(provider); @@ -137,7 +999,11 @@ static int ospauth_exec(struct ast_channel *chan, void *data) LOCAL_USER_ADD(u); - tmp = ast_strdupa(data); + if (!(tmp = ast_strdupa(data))) { + ast_log(LOG_ERROR, "Out of memory\n"); + LOCAL_USER_REMOVE(u); + return -1; + } AST_STANDARD_APP_ARGS(args, tmp); @@ -146,10 +1012,8 @@ static int ospauth_exec(struct ast_channel *chan, void *data) } ast_log(LOG_DEBUG, "OSPAuth: provider '%s'\n", provider); - if (args.options) { - if (strchr(args.options, 'j')) { - priority_jump = 1; - } + if ((args.options) && (strchr(args.options, 'j'))) { + priority_jump = 1; } ast_log(LOG_DEBUG, "OSPAuth: priority jump '%d'\n", priority_jump); @@ -164,16 +1028,15 @@ static int ospauth_exec(struct ast_channel *chan, void *data) ast_log(LOG_DEBUG, "OSPAuth: source '%s'\n", source); ast_log(LOG_DEBUG, "OSPAuth: token size '%zd'\n", strlen(token)); - res = ast_osp_auth(provider, &handle, source, chan->cid.cid_num, chan->exten, token, &timelimit); - if (res > 0) { - status = OSP_APP_SUCCESS; + + if ((res = osp_auth(provider, &handle, source, chan->cid.cid_num, chan->exten, token, &timelimit)) > 0) { + status = AST_OSP_SUCCESS; } else { timelimit = OSP_DEF_TIMELIMIT; if (!res) { - status = OSP_APP_FAILED; + status = AST_OSP_FAILED; } else { - handle = OSP_INVALID_HANDLE; - status = OSP_APP_ERROR; + status = AST_OSP_ERROR; } } @@ -186,34 +1049,41 @@ static int ospauth_exec(struct ast_channel *chan, void *data) pbx_builtin_setvar_helper(chan, "OSPAUTHSTATUS", status); ast_log(LOG_DEBUG, "OSPAuth: %s\n", status); - if(!res) { + if(res <= 0) { if (priority_jump || ast_opt_priority_jumping) { ast_goto_if_exists(chan, chan->context, chan->exten, chan->priority + 101); + res = 0; } else { res = -1; } - } else if (res > 0) { + } else { res = 0; } LOCAL_USER_REMOVE(u); - return(res); + return res; } -static int osplookup_exec(struct ast_channel *chan, void *data) +/*! + * \brief OSP Application OSPLookup + * \param chan Channel + * \param data Parameter + * \return 0 Success, -1 Failed + */ +static int osplookup_exec(struct ast_channel* chan, void* data) { - int res = 0; + int res, cres; struct localuser* u; - char* provider = OSP_DEF_PROVIDER; + const char* provider = OSP_DEF_PROVIDER; int priority_jump = 0; struct varshead* headp; struct ast_var_t* current; const char* srcdev = ""; - char* tmp; char buffer[OSP_TOKSTR_SIZE]; - struct ast_osp_result result; - char* status; + struct osp_result result; + const char* status; + char* tmp; AST_DECLARE_APP_ARGS(args, AST_APP_ARG(exten); @@ -223,12 +1093,16 @@ static int osplookup_exec(struct ast_channel *chan, void *data) if (ast_strlen_zero(data)) { ast_log(LOG_WARNING, "OSPLookup: Arg required, OSPLookup(exten[|provider[|options]])\n"); - return(-1); + return -1; } LOCAL_USER_ADD(u); - tmp = ast_strdupa(data); + if (!(tmp = ast_strdupa(data))) { + ast_log(LOG_ERROR, "Out of memory\n"); + LOCAL_USER_REMOVE(u); + return -1; + } AST_STANDARD_APP_ARGS(args, tmp); @@ -239,14 +1113,13 @@ static int osplookup_exec(struct ast_channel *chan, void *data) } ast_log(LOG_DEBUG, "OSPlookup: provider '%s'\n", provider); - if (args.options) { - if (strchr(args.options, 'j')) { - priority_jump = 1; - } + if ((args.options) && (strchr(args.options, 'j'))) { + priority_jump = 1; } ast_log(LOG_DEBUG, "OSPLookup: priority jump '%d'\n", priority_jump); result.inhandle = OSP_INVALID_HANDLE; + result.intimelimit = OSP_DEF_TIMELIMIT; headp = &chan->varshead; AST_LIST_TRAVERSE(headp, current, entries) { @@ -265,10 +1138,14 @@ static int osplookup_exec(struct ast_channel *chan, void *data) ast_log(LOG_DEBUG, "OSPLookup: OSPINHANDLE '%d'\n", result.inhandle); ast_log(LOG_DEBUG, "OSPLookup: OSPINTIMELIMIT '%d'\n", result.intimelimit); ast_log(LOG_DEBUG, "OSPLookup: source device '%s'\n", srcdev); + + if ((cres = ast_autoservice_start(chan)) < 0) { + LOCAL_USER_REMOVE(u); + return -1; + } - res = ast_osp_lookup(provider, srcdev, chan->cid.cid_num, args.exten, &result); - if (res > 0) { - status = OSP_APP_SUCCESS; + if ((res = osp_lookup(provider, srcdev, chan->cid.cid_num, args.exten, &result)) > 0) { + status = AST_OSP_SUCCESS; } else { result.tech[0] = '\0'; result.dest[0] = '\0'; @@ -277,10 +1154,9 @@ static int osplookup_exec(struct ast_channel *chan, void *data) result.numresults = 0; result.outtimelimit = OSP_DEF_TIMELIMIT; if (!res) { - status = OSP_APP_FAILED; + status = AST_OSP_FAILED; } else { - result.outhandle = OSP_INVALID_HANDLE; - status = OSP_APP_ERROR; + status = AST_OSP_ERROR; } } @@ -295,11 +1171,6 @@ static int osplookup_exec(struct ast_channel *chan, void *data) ast_log(LOG_DEBUG, "OSPLookup: OSPCALLING '%s'\n", result.calling); pbx_builtin_setvar_helper(chan, "OSPOUTTOKEN", result.token); ast_log(LOG_DEBUG, "OSPLookup: OSPOUTTOKEN size '%zd'\n", strlen(result.token)); - if (!ast_strlen_zero(result.token)) { - snprintf(buffer, sizeof(buffer), "P-OSP-Auth-Token: %s", result.token); - pbx_builtin_setvar_helper(chan, "_SIPADDHEADER", buffer); - ast_log(LOG_DEBUG, "OSPLookup: SIPADDHEADER size '%zd'\n", strlen(buffer)); - } snprintf(buffer, sizeof(buffer), "%d", result.numresults); pbx_builtin_setvar_helper(chan, "OSPRESULTS", buffer); ast_log(LOG_DEBUG, "OSPLookup: OSPRESULTS '%s'\n", buffer); @@ -309,58 +1180,55 @@ static int osplookup_exec(struct ast_channel *chan, void *data) pbx_builtin_setvar_helper(chan, "OSPLOOKUPSTATUS", status); ast_log(LOG_DEBUG, "OSPLookup: %s\n", status); - if(!res) { + if (!strcasecmp(result.tech, "SIP")) { + if (!ast_strlen_zero(result.token)) { + snprintf(buffer, sizeof(buffer), "P-OSP-Auth-Token: %s", result.token); + pbx_builtin_setvar_helper(chan, "_SIPADDHEADER", buffer); + ast_log(LOG_DEBUG, "OSPLookup: SIPADDHEADER size '%zd'\n", strlen(buffer)); + } + } else if (!strcasecmp(result.tech, "H323")) { + } else if (!strcasecmp(result.tech, "IAX")) { + } + + if ((cres = ast_autoservice_stop(chan)) < 0) { + LOCAL_USER_REMOVE(u); + return -1; + } + + if(res <= 0) { if (priority_jump || ast_opt_priority_jumping) { ast_goto_if_exists(chan, chan->context, chan->exten, chan->priority + 101); + res = 0; } else { res = -1; } - } else if (res > 0) { + } else { res = 0; } LOCAL_USER_REMOVE(u); - return(res); -} - -static int str2cause(char *str) -{ - int cause = AST_CAUSE_NORMAL; - - if (ast_strlen_zero(str)) { - cause = AST_CAUSE_NOTDEFINED; - } else if (!strcasecmp(str, "BUSY")) { - cause = AST_CAUSE_BUSY; - } else if (!strcasecmp(str, "CONGESTION")) { - cause = AST_CAUSE_CONGESTION; - } else if (!strcasecmp(str, "ANSWER")) { - cause = AST_CAUSE_NORMAL; - } else if (!strcasecmp(str, "CANCEL")) { - cause = AST_CAUSE_NORMAL; - } else if (!strcasecmp(str, "NOANSWER")) { - cause = AST_CAUSE_NOANSWER; - } else if (!strcasecmp(str, "NOCHANAVAIL")) { - cause = AST_CAUSE_CONGESTION; - } else { - ast_log(LOG_WARNING, "OSP: Unknown cause '%s', using NORMAL\n", str); - } - - return(cause); + return res; } -static int ospnext_exec(struct ast_channel *chan, void *data) +/*! + * \brief OSP Application OSPNext + * \param chan Channel + * \param data Parameter + * \return 0 Success, -1 Failed + */ +static int ospnext_exec(struct ast_channel* chan, void* data) { - int res=0; - struct localuser *u; + int res; + struct localuser* u; int priority_jump = 0; - int cause; + int cause = 0; struct varshead* headp; struct ast_var_t* current; - struct ast_osp_result result; - char *tmp; + struct osp_result result; char buffer[OSP_TOKSTR_SIZE]; - char* status; + const char* status; + char* tmp; AST_DECLARE_APP_ARGS(args, AST_APP_ARG(cause); @@ -369,26 +1237,32 @@ static int ospnext_exec(struct ast_channel *chan, void *data) if (ast_strlen_zero(data)) { ast_log(LOG_WARNING, "OSPNext: Arg required, OSPNext(cause[|options])\n"); - return(-1); + return -1; } LOCAL_USER_ADD(u); - tmp = ast_strdupa(data); + if (!(tmp = ast_strdupa(data))) { + ast_log(LOG_ERROR, "Out of memory\n"); + LOCAL_USER_REMOVE(u); + return -1; + } AST_STANDARD_APP_ARGS(args, tmp); - cause = str2cause(args.cause); + if (!ast_strlen_zero(args.cause) && sscanf(args.cause, "%d", &cause) != 1) { + cause = 0; + } ast_log(LOG_DEBUG, "OSPNext: cause '%d'\n", cause); - if (args.options) { - if (strchr(args.options, 'j')) - priority_jump = 1; + if ((args.options) && (strchr(args.options, 'j'))) { + priority_jump = 1; } ast_log(LOG_DEBUG, "OSPNext: priority jump '%d'\n", priority_jump); result.inhandle = OSP_INVALID_HANDLE; result.outhandle = OSP_INVALID_HANDLE; + result.intimelimit = OSP_DEF_TIMELIMIT; result.numresults = 0; headp = &chan->varshead; @@ -401,7 +1275,7 @@ static int ospnext_exec(struct ast_channel *chan, void *data) if (sscanf(ast_var_value(current), "%d", &result.outhandle) != 1) { result.outhandle = OSP_INVALID_HANDLE; } - } else if (!strcasecmp(ast_var_name(current), "OSPINTIMEOUT")) { + } else if (!strcasecmp(ast_var_name(current), "OSPINTIMELIMIT")) { if (sscanf(ast_var_value(current), "%d", &result.intimelimit) != 1) { result.intimelimit = OSP_DEF_TIMELIMIT; } @@ -416,8 +1290,8 @@ static int ospnext_exec(struct ast_channel *chan, void *data) ast_log(LOG_DEBUG, "OSPNext: OSPINTIMELIMIT '%d'\n", result.intimelimit); ast_log(LOG_DEBUG, "OSPNext: OSPRESULTS '%d'\n", result.numresults); - if ((res = ast_osp_next(cause, &result)) > 0) { - status = OSP_APP_SUCCESS; + if ((res = osp_next(cause, &result)) > 0) { + status = AST_OSP_SUCCESS; } else { result.tech[0] = '\0'; result.dest[0] = '\0'; @@ -426,10 +1300,9 @@ static int ospnext_exec(struct ast_channel *chan, void *data) result.numresults = 0; result.outtimelimit = OSP_DEF_TIMELIMIT; if (!res) { - status = OSP_APP_FAILED; + status = AST_OSP_FAILED; } else { - result.outhandle = OSP_INVALID_HANDLE; - status = OSP_APP_ERROR; + status = AST_OSP_ERROR; } } @@ -441,11 +1314,6 @@ static int ospnext_exec(struct ast_channel *chan, void *data) ast_log(LOG_DEBUG, "OSPNext: OSPCALLING '%s'\n", result.calling); pbx_builtin_setvar_helper(chan, "OSPOUTTOKEN", result.token); ast_log(LOG_DEBUG, "OSPNext: OSPOUTTOKEN size '%zd'\n", strlen(result.token)); - if (!ast_strlen_zero(result.token)) { - snprintf(buffer, sizeof(buffer), "P-OSP-Auth-Token: %s", result.token); - pbx_builtin_setvar_helper(chan, "_SIPADDHEADER", buffer); - ast_log(LOG_DEBUG, "OSPNext: SIPADDHEADER size '%zd'\n", strlen(buffer)); - } snprintf(buffer, sizeof(buffer), "%d", result.numresults); pbx_builtin_setvar_helper(chan, "OSPRESULTS", buffer); ast_log(LOG_DEBUG, "OSPNext: OSPRESULTS '%s'\n", buffer); @@ -455,52 +1323,72 @@ static int ospnext_exec(struct ast_channel *chan, void *data) pbx_builtin_setvar_helper(chan, "OSPNEXTSTATUS", status); ast_log(LOG_DEBUG, "OSPNext: %s\n", status); - if(!res) { + if (!strcasecmp(result.tech, "SIP")) { + if (!ast_strlen_zero(result.token)) { + snprintf(buffer, sizeof(buffer), "P-OSP-Auth-Token: %s", result.token); + pbx_builtin_setvar_helper(chan, "_SIPADDHEADER", buffer); + ast_log(LOG_DEBUG, "OSPLookup: SIPADDHEADER size '%zd'\n", strlen(buffer)); + } + } else if (!strcasecmp(result.tech, "H323")) { + } else if (!strcasecmp(result.tech, "IAX")) { + } + + if(res <= 0) { if (priority_jump || ast_opt_priority_jumping) { ast_goto_if_exists(chan, chan->context, chan->exten, chan->priority + 101); + res = 0; } else { res = -1; } - } else if (res > 0) { + } else { res = 0; } LOCAL_USER_REMOVE(u); - return(res); + return res; } -static int ospfinished_exec(struct ast_channel *chan, void *data) +/*! + * \brief OSP Application OSPFinish + * \param chan Channel + * \param data Parameter + * \return 0 Success, -1 Failed + */ +static int ospfinished_exec(struct ast_channel* chan, void* data) { int res = 1; struct localuser* u; int priority_jump = 0; - int cause; + int cause = 0; struct varshead* headp; struct ast_var_t* current; int inhandle = OSP_INVALID_HANDLE; int outhandle = OSP_INVALID_HANDLE; int recorded = 0; time_t start, connect, end; - char* tmp; - char* str = ""; + unsigned int release; char buffer[OSP_INTSTR_SIZE]; - char* status; + const char* status; + char* tmp; AST_DECLARE_APP_ARGS(args, - AST_APP_ARG(status); + AST_APP_ARG(cause); AST_APP_ARG(options); ); LOCAL_USER_ADD(u); - tmp = ast_strdupa(data); + if (!(tmp = ast_strdupa(data))) { + ast_log(LOG_ERROR, "Out of memory\n"); + LOCAL_USER_REMOVE(u); + return -1; + } AST_STANDARD_APP_ARGS(args, tmp); - if (args.options) { - if (strchr(args.options, 'j')) - priority_jump = 1; + if ((args.options) && (strchr(args.options, 'j'))) { + priority_jump = 1; } ast_log(LOG_DEBUG, "OSPFinish: priority jump '%d'\n", priority_jump); @@ -519,7 +1407,7 @@ static int ospfinished_exec(struct ast_channel *chan, void *data) !strcasecmp(ast_var_name(current), "OSPLOOKUPSTATUS") || !strcasecmp(ast_var_name(current), "OSPNEXTSTATUS"))) { - if (strcasecmp(ast_var_value(current), OSP_APP_SUCCESS)) { + if (strcasecmp(ast_var_value(current), AST_OSP_SUCCESS)) { recorded = 1; } } @@ -528,10 +1416,9 @@ static int ospfinished_exec(struct ast_channel *chan, void *data) ast_log(LOG_DEBUG, "OSPFinish: OSPOUTHANDLE '%d'\n", outhandle); ast_log(LOG_DEBUG, "OSPFinish: recorded '%d'\n", recorded); - if (!recorded) { - str = args.status; + if (!ast_strlen_zero(args.cause) && sscanf(args.cause, "%d", &cause) != 1) { + cause = 0; } - cause = str2cause(str); ast_log(LOG_DEBUG, "OSPFinish: cause '%d'\n", cause); if (chan->cdr) { @@ -551,55 +1438,288 @@ static int ospfinished_exec(struct ast_channel *chan, void *data) ast_log(LOG_DEBUG, "OSPFinish: connect '%ld'\n", connect); ast_log(LOG_DEBUG, "OSPFinish: end '%ld'\n", end); - if (ast_osp_finish(outhandle, cause, start, connect, end) <= 0) { - ast_log(LOG_DEBUG, "OSPFinish: Unable to report usage for out_bound call\n"); + release = chan->_softhangup ? 0 : 1; + + if (osp_finish(outhandle, recorded, cause, start, connect, end, release) <= 0) { + ast_log(LOG_DEBUG, "OSPFinish: Unable to report usage for outbound call\n"); + } + switch (cause) { + case AST_CAUSE_NORMAL_CLEARING: + break; + default: + cause = AST_CAUSE_NO_ROUTE_DESTINATION; + break; } - if (ast_osp_finish(inhandle, cause, start, connect, end) <= 0) { - ast_log(LOG_DEBUG, "OSPFinish: Unable to report usage for in_bound call\n"); + if (osp_finish(inhandle, recorded, cause, start, connect, end, release) <= 0) { + ast_log(LOG_DEBUG, "OSPFinish: Unable to report usage for inbound call\n"); } snprintf(buffer, sizeof(buffer), "%d", OSP_INVALID_HANDLE); pbx_builtin_setvar_helper(chan, "OSPOUTHANDLE", buffer); pbx_builtin_setvar_helper(chan, "OSPINHANDLE", buffer); if (res > 0) { - status = OSP_APP_SUCCESS; + status = AST_OSP_SUCCESS; } else if (!res) { - status = OSP_APP_FAILED; + status = AST_OSP_FAILED; } else { - status = OSP_APP_ERROR; + status = AST_OSP_ERROR; } pbx_builtin_setvar_helper(chan, "OSPFINISHSTATUS", status); if(!res) { if (priority_jump || ast_opt_priority_jumping) { ast_goto_if_exists(chan, chan->context, chan->exten, chan->priority + 101); + res = 0; } else { res = -1; } - } else if (res > 0) { + } else { res = 0; } LOCAL_USER_REMOVE(u); - return(res); + return res; +} + +/* OSP Module APIs */ + +static int osp_load(void) +{ + char* t; + unsigned int v; + struct ast_config* cfg; + int error = OSPC_ERR_NO_ERROR; + + cfg = ast_config_load(OSP_CONFIG_FILE); + if (cfg) { + t = ast_variable_retrieve(cfg, OSP_GENERAL_CAT, "accelerate"); + if (t && ast_true(t)) { + if ((error = OSPPInit(1)) != OSPC_ERR_NO_ERROR) { + ast_log(LOG_WARNING, "OSP: Unable to enable hardware accelleration\n"); + OSPPInit(0); + } else { + osp_hardware = 1; + } + } else { + OSPPInit(0); + } + ast_log(LOG_DEBUG, "OSP: osp_hardware '%d'\n", osp_hardware); + + t = ast_variable_retrieve(cfg, OSP_GENERAL_CAT, "tokenformat"); + if (t) { + if ((sscanf(t, "%d", &v) == 1) && + ((v == TOKEN_ALGO_SIGNED) || (v == TOKEN_ALGO_UNSIGNED) || (v == TOKEN_ALGO_BOTH))) + { + osp_tokenformat = v; + } else { + ast_log(LOG_WARNING, "tokenformat should be an integer from %d, %d or %d, not '%s'\n", + TOKEN_ALGO_SIGNED, TOKEN_ALGO_UNSIGNED, TOKEN_ALGO_BOTH, t); + } + } + ast_log(LOG_DEBUG, "OSP: osp_tokenformat '%d'\n", osp_tokenformat); + + t = ast_category_browse(cfg, NULL); + while(t) { + if (strcasecmp(t, OSP_GENERAL_CAT)) { + osp_create_provider(cfg, t); + } + t = ast_category_browse(cfg, t); + } + + osp_initialized = 1; + + ast_config_destroy(cfg); + } else { + ast_log(LOG_WARNING, "OSP: Unable to find configuration. OSP support disabled\n"); + } + ast_log(LOG_DEBUG, "OSP: osp_initialized '%d'\n", osp_initialized); + + return 0; } -static int load_module(void *mod) +static int osp_unload(void) +{ + struct osp_provider* p; + struct osp_provider* next; + + if (osp_initialized) { + ast_mutex_lock(&osplock); + p = ospproviders; + while(p) { + next = p->next; + OSPPProviderDelete(p->handle, 0); + free(p); + p = next; + } + ospproviders = NULL; + ast_mutex_unlock(&osplock); + + OSPPCleanup(); + + osp_tokenformat = TOKEN_ALGO_SIGNED; + osp_hardware = 0; + osp_initialized = 0; + } + return 0; +} + +static int osp_show(int fd, int argc, char* argv[]) +{ + int i; + int found = 0; + struct osp_provider* p; + const char* provider = NULL; + const char* tokenalgo; + + if ((argc < 2) || (argc > 3)) { + return RESULT_SHOWUSAGE; + } + if (argc > 2) { + provider = argv[2]; + } + if (!provider) { + switch (osp_tokenformat) { + case TOKEN_ALGO_BOTH: + tokenalgo = "Both"; + break; + case TOKEN_ALGO_UNSIGNED: + tokenalgo = "Unsigned"; + break; + case TOKEN_ALGO_SIGNED: + default: + tokenalgo = "Signed"; + break; + } + ast_cli(fd, "OSP: %s %s %s\n", + osp_initialized ? "Initialized" : "Uninitialized", osp_hardware ? "Accelerated" : "Normal", tokenalgo); + } + + ast_mutex_lock(&osplock); + p = ospproviders; + while(p) { + if (!provider || !strcasecmp(p->name, provider)) { + if (found) { + ast_cli(fd, "\n"); + } + ast_cli(fd, " == OSP Provider '%s' == \n", p->name); + ast_cli(fd, "Local Private Key: %s\n", p->privatekey); + ast_cli(fd, "Local Certificate: %s\n", p->localcert); + for (i = 0; i < p->cacount; i++) { + ast_cli(fd, "CA Certificate %d: %s\n", i + 1, p->cacerts[i]); + } + for (i = 0; i < p->spcount; i++) { + ast_cli(fd, "Service Point %d: %s\n", i + 1, p->srvpoints[i]); + } + ast_cli(fd, "Max Connections: %d\n", p->maxconnections); + ast_cli(fd, "Retry Delay: %d seconds\n", p->retrydelay); + ast_cli(fd, "Retry Limit: %d\n", p->retrylimit); + ast_cli(fd, "Timeout: %d milliseconds\n", p->timeout); + ast_cli(fd, "Source: %s\n", strlen(p->source) ? p->source : "<unspecified>"); + ast_cli(fd, "Auth Policy %d\n", p->authpolicy); + ast_cli(fd, "OSP Handle: %d\n", p->handle); + found++; + } + p = p->next; + } + ast_mutex_unlock(&osplock); + + if (!found) { + if (provider) { + ast_cli(fd, "Unable to find OSP provider '%s'\n", provider); + } else { + ast_cli(fd, "No OSP providers configured\n"); + } + } + return RESULT_SUCCESS; +} + +static const char* app1= "OSPAuth"; +static const char* synopsis1 = "OSP authentication"; +static const char* descrip1 = +" OSPAuth([provider[|options]]): Authenticate a SIP INVITE by OSP and sets\n" +"the variables:\n" +" ${OSPINHANDLE}: The inbound call transaction handle\n" +" ${OSPINTIMELIMIT}: The inbound call duration limit in seconds\n" +"\n" +"The option string may contain the following character:\n" +" 'j' -- jump to n+101 priority if the authentication was NOT successful\n" +"This application sets the following channel variable upon completion:\n" +" OSPAUTHSTATUS The status of the OSP Auth attempt as a text string, one of\n" +" SUCCESS | FAILED | ERROR\n"; + +static const char* app2= "OSPLookup"; +static const char* synopsis2 = "Lookup destination by OSP"; +static const char* descrip2 = +" OSPLookup(exten[|provider[|options]]): Looks up an