1
/* $Id: pjsua_core.c 4370 2013-02-26 05:30:00Z nanang $ */
3
* Copyright (C) 2008-2011 Teluu Inc. (http://www.teluu.com)
4
* Copyright (C) 2003-2008 Benny Prijono <benny@prijono.org>
6
* This program is free software; you can redistribute it and/or modify
7
* it under the terms of the GNU General Public License as published by
8
* the Free Software Foundation; either version 2 of the License, or
9
* (at your option) any later version.
11
* This program is distributed in the hope that it will be useful,
12
* but WITHOUT ANY WARRANTY; without even the implied warranty of
13
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14
* GNU General Public License for more details.
16
* You should have received a copy of the GNU General Public License
17
* along with this program; if not, write to the Free Software
18
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20
#include <pjsua-lib/pjsua.h>
21
#include <pjsua-lib/pjsua_internal.h>
24
#define THIS_FILE "pjsua_core.c"
27
/* Internal prototypes */
28
static void resolve_stun_entry(pjsua_stun_resolve *sess);
31
/* PJSUA application instance. */
32
struct pjsua_data pjsua_var;
35
PJ_DEF(struct pjsua_data*) pjsua_get_var(void)
42
PJ_DEF(void) pjsua_perror( const char *sender, const char *title,
45
char errmsg[PJ_ERR_MSG_SIZE];
47
pj_strerror(status, errmsg, sizeof(errmsg));
48
PJ_LOG(1,(sender, "%s: %s [status=%d]", title, errmsg, status));
52
static void init_data()
56
pj_bzero(&pjsua_var, sizeof(pjsua_var));
58
for (i=0; i<PJ_ARRAY_SIZE(pjsua_var.acc); ++i)
59
pjsua_var.acc[i].index = i;
61
for (i=0; i<PJ_ARRAY_SIZE(pjsua_var.tpdata); ++i)
62
pjsua_var.tpdata[i].index = i;
64
pjsua_var.stun_status = PJ_EUNKNOWN;
65
pjsua_var.nat_status = PJ_EPENDING;
66
pj_list_init(&pjsua_var.stun_res);
67
pj_list_init(&pjsua_var.outbound_proxy);
69
pjsua_config_default(&pjsua_var.ua_cfg);
71
for (i=0; i<PJSUA_MAX_VID_WINS; ++i) {
72
pjsua_vid_win_reset(i);
77
PJ_DEF(void) pjsua_logging_config_default(pjsua_logging_config *cfg)
79
pj_bzero(cfg, sizeof(*cfg));
81
cfg->msg_logging = PJ_TRUE;
83
cfg->console_level = 4;
84
cfg->decor = PJ_LOG_HAS_SENDER | PJ_LOG_HAS_TIME |
85
PJ_LOG_HAS_MICRO_SEC | PJ_LOG_HAS_NEWLINE |
86
PJ_LOG_HAS_SPACE | PJ_LOG_HAS_THREAD_SWC |
88
#if defined(PJ_WIN32) && PJ_WIN32 != 0
89
cfg->decor |= PJ_LOG_HAS_COLOR;
93
PJ_DEF(void) pjsua_logging_config_dup(pj_pool_t *pool,
94
pjsua_logging_config *dst,
95
const pjsua_logging_config *src)
97
pj_memcpy(dst, src, sizeof(*src));
98
pj_strdup_with_null(pool, &dst->log_filename, &src->log_filename);
101
PJ_DEF(void) pjsua_config_default(pjsua_config *cfg)
103
pj_bzero(cfg, sizeof(*cfg));
105
cfg->max_calls = ((PJSUA_MAX_CALLS) < 4) ? (PJSUA_MAX_CALLS) : 4;
107
cfg->nat_type_in_sdp = 1;
108
cfg->stun_ignore_failure = PJ_TRUE;
