$
This commit is contained in:
parent
9e35478c6f
commit
80a63f30e3
@ -1,5 +1,8 @@
|
|||||||
0.8.2
|
0.8.2
|
||||||
=====
|
=====
|
||||||
|
25-May-2014: - PLUGIN_PROCESS_RAW: properly deal with the situation if a
|
||||||
|
RAW plugin modifies the message lengh.
|
||||||
|
11-Feb-2013: - plugin_defaulttarget: add "received from" IP to logging
|
||||||
07-Apr-2012: - Some compatibility hack with newer libtool versions
|
07-Apr-2012: - Some compatibility hack with newer libtool versions
|
||||||
10-Jul-2011: - Added --with-included-libtool to configure to allow
|
10-Jul-2011: - Added --with-included-libtool to configure to allow
|
||||||
forcing the use of the included libltdl
|
forcing the use of the included libltdl
|
||||||
|
|||||||
4
TODO
4
TODO
@ -24,3 +24,7 @@ RFC3261 non-compliance:
|
|||||||
- Record-Route header handling
|
- Record-Route header handling
|
||||||
|
|
||||||
- OpenBSD: Warning for redefinition of MACROS
|
- OpenBSD: Warning for redefinition of MACROS
|
||||||
|
|
||||||
|
- remove URLMAP_SIZE and RTPPROXY_SIZE constants, make them configurable
|
||||||
|
at runtime.
|
||||||
|
|
||||||
|
|||||||
@ -408,7 +408,7 @@ int main (int argc, char *argv[])
|
|||||||
/*
|
/*
|
||||||
* integrity checks
|
* integrity checks
|
||||||
*/
|
*/
|
||||||
sts=security_check_raw(buff, buflen);
|
sts=security_check_raw(ticket.raw_buffer, ticket.raw_buffer_len);
|
||||||
if (sts != STS_SUCCESS) {
|
if (sts != STS_SUCCESS) {
|
||||||
DEBUGC(DBCLASS_SIP,"security check (raw) failed");
|
DEBUGC(DBCLASS_SIP,"security check (raw) failed");
|
||||||
continue; /* there are no resources to free */
|
continue; /* there are no resources to free */
|
||||||
@ -417,7 +417,7 @@ int main (int argc, char *argv[])
|
|||||||
/*
|
/*
|
||||||
* Hacks to fix-up some broken headers
|
* Hacks to fix-up some broken headers
|
||||||
*/
|
*/
|
||||||
sts=sip_fixup_asterisk(buff, &buflen);
|
sts=sip_fixup_asterisk(ticket.raw_buffer, &ticket.raw_buffer_len);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* init sip_msg
|
* init sip_msg
|
||||||
@ -434,10 +434,10 @@ int main (int argc, char *argv[])
|
|||||||
* Proxy Behavior - Request Validation - Reasonable Syntax
|
* Proxy Behavior - Request Validation - Reasonable Syntax
|
||||||
* (parse the received message)
|
* (parse the received message)
|
||||||
*/
|
*/
|
||||||
sts=sip_message_parse(ticket.sipmsg, buff, buflen);
|
sts=sip_message_parse(ticket.sipmsg, ticket.raw_buffer, ticket.raw_buffer_len);
|
||||||
if (sts != 0) {
|
if (sts != 0) {
|
||||||
ERROR("sip_message_parse() failed, sts=%i... this is not good", sts);
|
ERROR("sip_message_parse() failed, sts=%i... this is not good", sts);
|
||||||
DUMP_BUFFER(-1, buff, buflen);
|
DUMP_BUFFER(-1, ticket.raw_buffer, ticket.raw_buffer_len);
|
||||||
goto end_loop; /* skip and free resources */
|
goto end_loop; /* skip and free resources */
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -447,7 +447,7 @@ int main (int argc, char *argv[])
|
|||||||
sts=security_check_sip(&ticket);
|
sts=security_check_sip(&ticket);
|
||||||
if (sts != STS_SUCCESS) {
|
if (sts != STS_SUCCESS) {
|
||||||
ERROR("security_check_sip() failed, sts=%i... this is not good", sts);
|
ERROR("security_check_sip() failed, sts=%i... this is not good", sts);
|
||||||
DUMP_BUFFER(-1, buff, buflen);
|
DUMP_BUFFER(-1, ticket.raw_buffer, ticket.raw_buffer_len);
|
||||||
goto end_loop; /* skip and free resources */
|
goto end_loop; /* skip and free resources */
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user