extension via OSP and sets\n" +"the variables, where 'n' is the number of the result beginning with 1:\n" +" ${OSPOUTHANDLE}: The OSP Handle for anything remaining\n" +" ${OSPTECH}: The technology to use for the call\n" +" ${OSPDEST}: The destination to use for the call\n" +" ${OSPCALLING}: The calling number to use for the call\n" +" ${OSPOUTTOKEN}: The actual OSP token as a string\n" +" ${OSPOUTTIMELIMIT}: The outbound call duration limit in seconds\n" +" ${OSPRESULTS}: The number of OSP results total remaining\n" +"\n" +"The option string may contain the following character:\n" +" 'j' -- jump to n+101 priority if the lookup was NOT successful\n" +"This application sets the following channel variable upon completion:\n" +" OSPLOOKUPSTATUS The status of the OSP Lookup attempt as a text string, one of\n" +" SUCCESS | FAILED | ERROR\n"; + +static const char* app3 = "OSPNext"; +static const char* synopsis3 = "Lookup next destination by OSP"; +static const char* descrip3 = +" OSPNext(cause[|options]): Looks up the next OSP Destination for ${OSPOUTHANDLE}\n" +"See OSPLookup for more information\n" +"\n" +"The option string may contain the following character:\n" +" 'j' -- jump to n+101 priority if the lookup was NOT successful\n" +"This application sets the following channel variable upon completion:\n" +" OSPNEXTSTATUS The status of the OSP Next attempt as a text string, one of\n" +" SUCCESS | FAILED |ERROR\n"; + +static const char* app4 = "OSPFinish"; +static const char* synopsis4 = "Record OSP entry"; +static const char* descrip4 = +" OSPFinish([status[|options]]): Records call state for ${OSPINHANDLE}, according to\n" +"status, which should be one of BUSY, CONGESTION, ANSWER, NOANSWER, or CHANUNAVAIL\n" +"or coincidentally, just what the Dial application stores in its ${DIALSTATUS}.\n" +"\n" +"The option string may contain the following character:\n" +" 'j' -- jump to n+101 priority if the finish attempt was NOT successful\n" +"This application sets the following channel variable upon completion:\n" +" OSPFINISHSTATUS The status of the OSP Finish attempt as a text string, one of\n" +" SUCCESS | FAILED |ERROR \n"; + +static const char osp_usage[] = +"Usage: osp show\n" +" Displays information on Open Settlement Protocol support\n"; + +static struct ast_cli_entry osp_cli = { + {"osp", "show", NULL}, + osp_show, + "Displays OSP information", + osp_usage +}; + +LOCAL_USER_DECL; + +static int load_module(void* mod) { int res; - ast_osp_adduse(); - - res = ast_register_application(app1, ospauth_exec, synopsis1, descrip1); + osp_load(); + res = ast_cli_register(&osp_cli); + res |= ast_register_application(app1, ospauth_exec, synopsis1, descrip1); res |= ast_register_application(app2, osplookup_exec, synopsis2, descrip2); res |= ast_register_application(app3, ospnext_exec, synopsis3, descrip3); res |= ast_register_application(app4, ospfinished_exec, synopsis4, descrip4); - return(res); + return res; } -static int unload_module(void *mod) +static int unload_module(void* mod) { int res; @@ -607,24 +1727,29 @@ static int unload_module(void *mod) res |= ast_unregister_application(app3); res |= ast_unregister_application(app2); res |= ast_unregister_application(app1); + res |= ast_cli_unregister(&osp_cli); + osp_unload(); STANDARD_HANGUP_LOCALUSERS; - ast_osp_deluse(); + return res; +} - return(res); +static int reload(void* mod) +{ + osp_unload(); + osp_load(); + return 0; } -static const char *description(void) +static const char* description(void) { return "Open Settlement Protocol Applications"; } -static const char *key(void) +static const char* key(void) { - return(ASTERISK_GPL_KEY); + return ASTERISK_GPL_KEY; } -STD_MOD1; - - +STD_MOD(MOD_1, reload, NULL, NULL); diff --git a/doc/osp.txt b/doc/osp.txt new file mode 100644 index 0000000000000000000000000000000000000000..465fcf1b1dcb9bd2ccad61409c8ebba59beb19f7 --- /dev/null +++ b/doc/osp.txt @@ -0,0 +1,463 @@ +Asterisk OSP Module User Guide + +June 16, 2006 + +Table of Contents +1 Introduction +2 OSP Toolkit +2.1 Build OSP Toolkit +2.1.1 Unpacking the Toolkit +2.1.2 Preparing to build the OSP Toolkit +2.1.3 Building the OSP Toolkit +2.1.4 Installing the OSP Toolkit +2.1.5 Building the Enrollment Utility +2.2 Obtain Crypto Files +3 Asterisk +3.1 OSP Support Implementation +3.1.1 OSPAuth +3.1.2 OSPLookup +3.1.3 OSPNext +3.1.4 OSPFinish +3.2 Build with OSP Support +3.3 Configure with OSP Support +3.3.1 osp.conf +3.3.2 zapata/sip/iax.conf +3.3.3 extensions.conf + +Asterisk is a trademark of Digium, Inc. +TransNexus and OSP Secured are trademarks of TransNexus, Inc. + +1 Introduction + This document provides instructions on how to build and configure Asterisk + V1.4 with the OSP Toolkit to enable secure, multi-lateral peering. The OSP + Toolkit is an open source implementation of the OSP peering protocol and is + freely available from www.sipfoundry.org. The OSP standard defined by the + European Telecommunications Standards Institute (ETSI TS 101 321) + www.esti.org. If you have questions or need help, building Asterisk with the + OSP Toolkit, please post your question on the OSP mailing list at + https://list.sipfoundry.org/mailman/listinfo/osp. + +2 OSP Toolkit + Please reference the OSP Toolkit document "How to Build and Test the OSP + Toolkit" available from www.sipfoundry.org/OSP/OSPclient . + +2.1 Build OSP Toolkit + The software listed below is required ti build and use the OSP Toolkit: + * OpenSSL (required for building) - Open Source SSL protocol and + Cryptographic Algorithms (version 0.9.7g recommended) from www.openssl.org. + Pre-compiled OpenSSL binary packages are not recommended because of the + binary compatibility issue. + * Perl (required for building) - A programming language used by OpenSSL for + compilation. Any version of Perl should work. One version of Perl is + available from www.activestate.com/ActivePerl. If pre-compiled OpenSSL + packages are used, Perl package is not required. + * C compiler (required for building) - Any C compiler should work. The GNU + Compiler Collection from www.gnu.org is routinely used for building the OSP + Toolkit for testing. + * OSP Server (required for testing) - Access to any OSP server should work. + Open source OSP servers are available from www.sipfoundry.org/osp, a free + commercial OSP server may be downloaded from www.transnexus.com and an OSP + server osptestserver.transnexus.com is freely available on the internet for + testing for testing. Please contact support@transnexus.com for testing access + to osptestserver.transnexus.com. + +2.1.1 Unpacking the Toolkit + After downloading the OSP Toolkit (version 3.3.4 or later release) from + www.sipfoundry.org, perform the following steps in order: + 1) Copy the OSP Toolkit distribution into the directory where it will reside, + say /usr/src. + 2) Un-package the distribution file by executing the following command: + gunzip -c OSPToolkit-###.tar.gz | tar xvf - + Where ### is the version number separated by underlines. For example, if + the version is 3.3.4, then the above command would be: + gunzip -c OSPToolkit-3_3_4.tar.gz | tar xvf - + A new directory (TK-3_3_4-20051103) will be created within the same directory + as the tar file. + 3) Go to the TK-3_3_4-20051103 directory by running this command: + cd TK-3_3_4-20051103 + Within this directory, you will find directories and files similar to what is + listed below if the command "ls -F" is executed): + ls -F + enroll/ + RelNotes.txt lib/ + README.txt license.txt + bin/ src/ + crypto/ test/ + include/ + +2.1.2 Preparing to build the OSP Toolkit + 4) Compile OpenSSL according to the instructions provided with the OpenSSL + distribution (You would need to do this only if you don't have openssl + already). + 5) Copy the OpenSSL header files (the *.h files) into the crypto/openssl + directory within the osptoolkit directory. The OpenSSL header files are + located under the openssl/include/openssl directory. + 6) Copy the OpenSSL library files (libcrypto.a and libssl.a) into the lib + directory within the osptoolkit directory. The OpenSSL library files are + located under the openssl directory. + Note: Since the Asterisk requires the OpenSSL package. If the OpenSSL package + has been installed, 4~6 are not necessary. + +2.1.3 Building the OSP Toolkit + 7) Optionally, change the install directory of the OSP Toolkit. Open the + Makefile in the /usr/src/TK-3_3_4-20051103/src directory, look for the + install path variable - INSTALL_PATH, and edit it to be anywhere you want + (defaults /usr/local). + Note: Please change the install path variable only if you are familiar with + both the OSP Toolkit and the Asterisk. Otherwise, it may case that the + Asterisk does not support the OSP protocol. + 8) From within the OSP Toolkit directory (/usr/src/TK-3_3_4-20051103), start + the compilation script by executing the following commands: + cd src + make clean; make build + +2.1.4 Installing the OSP Toolkit + The header files and the library of the OSP Toolkit should be installed. + Otherwise, you must specify the OSP Toolkit path for the Asterisk. + 9) Use the same script to install the Toolkit. + make install + The make script is also used to install the OSP Toolkit header files and the + library into the INSTALL_PATH specified in the Makefile. + Note: Please make sure you have the rights to access the INSTALL_PATH + directory. For example, in order to access /usr/local directory, normally, + you should be root. + By default, the OSP Toolkit is compiled in the production mode. The following + table identifies which default features are activated with each compile + option: + Default Feature Production Development + Debug Information Displayed No Yes + The "Development" option is recommended for a first time build. The