109
cfg->force_lr = PJ_TRUE;
110
cfg->enable_unsolicited_mwi = PJ_TRUE;
111
cfg->use_srtp = PJSUA_DEFAULT_USE_SRTP;
112
cfg->srtp_secure_signaling = PJSUA_DEFAULT_SRTP_SECURE_SIGNALING;
113
cfg->hangup_forked_call = PJ_TRUE;
115
cfg->use_timer = PJSUA_SIP_TIMER_OPTIONAL;
116
pjsip_timer_setting_default(&cfg->timer_setting);
119
PJ_DEF(void) pjsua_config_dup(pj_pool_t *pool,
121
const pjsua_config *src)
125
pj_memcpy(dst, src, sizeof(*src));
127
for (i=0; i<src->outbound_proxy_cnt; ++i) {
128
pj_strdup_with_null(pool, &dst->outbound_proxy[i],
129
&src->outbound_proxy[i]);
132
for (i=0; i<src->cred_count; ++i) {
133
pjsip_cred_dup(pool, &dst->cred_info[i], &src->cred_info[i]);
136
pj_strdup_with_null(pool, &dst->user_agent, &src->user_agent);
137
pj_strdup_with_null(pool, &dst->stun_domain, &src->stun_domain);
138
pj_strdup_with_null(pool, &dst->stun_host, &src->stun_host);
140
for (i=0; i<src->stun_srv_cnt; ++i) {
141
pj_strdup_with_null(pool, &dst->stun_srv[i], &src->stun_srv[i]);
145
PJ_DEF(void) pjsua_msg_data_init(pjsua_msg_data *msg_data)
147
pj_bzero(msg_data, sizeof(*msg_data));
148
pj_list_init(&msg_data->hdr_list);
149
pjsip_media_type_init(&msg_data->multipart_ctype, NULL, NULL);
150
pj_list_init(&msg_data->multipart_parts);
153
PJ_DEF(pjsua_msg_data*) pjsua_msg_data_clone(pj_pool_t *pool,
154
const pjsua_msg_data *rhs)
156
pjsua_msg_data *msg_data;
157
const pjsip_hdr *hdr;
158
const pjsip_multipart_part *mpart;
160
PJ_ASSERT_RETURN(pool && rhs, NULL);
162
msg_data = PJ_POOL_ZALLOC_T(pool, pjsua_msg_data);
163
PJ_ASSERT_RETURN(msg_data != NULL, NULL);
165
pj_list_init(&msg_data->hdr_list);
166
hdr = rhs->hdr_list.next;
167
while (hdr != &rhs->hdr_list) {
168
pj_list_push_back(&msg_data->hdr_list, pjsip_hdr_clone(pool, hdr));
172
pj_strdup(pool, &msg_data->content_type, &rhs->content_type);
173
pj_strdup(pool, &msg_data->msg_body, &rhs->msg_body);
175
pjsip_media_type_cp(pool, &msg_data->multipart_ctype,
176
&rhs->multipart_ctype);
178
pj_list_init(&msg_data->multipart_parts);
179
mpart = rhs->multipart_parts.next;
180
while (mpart != &rhs->multipart_parts) {
181
pj_list_push_back(&msg_data->multipart_parts,
182
pjsip_multipart_clone_part(pool, mpart));
189
PJ_DEF(void) pjsua_transport_config_default(pjsua_transport_config *cfg)
191
pj_bzero(cfg, sizeof(*cfg));
192
pjsip_tls_setting_default(&cfg->tls_setting);
195
PJ_DEF(void) pjsua_transport_config_dup(pj_pool_t *pool,
196
pjsua_transport_config *dst,
197
const pjsua_transport_config *src)
199
pj_memcpy(dst, src, sizeof(*src));
200
pj_strdup(pool, &dst->public_addr, &src->public_addr);
201
pj_strdup(pool, &dst->bound_addr, &src->bound_addr);
204
PJ_DEF(void) pjsua_ice_config_from_media_config( pj_pool_t *pool,
205
pjsua_ice_config *dst,
206
