This commit is contained in:
Thomas Ries 2014-05-25 11:13:39 +00:00
parent 9e35478c6f
commit 80a63f30e3
3 changed files with 12 additions and 5 deletions

View File

@ -1,5 +1,8 @@
0.8.2 0.8.2
===== =====
25-May-2014: - PLUGIN_PROCESS_RAW: properly deal with the situation if a
RAW plugin modifies the message lengh.
11-Feb-2013: - plugin_defaulttarget: add "received from" IP to logging
07-Apr-2012: - Some compatibility hack with newer libtool versions 07-Apr-2012: - Some compatibility hack with newer libtool versions
10-Jul-2011: - Added --with-included-libtool to configure to allow 10-Jul-2011: - Added --with-included-libtool to configure to allow
forcing the use of the included libltdl forcing the use of the included libltdl

4
TODO
View File

@ -24,3 +24,7 @@ RFC3261 non-compliance:
- Record-Route header handling - Record-Route header handling
- OpenBSD: Warning for redefinition of MACROS - OpenBSD: Warning for redefinition of MACROS
- remove URLMAP_SIZE and RTPPROXY_SIZE constants, make them configurable
at runtime.

View File

@ -408,7 +408,7 @@ int main (int argc, char *argv[])
/* /*
* integrity checks * integrity checks
*/ */
sts=security_check_raw(buff, buflen); sts=security_check_raw(ticket.raw_buffer, ticket.raw_buffer_len);
if (sts != STS_SUCCESS) { if (sts != STS_SUCCESS) {
DEBUGC(DBCLASS_SIP,"security check (raw) failed"); DEBUGC(DBCLASS_SIP,"security check (raw) failed");
continue; /* there are no resources to free */ continue; /* there are no resources to free */
@ -417,7 +417,7 @@ int main (int argc, char *argv[])
/* /*
* Hacks to fix-up some broken headers * Hacks to fix-up some broken headers
*/ */
sts=sip_fixup_asterisk(buff, &buflen); sts=sip_fixup_asterisk(ticket.raw_buffer, &ticket.raw_buffer_len);
/* /*
* init sip_msg * init sip_msg
@ -434,10 +434,10 @@ int main (int argc, char *argv[])
* Proxy Behavior - Request Validation - Reasonable Syntax * Proxy Behavior - Request Validation - Reasonable Syntax
* (parse the received message) * (parse the received message)
*/ */
sts=sip_message_parse(ticket.sipmsg, buff, buflen); sts=sip_message_parse(ticket.sipmsg, ticket.raw_buffer, ticket.raw_buffer_len);
if (sts != 0) { if (sts != 0) {
ERROR("sip_message_parse() failed, sts=%i... this is not good", sts); ERROR("sip_message_parse() failed, sts=%i... this is not good", sts);
DUMP_BUFFER(-1, buff, buflen); DUMP_BUFFER(-1, ticket.raw_buffer, ticket.raw_buffer_len);
goto end_loop; /* skip and free resources */ goto end_loop; /* skip and free resources */
} }
@ -447,7 +447,7 @@ int main (int argc, char *argv[])
sts=security_check_sip(&ticket); sts=security_check_sip(&ticket);
if (sts != STS_SUCCESS) { if (sts != STS_SUCCESS) {
ERROR("security_check_sip() failed, sts=%i... this is not good", sts); ERROR("security_check_sip() failed, sts=%i... this is not good", sts);
DUMP_BUFFER(-1, buff, buflen); DUMP_BUFFER(-1, ticket.raw_buffer, ticket.raw_buffer_len);
goto end_loop; /* skip and free resources */ goto end_loop; /* skip and free resources */
} }