CFLAGS + definition in the Makefile must be modified to build in development mode. + +2.1.5 Building the Enrollment Utility + Device enrollment is the process of establishing a trusted cryptographic + relationship between the VoIP device and the OSP Server. The Enroll program + is a utility application for establishing a trusted relationship between and + OSP client and an OSP server. Please see the document "Device Enrollment" at + www.sipfoundry.org/OSP/OSPclient for more information about the enroll + application. + 10) From within the OSP Toolkit directory (/usr/src/TK-3_3_4-20051103), + execute the following commands at the command prompt: + cd enroll + make clean; make linux + Compilation is successful if there are no errors anywhere in the compiler + output. The enroll program is now located in the + /usr/src/TK-3_3_4-20051103/bin directory. By this point, a fully functioning + OSP Toolkit should have been successfully built. + +2.2 Obtain Crypto Files + The OSP module in Asterisk requires three crypto files containing local + certificate (localcert.pem), private key (pkey.pem), and CA certificate + (cacert_0.pem). Asterisk will try to load the files from the Asterisk + public/private key directory - /var/lib/asterisk/key. If the files are not + present, the OSP module will not start and the Asterisk will not support the + OSP protocol. Use the enroll.sh script from the toolkit distribution to + enroll the Asterisk OSP module with an OSP server to obtain the crypto files. + Documentation explaining how to use the enroll.sh script (Device Enrollment) + to enroll with an OSP server is available at + www.sipfoundry.org/OSP/ospclient. Copy the files file generated by the + enrollment process to the Asterisk configuration directory. + Note: The osptestserver.transnexus.com is configured only for sending and + receiving non-SSL messages, and issuing signed tokens. If you need help, post + a message on the OSP mailing list of www.sipfoundry.org or send an e-mail to + support@transnexus.com. + The enroll.sh script takes the domain name or IP addresses of the OSP servers + that the OSP Toolkit needs to enroll with as arguments, and then generates + pem files - cacert_#.pem, certreq.pem, localcert.pem, and pkey.pem. The '#' + in the cacert file name is used to differentiate the ca certificate file + names for the various SP's (OSP servers). If only one address is provided at + the command line, cacert_0.pem will be generated. If 2 addresses are provided + at the command line, 2 files will be generated - cacert_0.pem and + cacert_1.pem, one for each SP. The example below shows the usage when the + client is registering with osptestserver.transnexus.com. If all goes well, + the following text will be displayed. The gray boxes indicate required input. + ./enroll.sh osptestserver.transnexus.com + Generating a 512 bit RSA private key + ........................++++++++++++ + .........++++++++++++ + writing new private key to 'pkey.pem' + ----- + You are about to be asked to enter information that will be incorporated + into your certificate request. + What you are about to enter is what is called a Distinguished Name or a DN. + There are quite a few fields but you can leave some blank + For some fields there will be a default value, + If you enter '.', the field will be left blank. + ----- + Country Name (2 letter code) [AU]: _______ + State or Province Name (full name) [Some-State]: _______ + Locality Name (eg, city) []:_______ + Organization Name (eg, company) [Internet Widgits Pty Ltd]: _______ + Organizational Unit Name (eg, section) []:_______ + Common Name (eg, YOUR name) []:_______ + Email Address []:_______ + + Please enter the following 'extra' attributes + to be sent with your certificate request + A challenge password []:_______ + An optional company name []:_______ + + Error Code returned from openssl command : 0 + + CA certificate received + [SP: osptestserver.transnexus.com]Error Code returned from getcacert command : 0 + + output buffer after operation: operation=request + output buffer after nonce: operation=request&nonce=1655976791184458 + X509 CertInfo context is null pointer + Unable to get Local Certificate + depth=0 /CN=osptestserver.transnexus.com/O=OSPServer + verify error:num=18:self signed certificate + verify return:1 + depth=0 /CN=osptestserver.transnexus.com/O=OSPServer + verify return:1 + The certificate request was successful. + Error Code returned from localcert command : 0 + The files generated should be copied to the /var/lib/asterisk/key + directory. + Note: The script enroll.sh requires AT&T korn shell (ksh) or any of its + compatible variants. The /usr/src/TK-3_3_4-20051103/bin directory should be + in the PATH variable. Otherwise, enroll.sh cannot find the enroll file. + +3 Asterisk + +3.1 OSP Support Implementation + In Asterisk, all OSP support is implemented as dial plan functions. + +3.1.1 OSPAuth + OSP token validation function. + Input: + * OSPPEERIP: last hop IP address + * OSPINTOKEN: inbound OSP token + * provider: OSP service provider configured in osp.conf. If it is empty, + default provider is used. + * priority jump + Output: + * OSPINHANDLE: inbound OSP transaction handle + * OSPINTIMELIMIT: inbound call duration limit + * OSPAUTHSTATUS: OSPAuth return value. SUCCESS/FAILED/ERROR + +3.1.2 OSPLookup + OSP lookup function. + Input: + * OSPPEERIP: last hop IP address + * OSPINHANDLE: inbound OSP transaction handle + * OSPINTIMELIMIT: inbound call duration limit + * exten: called number + * provider: OSP service provider configured in osp.conf. If it is empty, + default provider is used. + * priority jump + Output: + * OSPOUTHANDLE: outbound transaction handle + * OSPTECH: outbound protocol + * OSPDEST: outbound destination + * OSPCALLING: outbound calling number + * OSPOUTTOKEN: outbound OSP token + * OSPRESULTS: number of remain destinations + * OSPOUTTIMELIMIT: outbound call duration limit + * OSPLOOKUPSTATUS: OSPLookup return value. SUCCESS/FAILED/ERROR + +3.1.3 OSPNext + OSP lookup next function. + Input: + * OSPINHANDLE: inbound transaction handle + * OSPOUTHANDLE: outbound transaction handle + * OSPINTIMELIMIT: inbound call duration limit + * OSPRESULTS: number of remain destinations + * cause: last destination disconnect cause + * priority jump + Output: + * OSPTECH: outbound protocol + * OSPDEST: outbound destination + * OSPCALLING: outbound calling number + * OSPOUTTOKEN: outbound OSP token + * OSPRESULTS: number of remain destinations + * OSPOUTTIMELIMIT: outbound call duration limit + * OSPNEXTSTATUS: OSPLookup return value. SUCCESS/FAILED/ERROR + +3.1.4 OSPFinish + OSP report usage function. + Input: + * OSPINHANDLE: inbound transaction handle + * OSPOUTHANDLE: outbound transaction handle + * OSPAUTHSTATUS: OSPAuth return value + * OSPLOOKUPTSTATUS: OSPLookup return value + * OSPNEXTSTATUS: OSPNext return value + * cause: last destination disconnect cause + * priority jump + Output: + * OSPFINISHSTATUS: OSPLookup return value. SUCCESS/FAILED/ERROR + +3.2 Build with OSP Support + If the OSP Toolkit is installed in the default install directory, /usr/local, + no additional configuration is required. If the OSP Toolkit is installed in + another directory, say /myosp, Asterisk must be configured with the location + of the OSP Toolkit. + --with-osptk=/myosp + Note: Please change the install path only if you familiar with both the OSP + Toolkit and the Asterisk. Otherwise, the change may results Asterisk not + supporting the OSP protocol. + Now, you can compile Asterisk according to the instructions provided with the + Asterisk distribution. + +3.3 Configure with OSP Support + +3.3.1 osp.conf + ; + ; Open Settlement Protocol Sample Configuration File + ; + ; This file contains configuration of providers that + ; are used by the OSP subsystem of Asterisk. The section + ; "general" is reserved for global options. Each other + ; section declares an OSP Provider. The provider "default" + ; is used when no provider is otherwise specified. + ; + [general] + ; + ; Should hardware accelleration be enabled? May not be changed + ; on a reload. + ; + accelerate=no + ; + ; Defines the token format that Asterisk can validate. + ; 0 - signed tokens only + ; 1 - unsigned tokens only + ; 2 - both signed and unsigned + ; The defaults to 0, i.e. the Asterisk can validate signed tokens only. + ; + tokenformat=0 + ; + [default] + ; + ; All paths are presumed to be under /var/lib/asterisk/keys unless + ; the path begins with '/' + ; + ; Specify the private keyfile. If unspecified, defaults to the name + ; of the section followed by "-privatekey.pem" (e.g. default-privatekey.pem) + ; + privatekey=pkey.pem + ; + ; Specify the local certificate file. If unspecified, defaults to + ; the name of the section followed by "-localcert.pem" + ; + localcert=localcert.pem + ; + ; Specify one or more Certificate Authority keys. If none are listed, + ; a single one is added with the name "-cacert.pem" + ; + cacert=cacert_0.pem + ; + ; Specific parameters can be tuned as well: + ; + ; maxconnections: Max number of simultaneous connections to the provider (default=20) + ; retrydelay: Extra delay between retries (default=0) + ; retrylimit: Max number of retries before giving up (default=2) + ; timeout: Timeout for response in milliseconds (default=500) + ; + maxconnections=20 + retrydelay=0 + retrylimit=2 + timeout=500 + ; + ; List all service points for this provider + ; + ;servicepoint=http://osptestserver.transnexus.com:1080/osp + servicepoint=http://OSP server IP:1080/osp + ; + ; Set the "source" for requesting authorization + ; + ;source=foo + source=[host IP] + ; + ; Set the authentication policy. + ; 0 - NO + ; 1 - YES + ; 2 - EXCLUSIVE + ; Default is 1, validate token but allow no