const pjsua_media_config *src)
210
dst->enable_ice = src->enable_ice;
211
dst->ice_max_host_cands = src->ice_max_host_cands;
212
dst->ice_opt = src->ice_opt;
213
dst->ice_no_rtcp = src->ice_no_rtcp;
214
dst->ice_always_update = src->ice_always_update;
217
PJ_DEF(void) pjsua_ice_config_dup( pj_pool_t *pool,
218
pjsua_ice_config *dst,
219
const pjsua_ice_config *src)
222
pj_memcpy(dst, src, sizeof(*src));
225
PJ_DEF(void) pjsua_turn_config_from_media_config(pj_pool_t *pool,
226
pjsua_turn_config *dst,
227
const pjsua_media_config *src)
229
dst->enable_turn = src->enable_turn;
230
dst->turn_conn_type = src->turn_conn_type;
232
dst->turn_server = src->turn_server;
233
dst->turn_auth_cred = src->turn_auth_cred;
235
if (pj_stricmp(&dst->turn_server, &src->turn_server))
236
pj_strdup(pool, &dst->turn_server, &src->turn_server);
237
pj_stun_auth_cred_dup(pool, &dst->turn_auth_cred,
238
&src->turn_auth_cred);
242
PJ_DEF(void) pjsua_turn_config_dup(pj_pool_t *pool,
243
pjsua_turn_config *dst,
244
const pjsua_turn_config *src)
246
pj_memcpy(dst, src, sizeof(*src));
248
pj_strdup(pool, &dst->turn_server, &src->turn_server);
249
pj_stun_auth_cred_dup(pool, &dst->turn_auth_cred,
250
&src->turn_auth_cred);
254
PJ_DEF(void) pjsua_acc_config_default(pjsua_acc_config *cfg)
256
pjsua_media_config med_cfg;
258
pj_bzero(cfg, sizeof(*cfg));
260
cfg->reg_timeout = PJSUA_REG_INTERVAL;
261
cfg->reg_delay_before_refresh = PJSIP_REGISTER_CLIENT_DELAY_BEFORE_REFRESH;
262
cfg->unreg_timeout = PJSUA_UNREG_TIMEOUT;
263
pjsip_publishc_opt_default(&cfg->publish_opt);
264
cfg->unpublish_max_wait_time_msec = PJSUA_UNPUBLISH_MAX_WAIT_TIME_MSEC;
265
cfg->transport_id = PJSUA_INVALID_ID;
266
cfg->allow_contact_rewrite = PJ_TRUE;
267
cfg->allow_via_rewrite = PJ_TRUE;
268
cfg->require_100rel = pjsua_var.ua_cfg.require_100rel;
269
cfg->use_timer = pjsua_var.ua_cfg.use_timer;
270
cfg->timer_setting = pjsua_var.ua_cfg.timer_setting;
272
cfg->ka_interval = 15;
273
cfg->ka_data = pj_str("\r\n");
274
cfg->vid_cap_dev = PJMEDIA_VID_DEFAULT_CAPTURE_DEV;
275
cfg->vid_rend_dev = PJMEDIA_VID_DEFAULT_RENDER_DEV;
276
#if PJMEDIA_HAS_VIDEO
277
pjmedia_vid_stream_rc_config_default(&cfg->vid_stream_rc_cfg);
279
pjsua_transport_config_default(&cfg->rtp_cfg);
281
pjsua_media_config_default(&med_cfg);
282
pjsua_ice_config_from_media_config(NULL, &cfg->ice_cfg, &med_cfg);
283
pjsua_turn_config_from_media_config(NULL, &cfg->turn_cfg, &med_cfg);
285
cfg->use_srtp = pjsua_var.ua_cfg.use_srtp;
286
cfg->srtp_secure_signaling = pjsua_var.ua_cfg.srtp_secure_signaling;
287
cfg->srtp_optional_dup_offer = pjsua_var.ua_cfg.srtp_optional_dup_offer;
288
cfg->reg_retry_interval = PJSUA_REG_RETRY_INTERVAL;
289
cfg->contact_rewrite_method = PJSUA_CONTACT_REWRITE_METHOD;
290
cfg->use_rfc5626 = PJ_TRUE;
291
cfg->reg_use_proxy = PJSUA_REG_USE_OUTBOUND_PROXY |
292
PJSUA_REG_USE_ACC_PROXY;
293
#if defined(PJMEDIA_STREAM_ENABLE_KA) && PJMEDIA_STREAM_ENABLE_KA!=0
294
cfg->use_stream_ka = (PJMEDIA_STREAM_ENABLE_KA != 0);
296
pj_list_init(&cfg->reg_hdr_list);
297
pj_list_init(&cfg->sub_hdr_list);
298
cfg->call_hold_type = PJSUA_CALL_HOLD_TYPE_DEFAULT;
299
cfg->register_on_acc_add = PJ_TRUE;
300
cfg->mwi_expires = PJSIP_MWI_DEFAULT_EXPIRES;
303
PJ_DEF(void) pjsua_buddy_config_default(pjsua_buddy_config *cfg)
305
pj_bzero(cfg, sizeof(*cfg));
308
PJ_DEF(void) pjsua_media_config_default(pjsua_media_config *cfg)
310
pj_bzero(cfg, sizeof(*cfg));
312
cfg->clock_rate = PJSUA_DEFAULT_CLOCK_RATE;
313
cfg->snd_clock_rate = 0;
314
cfg->channel_count = 1;
315
cfg->audio_frame_ptime = PJSUA_DEFAULT_AUDIO_FRAME_PTIME;
316
cfg->max_media_ports = PJSUA_MAX_CONF_PORTS;
317
cfg->has_ioqueue = PJ_TRUE;
319
cfg->quality = PJSUA_DEFAULT_CODEC_QUALITY;
320
cfg->ilbc_mode = PJSUA_DEFAULT_ILBC_MODE;
321
cfg->ec_tail_len = PJSUA_DEFAULT_EC_TAIL_LEN;
322
cfg->snd_rec_latency = PJMEDIA_SND_DEFAULT_REC_LATENCY;
323
cfg->snd_play_latency = PJMEDIA_SND_DEFAULT_PLAY_LATENCY;
324
cfg->jb_init = cfg->jb_min_pre = cfg->jb_max_pre = cfg->jb_max = -1;
325
cfg->snd_auto_close_time = 1;
327
cfg->ice_max_host_cands = -1;
328
cfg->ice_always_update = PJ_TRUE;
329
pj_ice_sess_options_default(&cfg->ice_opt);
331
cfg->turn_conn_type = PJ_TURN_TP_UDP;
332
cfg->vid_preview_enable_native = PJ_TRUE;
335
/*****************************************************************************
336
* This is a very simple PJSIP module, whose sole purpose is to display
337
* incoming and outgoing messages to log. This module will have priority
338
* higher than transport layer, which means:
340
* - incoming messages will come to this module first before reaching
343
* - outgoing messages will come to this module last, after the message
344
* has been 'printed' to contiguous buffer by transport layer and
345
* appropriate transport instance has been decided for this message.
349
/* Notification on incoming messages */
350
static pj_bool_t logging_on_rx_msg(pjsip_rx_data *rdata)
352
PJ_LOG(4,(THIS_FILE, "RX %d bytes %s from %s %s:%d:\n"
356
pjsip_rx_data_get_info(rdata),
357
rdata->tp_info.transport->type_name,
358
rdata->pkt_info.src_name,
359
rdata->pkt_info.src_port,
360
(int)rdata->msg_info.len,
361
rdata->msg_info.msg_buf));
363
/* Always return false, otherwise messages will not get processed! */
367
/* Notification on outgoing messages */
368
static pj_status_t logging_on_tx_msg(pjsip_tx_data *tdata)
372
* tp_info field is only valid after outgoing messages has passed
373
* transport layer. So don't try to access tp_info when the module
374
* has lower priority than transport layer.