token. + ; + authpolicy=1 + +3.3.2 zapata/sip/iax.conf + There is no configuration required for OSP. + +3.3.3 extensions.conf + An Asterisk box can be configured as OSP source/destination gateway or OSP proxy. + +3.3.3.1 OSP Source Gateway + [PhoneSrcGW] + ; Set calling number if necessary + exten => _XXXX.,1,Set(CALLERID(numner)=CallingNumber) + ; OSP lookup using default provider, if fail/error jump to 2+101 + exten => _XXXX.,2,OSPLookup(${EXTEN}||j) + ; Set calling number which may be translated + exten => _XXXX.,3,Set(CALLERID(number)=${OSPCALLING}) + ; Dial to destination, 60 timeout, with call duration limit + exten => _XXXX.,4,Dial(${OSPTECH}/${OSPDEST},60,oL($[${OSPOUTTIMELIMIT}*1000])) + ; Wait 3 seconds + exten => _XXXX.,5,Wait,3 + ; Hangup + exten => _XXXX.,6,Hangup + ; Deal with OSPLookup fail/error + exten => _XXXX.,2+101,Hangup + ; OSP report usage + exten => h,1,OSPFinish(${HANGUPCAUSE}) + 3.3.3.2 OSP Destination Gateway + [PhoneDstGW] + ; Get peer IP + exten => _XXXX.,1,Set(OSPPEERIP=${SIPCHANINFO(peerip)}) + ; Get OSP token + exten => _XXXX.,2,Set(OSPINTOKEN=${SIP_HEADER(P-OSP-Auth-Token)}) + ; Validate token using default provider, if fail/error jump to 3+101 + exten => _XXXX.,3,OSPAuth(|j) + ; Ringing + exten => _XXXX.,4,Ringing + ; Wait 1 second + exten => _XXXX.,5,Wait,1 + ; Dial phone, timeout 15 seconds, with call duration limit + exten => _XXXX.,6,Dial(${DIALOUTANALOG}/${EXTEN:1},15,oL($[${OSPINTIMELIMIT}*1000])) + ; Wait 3 seconds + exten => _XXXX.,7,Wait,3 + ; Hangup + exten => _XXXX.,8,Hangup + ; Deal with OSPAuth fail/error + exten => _XXXX.,3+101,Hangup + ; OSP report usage + exten => h,1,OSPFinish(${HANGUPCAUSE}) + 3.3.3.3 Proxy + [GeneralProxy] + ; Get peer IP + exten => _XXXX.,1,Set(OSPPEERIP=${SIPCHANINFO(peerip)}) + ; Get OSP token + exten => _XXXX.,2,Set(OSPINTOKEN=${SIP_HEADER(P-OSP-Auth-Token)}) + ; Validate token using default provider, if fail/error jump to 3+101 + exten => _XXXX.,3,OSPAuth(|j) + ; OSP lookup using default provider, if fail/error jump to 4+101 + exten => _XXXX.,4,OSPLookup(${EXTEN}||j) + ; Set calling number which may be translated + exten => _XXXX.,5,Set(CALLERID(number)=${OSPCALLING}) + ; Dial to 1st destination, 60 timeout, with call duration limit + exten => _XXXX.,6,Dial(${OSPTECH}/${OSPDEST},24,oL($[${OSPOUTTIMELIMIT}*1000])) + ; OSP lookup next, if fail/error jump to 7+101 + exten => _XXXX.,7,OSPNext(${HANGUPCAUSE}||j) + ; Set calling number which may be translated + exten => _XXXX.,8,Set(CALLERID(number)=${OSPCALLING}) + ; Dial to 2nd destination, 60 timeout, with call duration limit + exten => _XXXX.,9,Dial(${OSPTECH}/${OSPDEST},25,oL($[${OSPOUTTIMELIMIT}*1000])) + ; OSP lookup next, if fail/error jump to 10+101 + exten => _XXXX.,10,OSPNext(${HANGUPCAUSE}||j) + ; Set calling number which may be translated + exten => _XXXX.,11,Set(CALLERID(number)=${OSPCALLING}) + ; Dial to 3rd destination, 60 timeout, with call duration limit + exten => _XXXX.,12,Dial(${OSPTECH}/${OSPDEST},26,oL($[${OSPOUTTIMELIMIT}*1000])) + ; Hangup + exten => _XXXX.,13,Hangup + ; Deal with OSPAuth fail/error + exten => _XXXX.,3+101,Hangup + ; Deal with OSPLookup fail/error + exten => _XXXX.,4+101,Hangup + ; Deal with 1st OSPNext fail/error + exten => _XXXX.,7+101,Hangup + ; Deal with 2nd OSPNext fail/error + exten => _XXXX.,10+101,Hangup + ; OSP report usage + exten => h,1,OSPFinish(${HANGUPCAUSE}) diff --git a/include/asterisk/astosp.h b/include/asterisk/astosp.h index 6861dca1b1cdd10a2a550d092e727a54b7589ccf..75ee76fc5b22278d3459cb3aa4195fd1bc12c251 100644 --- a/include/asterisk/astosp.h +++ b/include/asterisk/astosp.h @@ -18,110 +18,14 @@ /*! * \file - * \brief OSP support (Open Settlement Protocol) + * \brief Open Settlement Protocol (OSP) */ #ifndef _ASTERISK_OSP_H #define _ASTERISK_OSP_H -#include <time.h> -#include <netinet/in.h> - -#include "asterisk/channel.h" - -#define OSP_DEF_PROVIDER ((char*)"default") /* Default provider context name */ -#define OSP_INVALID_HANDLE ((int)-1) /* Invalid OSP handle, provider, transaction etc. */ -#define OSP_DEF_TIMELIMIT ((unsigned int)0) /* Default duration limit, no limit */ - -#define OSP_INTSTR_SIZE ((unsigned int)16) /* Signed/unsigned int string buffer size */ -#define OSP_NORSTR_SIZE ((unsigned int)256) /* Normal string buffer size */ -#define OSP_TOKSTR_SIZE ((unsigned int)4096) /* Token string buffer size */ - -#define OSP_APP_SUCCESS ((char*)"SUCCESS") /* Return status, success */ -#define OSP_APP_FAILED ((char*)"FAILED") /* Return status, failed */ -#define OSP_APP_ERROR ((char*)"ERROR") /* Return status, error */ - -struct ast_osp_result { - int inhandle; - int outhandle; - unsigned int intimelimit; - unsigned int outtimelimit; - char tech[20]; - char dest[OSP_NORSTR_SIZE]; - char calling[OSP_NORSTR_SIZE]; - char token[OSP_TOKSTR_SIZE]; - int numresults; -}; - -/*! - * \brief OSP Increase Use Count function - */ -void ast_osp_adduse(void); -/*! - * \brief OSP Decrease Use Count function - */ -void ast_osp_deluse(void); -/*! - * \brief OSP Authentication function - * \param provider OSP provider context name - * \param transaction OSP transaction handle, output - * \param source Source of in_bound call - * \param calling Calling number - * \param called Called number - * \param token OSP token, may be empty - * \param timelimit Call duration limit, output - * \return 1 Authenricated, 0 Unauthenticated, -1 Error - */ -int ast_osp_auth( - const char* provider, /* OSP provider context name */ - int* transaction, /* OSP transaction handle, output */ - const char* source, /* Source of in_bound call */ - const char* calling, /* Calling number */ - const char* called, /* Called number */ - const char* token, /* OSP token, may be empty */ - unsigned int* timelimit /* Call duration limit, output */ -); -/*! - * \brief OSP Lookup function - * \param provider OSP provider context name - * \param srcdev Source device of out_bound call - * \param calling Calling number - * \param called Called number - * \param result Lookup results - * \return 1 Found , 0 No route, -1 Error - */ -int ast_osp_lookup( - const char* provider, /* OSP provider conttext name */ - const char* srcdev, /* Source device of out_bound call */ - const char* calling, /* Calling number */ - const char* called, /* Called number */ - struct ast_osp_result* result /* OSP lookup results, in/output */ -); -/*! - * \brief OSP Next function - * \param reason Last destination failure reason - * \param result Lookup results, in/output - * \return 1 Found , 0 No route, -1 Error - */ -int ast_osp_next( - int reason, /* Last destination failure reason */ - struct ast_osp_result *result /* OSP lookup results, in/output */ -); -/*! - * \brief OSP Finish function - * \param handle OSP in/out_bound transaction handle - * \param reason Last destination failure reason - * \param start Call start time - * \param connect Call connect time - * \param end Call end time - * \return 1 Success, 0 Failed, -1 Error - */ -int ast_osp_finish( - int handle, /* OSP in/out_bound transaction handle */ - int reason, /* Last destination failure reason */ - time_t start, /* Call start time */ - time_t connect, /* Call connect time */ - time_t end /* Call end time */ -); +#define AST_OSP_SUCCESS ((char*)"SUCCESS") /* Return status, success */ +#define AST_OSP_FAILED ((char*)"FAILED") /* Return status, failed */ +#define AST_OSP_ERROR ((char*)"ERROR") /* Return status, error */ #endif /* _ASTERISK_OSP_H */ diff --git a/res/res_osp.c b/res/res_osp.c deleted file mode 100644 index 62115db4bf14cff9c303d90ae1c666549ff4510b..0000000000000000000000000000000000000000 --- a/res/res_osp.c +++ /dev/null @@ -1,1114 +0,0 @@ -/* - * Asterisk -- An open source telephony toolkit. - * - * Copyright (C) 1999 - 2006, Digium, Inc. - * - * Mark Spencer <markster@digium.com> - * - * See http://www.asterisk.org for more information about - * the Asterisk project. Please do not directly contact - * any of the maintainers of this project for assistance; - * the project provides a web site, mailing lists and IRC - * channels for your use. - * - * This program is free software, distributed under the terms of - * the GNU General Public License Version 2. See the LICENSE file - * at the top of the source tree. - */ - -/*! - * \file - * \brief Provide Open Settlement Protocol capability - * - * \author Mark Spencer <markster@digium.com> - * - * \arg See also: \ref app_osplookup.c - */ - -/*** MODULEINFO - <depend>libosptk</depend> - <depend>ssl</depend> - ***/ - -#include "asterisk.h" - -ASTERISK_FILE_VERSION(__FILE__, "$Revision$") - -#include <sys/types.h> -#include <osp/osp.h> -#include <osp/osputils.h> -#include <openssl/err.h> -#include <stdio.h> -#include <dirent.h> -#include <string.h> -#include <errno.h> -#include <unistd.h> -#include <fcntl.h> -#include <openssl/bio.h> -#include <openssl/pem.h> -#include <openssl/evp.h> - -#include "asterisk/file.h" -#include "asterisk/channel.h" -#include "asterisk/logger.h" -#include "asterisk/say.h" -#include "asterisk/module.h" -#include "asterisk/options.h" -#include "asterisk/crypto.h" -#include "asterisk/md5.h" -#include "asterisk/cli.h" -#include "asterisk/io.h" -#include "asterisk/lock.h" -#include "asterisk/astosp.h" -#include "asterisk/config.h" -#include "asterisk/utils.h" -#include "asterisk/lock.h" -#include "asterisk/causes.h" -#include "asterisk/callerid.h" -#include "asterisk/pbx.h" - -/* OSP Authentication Policy */ -enum osp_authpolicy { - OSP_AUTH_NO, - OSP_AUTH_YES, - OSP_AUTH_EXCLUSIVE -}; - -#define OSP_CONFIG_FILE ((char*)"osp.conf") -#define OSP_GENERAL_CAT ((char*)"general") -#define OSP_MAX_CERTS ((unsigned int)10) -#define OSP_MAX_SRVS ((unsigned int)10) -#define OSP_DEF_MAXCONNECTIONS ((unsigned int)20) -#define OSP_MIN_MAXCONNECTIONS ((unsigned