377
PJ_LOG(4,(THIS_FILE, "TX %d bytes %s to %s %s:%d:\n"
380
(tdata->buf.cur - tdata->buf.start),
381
pjsip_tx_data_get_info(tdata),
382
tdata->tp_info.transport->type_name,
383
tdata->tp_info.dst_name,
384
tdata->tp_info.dst_port,
385
(int)(tdata->buf.cur - tdata->buf.start),
388
/* Always return success, otherwise message will not get sent! */
392
/* The module instance. */
393
static pjsip_module pjsua_msg_logger =
395
NULL, NULL, /* prev, next. */
396
{ "mod-pjsua-log", 13 }, /* Name. */
398
PJSIP_MOD_PRIORITY_TRANSPORT_LAYER-1,/* Priority */
403
&logging_on_rx_msg, /* on_rx_request() */
404
&logging_on_rx_msg, /* on_rx_response() */
405
&logging_on_tx_msg, /* on_tx_request. */
406
&logging_on_tx_msg, /* on_tx_response() */
407
NULL, /* on_tsx_state() */
412
/*****************************************************************************
413
* Another simple module to handle incoming OPTIONS request
416
/* Notification on incoming request */
417
static pj_bool_t options_on_rx_request(pjsip_rx_data *rdata)
419
pjsip_tx_data *tdata;
420
pjsip_response_addr res_addr;
421
const pjsip_hdr *cap_hdr;
424
/* Only want to handle OPTIONS requests */
425
if (pjsip_method_cmp(&rdata->msg_info.msg->line.req.method,
426
pjsip_get_options_method()) != 0)
431
/* Don't want to handle if shutdown is in progress */
432
if (pjsua_var.thread_quit_flag) {
433
pjsip_endpt_respond_stateless(pjsua_var.endpt, rdata,
434
PJSIP_SC_TEMPORARILY_UNAVAILABLE, NULL,
439
/* Create basic response. */
440
status = pjsip_endpt_create_response(pjsua_var.endpt, rdata, 200, NULL,
442
if (status != PJ_SUCCESS) {
443
pjsua_perror(THIS_FILE, "Unable to create OPTIONS response", status);
447
/* Add Allow header */
448
cap_hdr = pjsip_endpt_get_capability(pjsua_var.endpt, PJSIP_H_ALLOW, NULL);
450
pjsip_msg_add_hdr(tdata->msg,
451
(pjsip_hdr*) pjsip_hdr_clone(tdata->pool, cap_hdr));
454
/* Add Accept header */
455
cap_hdr = pjsip_endpt_get_capability(pjsua_var.endpt, PJSIP_H_ACCEPT, NULL);
457
pjsip_msg_add_hdr(tdata->msg,
458
(pjsip_hdr*) pjsip_hdr_clone(tdata->pool, cap_hdr));
461
/* Add Supported header */
462
cap_hdr = pjsip_endpt_get_capability(pjsua_var.endpt, PJSIP_H_SUPPORTED, NULL);
464
pjsip_msg_add_hdr(tdata->msg,
465
(pjsip_hdr*) pjsip_hdr_clone(tdata->pool, cap_hdr));
468
/* Add Allow-Events header from the evsub module */
469
cap_hdr = pjsip_evsub_get_allow_events_hdr(NULL);
471
pjsip_msg_add_hdr(tdata->msg,
472
(pjsip_hdr*) pjsip_hdr_clone(tdata->pool, cap_hdr));
475
/* Add User-Agent header */
476
if (pjsua_var.ua_cfg.user_agent.slen) {
477
const pj_str_t USER_AGENT = { "User-Agent", 10};
480
h = (pjsip_hdr*) pjsip_generic_string_hdr_create(tdata->pool,
482
&pjsua_var.ua_cfg.user_agent);
483
pjsip_msg_add_hdr(tdata->msg, h);
486
/* Get media socket info, make sure transport is ready */
487
#if DISABLED_FOR_TICKET_1185
488
if (pjsua_var.calls[0].med_tp) {
489
pjmedia_transport_info tpinfo;
490
pjmedia_sdp_session *sdp;
492
pjmedia_transport_info_init(&tpinfo);
493
pjmedia_transport_get_info(pjsua_var.calls[0].med_tp, &tpinfo);
495
/* Add SDP body, using call0's RTP address */
496
status = pjmedia_endpt_create_sdp(pjsua_var.med_endpt, tdata->pool, 1,
497
&tpinfo.sock_info, &sdp);
498
if (status == PJ_SUCCESS) {
499
pjsip_create_sdp_body(tdata->pool, sdp, &tdata->msg->body);
505
pjsip_get_response_addr(tdata->pool, rdata, &res_addr);
506
status = pjsip_endpt_send_response(pjsua_var.endpt, &res_addr, tdata, NULL, NULL);
507
if (status != PJ_SUCCESS)
508
pjsip_tx_data_dec_ref(tdata);
514
/* The module instance. */
515
static pjsip_module pjsua_options_handler =
517
NULL, NULL, /* prev, next. */
518
{ "mod-pjsua-options", 17 }, /* Name. */
520
PJSIP_MOD_PRIORITY_APPLICATION, /* Priority */
525
&options_on_rx_request, /* on_rx_request() */
526
NULL, /* on_rx_response() */
527
NULL, /* on_tx_request. */
528
NULL, /* on_tx_response() */
529
NULL, /* on_tsx_state() */
534
/*****************************************************************************
535
* These two functions are the main callbacks registered to PJSIP stack
536
* to receive SIP request and response messages that are outside any
537
* dialogs and any transactions.
541
* Handler for receiving incoming requests.
543
* This handler serves multiple purposes:
544
* - it receives requests outside dialogs.
545
* - it receives requests inside dialogs, when the requests are
546
* unhandled by other dialog usages. Example of these
547
* requests are: MESSAGE.
549
static pj_bool_t mod_pjsua_on_rx_request(pjsip_rx_data *rdata)
551
pj_bool_t processed = PJ_FALSE;
555
if (rdata->msg_info.msg->line.req.method.id == PJSIP_INVITE_METHOD) {
557
processed = pjsua_call_on_incoming(rdata);
567
* Handler for receiving incoming responses.
569
* This handler serves multiple purposes:
570
* - it receives strayed responses (i.e. outside any dialog and
571
* outside any transactions).
572
* - it receives responses coming to a transaction, when pjsua
573
* module is set as transaction user for the transaction.
574
* - it receives responses inside a dialog, when these responses
575
* are unhandled by other dialog usages.
577
static pj_bool_t mod_pjsua_on_rx_response(pjsip_rx_data *rdata)
579
PJ_UNUSED_ARG(rdata);
584
/*****************************************************************************
589
static void log_writer(int level, const char *buffer, int len)
591
/* Write to file, stdout or application callback. */
593
if (pjsua_var.log_file) {
594
pj_ssize_t size = len;
595
pj_file_write(pjsua_var.log_file, buffer, &size);
596
/* This will slow things down considerably! Don't do it!
597
pj_file_flush(pjsua_var.log_file);
601
if (level <= (int)pjsua_var.log_cfg.console_level) {
602
if (pjsua_var.log_cfg.cb)
603
(*pjsua_var.log_cfg.cb)(level, buffer, len);
605
pj_log_write(level, buffer, len);
611
* Application can call this function at any time (after pjsua_create(), of
612
* course) to change logging settings.
614
PJ_DEF(pj_status_t) pjsua_reconfigure_logging(const pjsua_logging_config *cfg)
619
pjsua_logging_config_dup(pjsua_var.pool, &pjsua_var.log_cfg, cfg);
621
/* Redirect log function to ours */
622
pj_log_set_log_func( &log_writer );
625
pj_log_set_decor(pjsua_var.log_cfg.decor);
628
pj_log_set_level(pjsua_var.log_cfg.level);
630
/* Close existing file, if any */
631
if (pjsua_var.log_file) {
632
pj_file_close(pjsua_var.log_file);
633
pjsua_var.log_file = NULL;
636
/* If output log file is desired, create the file: */
637
if (pjsua_var.log_cfg.log_filename.slen) {
638
unsigned flags = PJ_O_WRONLY;
639
flags |= pjsua_var.log_cfg.log_file_flags;
640
status = pj_file_open(pjsua_var.pool,
641
pjsua_var.log_cfg.log_filename.ptr,
643
&pjsua_var.log_file);
645
if (status != PJ_SUCCESS) {
646
pjsua_perror(THIS_FILE, "Error creating log file", status);
651
/* Unregister msg logging if it's previously registered */
652
if (pjsua_msg_logger.id >= 0) {
653
pjsip_endpt_unregister_module(pjsua_var.endpt, &pjsua_msg_logger);
654
pjsua_msg_logger.id = -1;
657
/* Enable SIP message logging */
658
if (pjsua_var.log_cfg.msg_logging)
659
pjsip_endpt_register_module(pjsua_var.endpt, &pjsua_msg_logger);
665
/*****************************************************************************
669
/* Worker thread function. */
670
static int worker_thread(void *arg)
672
enum { TIMEOUT = 10 };
676
while (!pjsua_var.thread_quit_flag) {
679
count = pjsua_handle_events(TIMEOUT);
681
pj_thread_sleep(TIMEOUT);
688
/* Init random seed */
689
static void init_random_seed(void)
692
const pj_str_t *hostname;
698
hostname = pj_gethostname();
699
seed = pj_hash_calc(seed, hostname->ptr, (int)hostname->slen);