int)1) -#define OSP_MAX_MAXCONNECTIONS ((unsigned int)1000) -#define OSP_DEF_RETRYDELAY ((unsigned int)0) -#define OSP_MIN_RETRYDELAY ((unsigned int)0) -#define OSP_MAX_RETRYDELAY ((unsigned int)10) -#define OSP_DEF_RETRYLIMIT ((unsigned int)2) -#define OSP_MIN_RETRYLIMIT ((unsigned int)0) -#define OSP_MAX_RETRYLIMIT ((unsigned int)100) -#define OSP_DEF_TIMEOUT ((unsigned int)500) -#define OSP_MIN_TIMEOUT ((unsigned int)200) -#define OSP_MAX_TIMEOUT ((unsigned int)10000) -#define OSP_DEF_AUTHPOLICY ((enum osp_authpolicy)OSP_AUTH_YES) -#define OSP_AUDIT_URL ((char*)"localhost") -#define OSP_LOCAL_VALIDATION ((int)1) -#define OSP_SSL_LIFETIME ((unsigned int)300) -#define OSP_HTTP_PERSISTENCE ((int)1) -#define OSP_CUSTOMER_ID ((char*)"") -#define OSP_DEVICE_ID ((char*)"") -#define OSP_DEF_DESTINATIONS ((unsigned int)5) - -struct osp_provider { - char name[OSP_NORSTR_SIZE]; - char privatekey[OSP_NORSTR_SIZE]; - char localcert[OSP_NORSTR_SIZE]; - unsigned int cacount; - char cacerts[OSP_MAX_CERTS][OSP_NORSTR_SIZE]; - unsigned int spcount; - char srvpoints[OSP_MAX_SRVS][OSP_NORSTR_SIZE]; - int maxconnections; - int retrydelay; - int retrylimit; - int timeout; - char source[OSP_NORSTR_SIZE]; - enum osp_authpolicy authpolicy; - OSPTPROVHANDLE handle; - struct osp_provider *next; -}; - -AST_MUTEX_DEFINE_STATIC(osplock); -static unsigned int osp_usecount = 0; -static int osp_initialized = 0; -static int osp_hardware = 0; -static struct osp_provider* ospproviders = NULL; -static unsigned int osp_tokenformat = TOKEN_ALGO_SIGNED; - -static int osp_buildProvider( - struct ast_config* cfg, /* OSP configuration */ - char* provider); /* OSP provider context name */ -static int osp_getPolicy( - const char* provider, /* OSP provider context name */ - int* policy); /* OSP authentication policy, output */ -static int osp_genTransaction( - const char* provider, /* OSP provider context name */ - int* transaction, /* OSP transaction handle, output */ - unsigned int sourcesize, /* Size of source buffer, in/output */ - char* source); /* Source of provider context, output */ -static int osp_valToken( - int transaction, /* OSP transaction handle */ - const char* source, /* Source of in_bound call */ - const char* dest, /* Destination of in_bound call */ - const char* calling, /* Calling number */ - const char* called, /* Called number */ - const char* token, /* OSP token, may be empty */ - unsigned int* timelimit); /* Call duration limit, output */ -static unsigned int osp_choTimelimit( - unsigned int in, /* In_bound OSP timelimit */ - unsigned int out); /* Out_bound OSP timelimit */ -static enum OSPEFAILREASON reason2cause( - int reason); /* Last call failure reason */ -static int osp_chkDest( - const char* callednum, /* Called number */ - const char* callingnum, /* Calling number */ - char* destination, /* Destination IP in OSP format */ - unsigned int tokenlen, /* OSP token length */ - const char* token, /* OSP token */ - enum OSPEFAILREASON* cause, /* Failure cause, output */ - struct ast_osp_result* result); /* OSP lookup results, in/output */ - -static int osp_load(void); -static int osp_unload(void); -static int osp_show(int fd, int argc, char *argv[]); - -static int osp_buildProvider( - struct ast_config *cfg, /* OSP configuration */ - char* provider) /* OSP provider context name */ -{ - int res; - unsigned int t, i, j; - struct osp_provider* p; - struct ast_variable* v; - OSPTPRIVATEKEY privatekey; - OSPTCERT localcert; - const char* psrvpoints[OSP_MAX_SRVS]; - OSPTCERT cacerts[OSP_MAX_CERTS]; - const OSPTCERT* pcacerts[OSP_MAX_CERTS]; - int error = OSPC_ERR_NO_ERROR; - - p = ast_calloc(1, sizeof(*p)); - if (!p) { - return(-1); - } - - ast_copy_string(p->name, provider, sizeof(p->name)); - p->handle = OSP_INVALID_HANDLE; - snprintf(p->privatekey, sizeof(p->privatekey), "%s/%s-privatekey.pem", ast_config_AST_KEY_DIR, provider); - snprintf(p->localcert, sizeof(p->localcert), "%s/%s-localcert.pem", ast_config_AST_KEY_DIR, provider); - p->maxconnections = OSP_DEF_MAXCONNECTIONS; - p->retrydelay = OSP_DEF_RETRYDELAY; - p->retrylimit = OSP_DEF_RETRYLIMIT; - p->timeout = OSP_DEF_TIMEOUT; - p->authpolicy = OSP_DEF_AUTHPOLICY; - - v = ast_variable_browse(cfg, provider); - while(v) { - if (!strcasecmp(v->name, "privatekey")) { - if (v->value[0] == '/') { - ast_copy_string(p->privatekey, v->value, sizeof(p->privatekey)); - } else { - snprintf(p->privatekey, sizeof(p->privatekey), "%s/%s", ast_config_AST_KEY_DIR, v->value); - } - ast_log(LOG_DEBUG, "OSP: privatekey '%s'\n", p->privatekey); - } else if (!strcasecmp(v->name, "localcert")) { - if (v->value[0] == '/') { - ast_copy_string(p->localcert, v->value, sizeof(p->localcert)); - } else { - snprintf(p->localcert, sizeof(p->localcert), "%s/%s", ast_config_AST_KEY_DIR, v->value); - } - ast_log(LOG_DEBUG, "OSP: localcert '%s'\n", p->localcert); - } else if (!strcasecmp(v->name, "cacert")) { - if (p->cacount < OSP_MAX_CERTS) { - if (v->value[0] == '/') { - ast_copy_string(p->cacerts[p->cacount], v->value, sizeof(p->cacerts[0])); - } else { - snprintf(p->cacerts[p->cacount], sizeof(p->cacerts[0]), "%s/%s", ast_config_AST_KEY_DIR, v->value); - } - ast_log(LOG_DEBUG, "OSP: cacert[%d]: '%s'\n", p->cacount, p->cacerts[p->cacount]); - p->cacount++; - } else { - ast_log(LOG_WARNING, "OSP: Too many CA Certificates at line %d\n", v->lineno); - } - } else if (!strcasecmp(v->name, "servicepoint")) { - if (p->spcount < OSP_MAX_SRVS) { - ast_copy_string(p->srvpoints[p->spcount], v->value, sizeof(p->srvpoints[0])); - ast_log(LOG_DEBUG, "OSP: servicepoint[%d]: '%s'\n", p->spcount, p->srvpoints[p->spcount]); - p->spcount++; - } else { - ast_log(LOG_WARNING, "OSP: Too many Service Points at line %d\n", v->lineno); - } - } else if (!strcasecmp(v->name, "maxconnections")) { - if ((sscanf(v->value, "%d", &t) == 1) && (t >= OSP_MIN_MAXCONNECTIONS) && (t <= OSP_MAX_MAXCONNECTIONS)) { - p->maxconnections = t; - ast_log(LOG_DEBUG, "OSP: maxconnections '%d'\n", t); - } else { - ast_log(LOG_WARNING, "OSP: maxconnections should be an integer from %d to %d, not '%s' at line %d\n", - OSP_MIN_MAXCONNECTIONS, OSP_MAX_MAXCONNECTIONS, v->value, v->lineno); - } - } else if (!strcasecmp(v->name, "retrydelay")) { - if ((sscanf(v->value, "%d", &t) == 1) && (t >= OSP_MIN_RETRYDELAY) && (t <= OSP_MAX_RETRYDELAY)) { - p->retrydelay = t; - ast_log(LOG_DEBUG, "OSP: retrydelay '%d'\n", t); - } else { - ast_log(LOG_WARNING, "OSP: retrydelay should be an integer from %d to %d, not '%s' at line %d\n", - OSP_MIN_RETRYDELAY, OSP_MAX_RETRYDELAY, v->value, v->lineno); - } - } else if (!strcasecmp(v->name, "retrylimit")) { - if ((sscanf(v->value, "%d", &t) == 1) && (t >= OSP_MIN_RETRYLIMIT) && (t <= OSP_MAX_RETRYLIMIT)) { - p->retrylimit = t; - ast_log(LOG_DEBUG, "OSP: retrylimit '%d'\n", t); - } else { - ast_log(LOG_WARNING, "OSP: retrylimit should be an integer from %d to %d, not '%s' at line %d\n", - OSP_MIN_RETRYLIMIT, OSP_MAX_RETRYLIMIT, v->value, v->lineno); - } - } else if (!strcasecmp(v->name, "timeout")) { - if ((sscanf(v->value, "%d", &t) == 1) && (t >= OSP_MIN_TIMEOUT) && (t <= OSP_MAX_TIMEOUT)) { - p->timeout = t; - ast_log(LOG_DEBUG, "OSP: timeout '%d'\n", t); - } else { - ast_log(LOG_WARNING, "OSP: timeout should be an integer from %d to %d, not '%s' at line %d\n", - OSP_MIN_TIMEOUT, OSP_MAX_TIMEOUT, v->value, v->lineno); - } - } else if (!strcasecmp(v->name, "source")) { - ast_copy_string(p->source, v->value, sizeof(p->source)); - ast_log(LOG_DEBUG, "OSP: source '%s'\n", p->source); - } else if (!strcasecmp(v->name, "authpolicy")) { - if ((sscanf(v->value, "%d", &t) == 1) && ((t == OSP_AUTH_NO) || (t == OSP_AUTH_YES) || (t == OSP_AUTH_EXCLUSIVE))) { - p->authpolicy = t; - ast_log(LOG_DEBUG, "OSP: authpolicy '%d'\n", t); - } else { - ast_log(LOG_WARNING, "OSP: authpolicy should be %d, %d or %d, not '%s' at line %d\n", - OSP_AUTH_NO, OSP_AUTH_YES, OSP_AUTH_EXCLUSIVE, v->value, v->lineno); - } - } - v = v->next; - } - - error = OSPPUtilLoadPEMPrivateKey(p->privatekey, &privatekey); - if (error != OSPC_ERR_NO_ERROR) { - ast_log(LOG_WARNING, "OSP: Unable to load privatekey '%s'\n", p->privatekey); - free(p); - return(-1); - } - - error = OSPPUtilLoadPEMCert(p->localcert, &localcert); - if (error != OSPC_ERR_NO_ERROR) { - ast_log(LOG_WARNING, "OSP: Unable to load localcert '%s'\n", p->localcert); - if (privatekey.PrivateKeyData) { - free(privatekey.PrivateKeyData); - } - free(p); - return(-1); - } - - if (p->cacount < 1) { - snprintf(p->cacerts[p->cacount], sizeof(p->cacerts[0]), "%s/%s-cacert.pem", ast_config_AST_KEY_DIR, provider); - ast_log(LOG_DEBUG, "OSP: cacert[%d]: '%s'\n", p->cacount, p->cacerts[p->cacount]); - p->cacount++; - } - for (i = 0; i < p->cacount; i++) { - error = OSPPUtilLoadPEMCert(p->cacerts[i], &cacerts[i]); - if (error != OSPC_ERR_NO_ERROR) { - ast_log(LOG_WARNING, "OSP: Unable to load cacert '%s'\n", p->cacerts[i]); - for (j = 0; j < i; j++) { - if (cacerts[j].CertData) { - free(cacerts[j].CertData); - } - } - if (localcert.CertData) { - free(localcert.CertData); - } - if (privatekey.PrivateKeyData) { - free(privatekey.PrivateKeyData); - } - free(p); - return(-1); - } - pcacerts[i] = &cacerts[i]; - } - - for (i = 0; i < p->spcount; i++) { - psrvpoints[i] = p->srvpoints[i]; - } - - error = OSPPProviderNew( - p->spcount, psrvpoints, - NULL, - OSP_AUDIT_URL, - &privatekey, - &localcert, - p->cacount, pcacerts, - OSP_LOCAL_VALIDATION, - OSP_SSL_LIFETIME, - p->maxconnections, - OSP_HTTP_PERSISTENCE, - p->retrydelay, - p->retrylimit, - p->timeout, - OSP_CUSTOMER_ID, - OSP_DEVICE_ID, - &p->handle); - if (error != OSPC_ERR_NO_ERROR) { - ast_log(LOG_WARNING, "OSP: Unable to initialize provider '%s'\n", provider); - free(p); - res = -1; - } else { - ast_log(LOG_DEBUG, "OSP: provider '%s'\n", provider); - ast_mutex_lock(&osplock); - p->next = ospproviders; - ospproviders = p; - ast_mutex_unlock(&osplock); - res = 0; - } - - for (i = 0; i < p->cacount; i++) { - if (cacerts[i].CertData) { - free(cacerts[i].CertData); - } - } - if (localcert.CertData) { - free(localcert.CertData); - } - if (privatekey.PrivateKeyData) { - free(privatekey.PrivateKeyData); - } - - return(res); -} - -static int osp_getPolicy( - const char* provider, /* OSP provider context name */ - int* policy) /* OSP authentication policy, output */ -{ - int res = 0; - struct osp_provider* p; - - ast_mutex_lock(&osplock); - p = ospproviders; - while(p) { - if (!strcasecmp(p->name, provider)) { - *policy = p->authpolicy; - ast_log(LOG_DEBUG, "OSP: authpolicy '%d'\n", *policy); - res = 1; - break; - } - p = p->next; - } - ast_mutex_unlock(&osplock); - - return(res); -} - -static int osp_genTransaction( - const char* provider, /* OSP provider context name */ - int* transaction, /* OSP transaction handle, output */ - unsigned int sourcesize, /* Size of source buffer, in/output */ - char* source) /* Source of provider context, output */ -{ - int res = 0; - struct osp_provider *p; - int error; - - ast_mutex_lock(&osplock); - p = ospproviders; - while(p) { - if (!strcasecmp(p->name, provider)) { - error = OSPPTransactionNew(p->handle, transaction); - if (error == OSPC_ERR_NO_ERROR) { - ast_log(LOG_DEBUG, "OSP: transaction '%d'\n", *transaction); - ast_copy_string(source, p->source, sourcesize); - ast_log(LOG_DEBUG, "OSP: source '%s'\n", source); - res = 1; - } else { - *transaction = OSP_INVALID_HANDLE; - ast_log(LOG_WARNING, "OSP: Unable to create transaction handle\n"); - res = -1; - } - break; - } - p = p->next; - } - ast_mutex_unlock(&osplock); - - return(res); -} - -static int osp_valToken( - int transaction, /* OSP transaction handle */ - const char* source, /* Source of in_bound call */ - const char* dest, /* Destination of in_bound call */ - const char* calling, /* Calling number */ - const char* called, /* Called number */ - const char* token, /* OSP token, may be empty */ - unsigned int* timelimit) /* Call duration limit, output */ -{ - int res = 0; - char tokenstr[OSP_TOKSTR_SIZE]; - int tokenlen; - unsigned int authorised; - unsigned int dummy = 0; - int error; - - tokenlen = ast_base64decode(tokenstr, token, strlen(token)); - error = OSPPTransactionValidateAuthorisation( - transaction, - source, dest, NULL, NULL, - calling ? calling : "", OSPC_E164, - called, OSPC_E164, - 0, NULL, - tokenlen, tokenstr, - &authorised, - timelimit, - &dummy, NULL, - osp_tokenformat); - if (error == OSPC_ERR_NO_ERROR) { - if (authorised) { - ast_log(LOG_DEBUG, "OSP: Authorised\n"); - res = 1; - } - } - return(res); -} - -int ast_osp_auth( - const char* provider, /* OSP provider context name */ - int* transaction, /* OSP transaction handle, output */ - const char* source, /* Source of in_bound call */ - const char* calling, /* Calling number */ - const char* called, /* Called number */ - const char* token, /* OSP token, may be empty */ - unsigned int* timelimit) /* Call duration limit, output */ -{ - int res; - char dest[OSP_NORSTR_SIZE]; - int policy = OSP_AUTH_YES; - - *transaction = OSP_INVALID_HANDLE; - *timelimit = OSP_DEF_TIMELIMIT; - - res = osp_getPolicy(provider, &policy); - if (!res) { - ast_log(LOG_WARNING, "OSP: Unabe to find authentication policy\n"); - return(-1); - } - - switch (policy) { - case OSP_AUTH_NO: - res = 1; - break; - case OSP_AUTH_EXCLUSIVE: - if (ast_strlen_zero(token)) { - res = 0; - } else if ((res = osp_genTransaction(provider, transaction, sizeof(dest), dest)) <= 0) { - *transaction = OSP_INVALID_HANDLE; - ast_log(LOG_WARNING, "OSP: Unable to generate transaction handle\n"); - res = -1; - } else { - res = osp_valToken(*transaction, source, dest, calling, called, token, timelimit); - } - break; - case OSP_AUTH_YES: - default: - if (ast_strlen_zero(token)) { - res = 1; - } else if ((res = osp_genTransaction(provider, transaction, sizeof(dest), dest)) <= 0) { - *transaction = OSP_INVALID_HANDLE; - ast_log(LOG_WARNING, "OSP: Unable to generate transaction handle\n"); - res = -1; - } else { - res = osp_valToken(*transaction, source, dest, calling, called, token, timelimit); - } - break; - } - - if (!res) { - OSPPTransactionRecordFailure(*transaction, OSPC_FAIL_CALL_REJECTED); - } - - return(res); -} - -static unsigned int osp_choTimelimit( - unsigned int in, /* In_bound OSP timelimit */ - unsigned int out) /* Out_bound OSP timelimit */ -{ - if (in == OSP_DEF_TIMELIMIT) { - return (out); - } else if (out == OSP_DEF_TIMELIMIT) { - return (in); - } else { - return(in < out ? in : out); - } -} - -static int osp_chkDest( - const char* callednum, /* Called number */ - const char* callingnum, /* Calling number */ - char* destination, /* Destination IP in OSP format */ - unsigned int tokenlen, /* OSP token length */ - const char* token, /* OSP token */ - enum OSPEFAILREASON* cause, /* Failure cause, output */ - struct ast_osp_result* result) /* OSP lookup results, in/output */ -{ - int res = 0; - OSPE_DEST_OSP_ENABLED enabled; - OSPE_DEST_PROT protocol; - int error; - - if (strlen(destination) <= 2) { - *cause = OSPC_FAIL_INCOMPATIBLE_DEST; - } else { - error = OSPPTransactionIsDestOSPEnabled(result->outhandle, &enabled); - if ((error == OSPC_ERR_NO_ERROR) && (enabled == OSPE_OSP_FALSE)) { - result->token[0] = '\0'; - } else { - ast_base64encode(result->token, token, tokenlen, sizeof(result->token) - 1); - } - - error = OSPPTransactionGetDestProtocol(result->outhandle, &protocol); - if (error != OSPC_ERR_NO_ERROR) { - *cause = OSPC_FAIL_PROTOCOL_ERROR; - } else { - res = 1; - /* Strip leading and trailing brackets */ - destination[strlen(destination) - 1] = '\0'; - switch(protocol) { - case OSPE_DEST_PROT_H323_SETUP: - ast_copy_string(result->tech, "H323", sizeof(result->tech)); - ast_log(LOG_DEBUG, "OSP: protocol '%d'\n", protocol); - snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1); - ast_copy_string(result->calling, callingnum, sizeof(result->calling)); - break; - case OSPE_DEST_PROT_SIP: - ast_copy_string(result->tech, "SIP", sizeof(result->tech)); - ast_log(LOG_DEBUG, "OSP: protocol '%d'\n", protocol); - snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1); - ast_copy_string(result->calling, callingnum, sizeof(result->calling)); - break; - case OSPE_DEST_PROT_IAX: - ast_copy_string(result->tech, "IAX", sizeof(result->tech)); - ast_log(LOG_DEBUG, "OSP: protocol '%d'\n", protocol); - snprintf(result->dest, sizeof(result->dest), "%s@%s", callednum, destination + 1); - ast_copy_string(result->calling, callingnum, sizeof(result->calling)); - break; - default: - ast_log(LOG_DEBUG, "OSP: Unknown protocol '%d'\n", protocol); - *cause = OSPC_FAIL_PROTOCOL_ERROR; - res = 0; - } - } - } - return(res); -} - -int ast_osp_lookup( - const char* provider, /* OSP provider conttext name */ - const char* srcdev, /* Source device of out_bound call */ - const char* calling, /* Calling number */ - const char* called, /* Called number */ - struct ast_osp_result* result) /* OSP lookup results, in/output */ -{ - int res; - char source[OSP_NORSTR_SIZE]; - unsigned int callidlen; - char callidstr[OSPC_CALLID_MAXSIZE]; - char callingnum[OSP_NORSTR_SIZE]; - char callednum[OSP_NORSTR_SIZE]; - char destination[OSP_NORSTR_SIZE]; - unsigned int tokenlen; - char token[OSP_TOKSTR_SIZE]; - unsigned int dummy = 0; - enum OSPEFAILREASON cause; - int error; - - result->outhandle = OSP_INVALID_HANDLE; - result->tech[0] = '\0'; - result->dest[0] = '\0'; - result->calling[0] = '\0'; - result->token[0] = '\0'; - result->numresults = 0; - result->outtimelimit = OSP_DEF_TIMELIMIT; - - if ((res = osp_genTransaction(provider, &result->outhandle, sizeof(source), source)) <= 0) { - result->outhandle = OSP_INVALID_HANDLE; - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - ast_log(LOG_WARNING, "OSP: Unable to generate transaction handle\n"); - return(-1); - } - - res = 0; - dummy = 0; - result->numresults = OSP_DEF_DESTINATIONS; - error = OSPPTransactionRequestAuthorisation( - result->outhandle, - source, srcdev, - calling ? calling : "", OSPC_E164, - called, OSPC_E164, - NULL, - 0, NULL, - NULL, - &result->numresults, - &dummy, NULL); - if (error != OSPC_ERR_NO_ERROR) { - result->numresults = 0; - OSPPTransactionRecordFailure(result->outhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - return(res); - } - - if (!result->numresults) { - result->numresults = 0; - OSPPTransactionRecordFailure(result->outhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - return(res); - } - - callidlen = sizeof(callidstr); - tokenlen = sizeof(token); - error = OSPPTransactionGetFirstDestination( - result->outhandle, - 0, NULL, NULL, - &result->outtimelimit, - &callidlen, callidstr, - sizeof(callednum), callednum, - sizeof(callingnum), callingnum, - sizeof(destination), destination, - 0, NULL, - &tokenlen, token); - if (error != OSPC_ERR_NO_ERROR) { - result->token[0] = '\0'; - result->numresults = 0; - result->outtimelimit = OSP_DEF_TIMELIMIT; - OSPPTransactionRecordFailure(result->outhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - ast_log(LOG_DEBUG, "OSP: Unable to get first route\n"); - return(res); - } - - do { - result->outtimelimit = osp_choTimelimit(result->intimelimit, result->outtimelimit); - ast_log(LOG_DEBUG, "OSP: outtimelimit '%d'\n", result->outtimelimit); - ast_log(LOG_DEBUG, "OSP: called '%s'\n", callednum); - ast_log(LOG_DEBUG, "OSP: calling '%s'\n", callingnum); - ast_log(LOG_DEBUG, "OSP: destination '%s'\n", destination); - ast_log(LOG_DEBUG, "OSP: token size '%d'\n", tokenlen); - - res = osp_chkDest(callednum, callingnum, destination, tokenlen, token, &cause, result); - if (!res) { - result->numresults--; - if (result->numresults) { - callidlen = sizeof(callidstr); - tokenlen = sizeof(token); - error = OSPPTransactionGetNextDestination( - result->outhandle, - cause, - 0, NULL, NULL, - &result->outtimelimit, - &callidlen, callidstr, - sizeof(callednum), callednum, - sizeof(callingnum), callingnum, - sizeof(destination), destination, - 0, NULL, - &tokenlen, token); - if (error != OSPC_ERR_NO_ERROR) { - result->token[0] = '\0'; - result->numresults = 0; - result->outtimelimit = OSP_DEF_TIMELIMIT; - OSPPTransactionRecordFailure(result->outhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - break; - } - } else { - result->token[0] = '\0'; - result->numresults = 0; - result->outtimelimit = OSP_DEF_TIMELIMIT; - OSPPTransactionRecordFailure(result->outhandle, cause); - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - } - } else { - result->numresults--; - } - } while(!res && result->numresults); - - return(res); -} - -static enum OSPEFAILREASON reason2cause( - int reason) /* Last call failure reason */ -{ - enum OSPEFAILREASON cause; - - switch(reason) { - case AST_CAUSE_NOTDEFINED: - cause = OSPC_FAIL_NONE; - break; - case AST_CAUSE_BUSY: - cause = OSPC_FAIL_USER_BUSY; - break; - case AST_CAUSE_CONGESTION: - cause = OSPC_FAIL_SWITCHING_EQUIPMENT_CONGESTION; - break; - case AST_CAUSE_UNALLOCATED: - cause = OSPC_FAIL_UNALLOC_NUMBER; - break; - case AST_CAUSE_NOANSWER: - cause = OSPC_FAIL_NO_ANSWER_FROM_USER; - break; - case AST_CAUSE_NORMAL: - default: - cause = OSPC_FAIL_NORMAL_CALL_CLEARING; - break; - } - - return(cause); -} - -int ast_osp_next( - int reason, /* Last desintaion failure reason */ - struct ast_osp_result *result) /* OSP lookup results, output */ -{ - int res = 0; - unsigned int callidlen; - char callidstr[OSPC_CALLID_MAXSIZE]; - char callingnum[OSP_NORSTR_SIZE]; - char callednum[OSP_NORSTR_SIZE]; - char destination[OSP_NORSTR_SIZE]; - unsigned int tokenlen; - char token[OSP_TOKSTR_SIZE]; - enum OSPEFAILREASON cause; - int error; - - result->tech[0] = '\0'; - result->dest[0] = '\0'; - result->calling[0] = '\0'; - result->token[0] = '\0'; - result->outtimelimit = OSP_DEF_TIMELIMIT; - - if (result->outhandle == OSP_INVALID_HANDLE) { - result->numresults = 0; - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - ast_log(LOG_WARNING, "OSP: Transaction handle undefined\n"); - return(-1); - } - - cause = reason2cause(reason); - if (!result->numresults) { - OSPPTransactionRecordFailure(result->outhandle, cause); - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - ast_log(LOG_DEBUG, "OSP: No more destination\n"); - return(res); - } - - while(!res && result->numresults) { - result->numresults--; - callidlen = sizeof(callidstr); - tokenlen = sizeof(token); - error = OSPPTransactionGetNextDestination( - result->outhandle, - cause, - 0, NULL, NULL, - &result->outtimelimit, - &callidlen, callidstr, - sizeof(callednum), callednum, - sizeof(callingnum), callingnum, - sizeof(destination), destination, - 0, NULL, - &tokenlen, token); - if (error == OSPC_ERR_NO_ERROR) { - result->outtimelimit = osp_choTimelimit(result->intimelimit, result->outtimelimit); - ast_log(LOG_DEBUG, "OSP: outtimelimit '%d'\n", result->outtimelimit); - ast_log(LOG_DEBUG, "OSP: called '%s'\n", callednum); - ast_log(LOG_DEBUG, "OSP: calling '%s'\n", callingnum); - ast_log(LOG_DEBUG, "OSP: destination '%s'\n", destination); - ast_log(LOG_DEBUG, "OSP: token size '%d'\n", tokenlen); - - res = osp_chkDest(callednum, callingnum, destination, tokenlen, token, &cause, result); - if (!res && !result->numresults) { - OSPPTransactionRecordFailure(result->outhandle, cause); - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - } - } else { - result->token[0] = '\0'; - result->numresults = 0; - result->outtimelimit = OSP_DEF_TIMELIMIT; - OSPPTransactionRecordFailure(result->outhandle, OSPC_FAIL_NORMAL_UNSPECIFIED); - if (result->inhandle != OSP_INVALID_HANDLE) { - OSPPTransactionRecordFailure(result->inhandle, OSPC_FAIL_NO_ROUTE_TO_DEST); - } - } - } - - return(res); -} - -int ast_osp_finish( - int handle, /* OSP in/out_bound transaction handle */ - int reason, /* Last destination failure reason */ - time_t start, /* Call start time */ - time_t connect, /* Call connect time */ - time_t end) /* Call end time*/ -{ - int res = 1; - unsigned int dummy = 0; - enum OSPEFAILREASON cause; - time_t alert = 0; - unsigned isPddInfoPresent = 0; - unsigned pdd = 0; - unsigned releaseSource = 0; - unsigned char *confId = ""; - int error; - - if (handle == OSP_INVALID_HANDLE) { - return(res); - } - - if ((cause = reason2cause(reason)) != OSPC_FAIL_NONE) { - OSPPTransactionRecordFailure(handle, cause); - } - error = OSPPTransactionReportUsage( - handle, - difftime(end, connect), start, end, alert, connect, - isPddInfoPresent, pdd, - releaseSource, - confId, - 0, 0, 0, 0, - &dummy, NULL); - if (error == OSPC_ERR_NO_ERROR) { - ast_log(LOG_DEBUG, "OSP: Usage reported\n"); - res = 1; - } else { - ast_log(LOG_DEBUG, "OSP: Unable to report usage, error = %d\n", error); - res = 0; - } - OSPPTransactionDelete(handle); - - return(res); -} - -void ast_osp_adduse(void) -{ - osp_usecount++; -} - -void ast_osp_deluse(void) -{ - if (osp_usecount > 0) { - osp_usecount--; - } -} - -static char osp_usage[] = -"Usage: show osp\n" -" Displays information on Open Settlement Protocol support\n"; - -static struct ast_cli_entry osp_cli = { - {"show", "osp", NULL}, - osp_show, - "Displays OSP information", - osp_usage -}; - -static int osp_load(void) -{ - char* t; - unsigned int v; - struct ast_config* cfg; - int error = OSPC_ERR_NO_ERROR; - - cfg = ast_config_load(OSP_CONFIG_FILE); - if (cfg) { - t = ast_variable_retrieve(cfg, OSP_GENERAL_CAT, "accelerate"); - if (t && ast_true(t)) { - if ((error = OSPPInit(1)) != OSPC_ERR_NO_ERROR) { - ast_log(LOG_WARNING, "OSP: Unable to enable hardware accelleration\n"); - OSPPInit(0); - } else { - osp_hardware = 1; - } - } else { - OSPPInit(0); - } - ast_log(LOG_DEBUG, "OSP: osp_hardware '%d'\n", osp_hardware); - - t = ast_variable_retrieve(cfg, OSP_GENERAL_CAT, "tokenformat"); - if (t) { - if ((sscanf(t, "%d", &v) == 1) && - ((v == TOKEN_ALGO_SIGNED) || (v == TOKEN_ALGO_UNSIGNED) || (v == TOKEN_ALGO_BOTH))) - { - osp_tokenformat = v; - } else { - ast_log(LOG_WARNING, "tokenformat should be an integer from %d, %d or %d, not '%s'\n", - TOKEN_ALGO_SIGNED, TOKEN_ALGO_UNSIGNED, TOKEN_ALGO_BOTH, t); - } - } - ast_log(LOG_DEBUG, "OSP: osp_tokenformat '%d'\n", osp_tokenformat); - - t = ast_category_browse(cfg, NULL); - while(t) { - if (strcasecmp(t, OSP_GENERAL_CAT)) { - osp_buildProvider(cfg, t); - } - t = ast_category_browse(cfg, t); - } - - osp_initialized = 1; - - ast_config_destroy(cfg); - } else { - ast_log(LOG_WARNING, "OSP: Unable to find configuration. OSP support disabled\n"); - } - ast_log(LOG_DEBUG, "OSP: osp_initialized '%d'\n", osp_initialized); - - return(0); -} - -static int osp_unload(void) -{ - struct osp_provider* p; - struct osp_provider* next; - - if (osp_initialized) { - ast_mutex_lock(&osplock); - p = ospproviders; - while(p) { - next = p->next; - OSPPProviderDelete(p->handle, 0); - free(p); - p = next; - } - ospproviders = NULL; - ast_mutex_unlock(&osplock); - - OSPPCleanup(); - - osp_usecount = 0; - osp_tokenformat = TOKEN_ALGO_SIGNED; - osp_hardware = 0; - osp_initialized = 0; - } - return(0); -} - -static int osp_show(int fd, int argc, char *argv[]) -{ - int i; - int found = 0; - struct osp_provider* p; - char* provider = NULL; - char* tokenalgo; - - if ((argc < 2) || (argc > 3)) { - return(RESULT_SHOWUSAGE); - } - if (argc > 2) { - provider = argv[2]; - } - if (!provider) { - switch (osp_tokenformat) { - case TOKEN_ALGO_BOTH: - tokenalgo = "Both"; - break; - case TOKEN_ALGO_UNSIGNED: - tokenalgo = "Unsigned"; - break; - case TOKEN_ALGO_SIGNED: - default: - tokenalgo = "Signed"; - break; - } - ast_cli(fd, "OSP: %s %s %s\n", - osp_initialized ? "Initialized" : "Uninitialized", osp_hardware ? "Accelerated" : "Normal", tokenalgo); - } - - ast_mutex_lock(&osplock); - p = ospproviders; - while(p) { - if (!provider || !strcasecmp(p->name, provider)) { - if (found) { - ast_cli(fd, "\n"); - } - ast_cli(fd, " == OSP Provider '%s' == \n", p->name); - ast_cli(fd, "Local Private Key: %s\n", p->privatekey); - ast_cli(fd, "Local Certificate: %s\n", p->localcert); - for (i = 0; i < p->cacount; i++) { - ast_cli(fd, "CA Certificate %d: %s\n", i + 1, p->cacerts[i]); - } - for (i = 0; i < p->spcount; i++) { - ast_cli(fd, "Service Point %d: %s\n", i + 1, p->srvpoints[i]); - } - ast_cli(fd, "Max Connections: %d\n", p->maxconnections); - ast_cli(fd, "Retry Delay: %d seconds\n", p->retrydelay); - ast_cli(fd, "Retry Limit: %d\n", p->retrylimit); - ast_cli(fd, "Timeout: %d milliseconds\n", p->timeout); - ast_cli(fd, "Source: %s\n", strlen(p->source) ? p->source : "<unspecified>"); - ast_cli(fd, "Auth Policy %d\n", p->authpolicy); - ast_cli(fd, "OSP Handle: %d\n", p->handle); - found++; - } - p = p->next; - } - ast_mutex_unlock(&osplock); - - if (!found) { - if (provider) { - ast_cli(fd, "Unable to find OSP provider '%s'\n", provider); - } else { - ast_cli(fd, "No OSP providers configured\n"); - } - } - return(RESULT_SUCCESS); -} - -static int load_module(void *mod) -{ - osp_load(); - ast_cli_register(&osp_cli); - return 0; -} - -static int reload(void *mod) -{ - ast_cli_unregister(&osp_cli); - osp_unload(); - osp_load(); - ast_cli_register(&osp_cli); - return 0; -} - -static int unload_module(void *mod) -{ - ast_cli_unregister(&osp_cli); - osp_unload(); - return 0; -} - -static const char *description(void) -{ - return "Open Settlement Protocol Support"; -} - -#if 0 -/* XXX usecount handling still needs to be fixed. - */ -int usecount(void) -{ - return(osp_usecount); -} -#endif - -static const char *key(void) -{ - return ASTERISK_GPL_KEY; -} - -STD_MOD(MOD_0, reload, NULL, NULL) - -