701
/* Add primary IP address */
702
if (pj_gethostip(pj_AF_INET(), &addr)==PJ_SUCCESS)
703
seed = pj_hash_calc(seed, &addr.ipv4.sin_addr, 4);
707
seed = pj_hash_calc(seed, &t, sizeof(t));
711
seed = pj_hash_calc(seed, &pid, sizeof(pid));
713
/* Init random seed */
718
* Instantiate pjsua application.
720
PJ_DEF(pj_status_t) pjsua_create(void)
724
/* Init pjsua data */
727
/* Set default logging settings */
728
pjsua_logging_config_default(&pjsua_var.log_cfg);
732
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
734
pj_log_push_indent();
736
/* Init random seed */
739
/* Init PJLIB-UTIL: */
740
status = pjlib_util_init();
741
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
744
status = pjnath_init();
745
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
747
/* Set default sound device ID */
748
pjsua_var.cap_dev = PJMEDIA_AUD_DEFAULT_CAPTURE_DEV;
749
pjsua_var.play_dev = PJMEDIA_AUD_DEFAULT_PLAYBACK_DEV;
751
/* Set default video device ID */
752
pjsua_var.vcap_dev = PJMEDIA_VID_DEFAULT_CAPTURE_DEV;
753
pjsua_var.vrdr_dev = PJMEDIA_VID_DEFAULT_RENDER_DEV;
755
/* Init caching pool. */
756
pj_caching_pool_init(&pjsua_var.cp, NULL, 0);
758
/* Create memory pool for application. */
759
pjsua_var.pool = pjsua_pool_create("pjsua", 1000, 1000);
761
PJ_ASSERT_RETURN(pjsua_var.pool, PJ_ENOMEM);
764
status = pj_mutex_create_recursive(pjsua_var.pool, "pjsua",
766
if (status != PJ_SUCCESS) {
768
pjsua_perror(THIS_FILE, "Unable to create mutex", status);
772
/* Must create SIP endpoint to initialize SIP parser. The parser
773
* is needed for example when application needs to call pjsua_verify_url().
775
status = pjsip_endpt_create(&pjsua_var.cp.factory,
776
pj_gethostname()->ptr,
778
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
780
/* Init timer entry list */
781
pj_list_init(&pjsua_var.timer_list);
783
/* Create timer mutex */
784
status = pj_mutex_create_recursive(pjsua_var.pool, "pjsua_timer",
785
&pjsua_var.timer_mutex);
786
if (status != PJ_SUCCESS) {
788
pjsua_perror(THIS_FILE, "Unable to create mutex", status);
792
pjsua_set_state(PJSUA_STATE_CREATED);
799
* Initialize pjsua with the specified settings. All the settings are
800
* optional, and the default values will be used when the config is not
803
PJ_DEF(pj_status_t) pjsua_init( const pjsua_config *ua_cfg,
804
const pjsua_logging_config *log_cfg,
805
const pjsua_media_config *media_cfg)
807
pjsua_config default_cfg;
808
pjsua_media_config default_media_cfg;
809
const pj_str_t STR_OPTIONS = { "OPTIONS", 7 };
810
pjsip_ua_init_param ua_init_param;
814
pj_log_push_indent();
816
/* Create default configurations when the config is not supplied */
818
if (ua_cfg == NULL) {
819
pjsua_config_default(&default_cfg);
820
ua_cfg = &default_cfg;
823
if (media_cfg == NULL) {
824
pjsua_media_config_default(&default_media_cfg);
825
media_cfg = &default_media_cfg;
828
/* Initialize logging first so that info/errors can be captured */
830
status = pjsua_reconfigure_logging(log_cfg);
831
if (status != PJ_SUCCESS)
835
#if defined(PJ_IPHONE_OS_HAS_MULTITASKING_SUPPORT) && \
836
PJ_IPHONE_OS_HAS_MULTITASKING_SUPPORT != 0
837
if (!(pj_get_sys_info()->flags & PJ_SYS_HAS_IOS_BG)) {
838
PJ_LOG(5, (THIS_FILE, "Device does not support "
840
pj_activesock_enable_iphone_os_bg(PJ_FALSE);
844
/* If nameserver is configured, create DNS resolver instance and
845
* set it to be used by SIP resolver.
847
if (ua_cfg->nameserver_count) {
848
#if PJSIP_HAS_RESOLVER
851
/* Create DNS resolver */
852
status = pjsip_endpt_create_resolver(pjsua_var.endpt,
853
&pjsua_var.resolver);
854
if (status != PJ_SUCCESS) {
855
pjsua_perror(THIS_FILE, "Error creating resolver", status);
859
/* Configure nameserver for the DNS resolver */
860
status = pj_dns_resolver_set_ns(pjsua_var.resolver,
861
ua_cfg->nameserver_count,
862
ua_cfg->nameserver, NULL);
863
if (status != PJ_SUCCESS) {
864
pjsua_perror(THIS_FILE, "Error setting nameserver", status);
868
/* Set this DNS resolver to be used by the SIP resolver */
869
status = pjsip_endpt_set_resolver(pjsua_var.endpt, pjsua_var.resolver);
870
if (status != PJ_SUCCESS) {
871
pjsua_perror(THIS_FILE, "Error setting DNS resolver", status);
875
/* Print nameservers */
876
for (i=0; i<ua_cfg->nameserver_count; ++i) {
877
PJ_LOG(4,(THIS_FILE, "Nameserver %.*s added",
878
(int)ua_cfg->nameserver[i].slen,
879
ua_cfg->nameserver[i].ptr));
883
"DNS resolver is disabled (PJSIP_HAS_RESOLVER==0)"));
889
/* Initialize transaction layer: */
890
status = pjsip_tsx_layer_init_module(pjsua_var.endpt);
891
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
894
/* Initialize UA layer module: */
895
pj_bzero(&ua_init_param, sizeof(ua_init_param));
896
if (ua_cfg->hangup_forked_call) {
897
ua_init_param.on_dlg_forked = &on_dlg_forked;
899
status = pjsip_ua_init_module( pjsua_var.endpt, &ua_init_param);
900
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
903
/* Initialize Replaces support. */
904
status = pjsip_replaces_init_module( pjsua_var.endpt );
905
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
907
/* Initialize 100rel support */
908
status = pjsip_100rel_init_module(pjsua_var.endpt);
909
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
911
/* Initialize session timer support */
912
status = pjsip_timer_init_module(pjsua_var.endpt);
913
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
915
/* Initialize and register PJSUA application module. */
917
const pjsip_module mod_initializer =
919
NULL, NULL, /* prev, next. */
920
{ "mod-pjsua", 9 }, /* Name. */
922
PJSIP_MOD_PRIORITY_APPLICATION, /* Priority */
927
&mod_pjsua_on_rx_request, /* on_rx_request() */
928
&mod_pjsua_on_rx_response, /* on_rx_response() */
929
NULL, /* on_tx_request. */
930
NULL, /* on_tx_response() */
931
NULL, /* on_tsx_state() */
934
pjsua_var.mod = mod_initializer;
936
status = pjsip_endpt_register_module(pjsua_var.endpt, &pjsua_var.mod);
937
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
940
/* Parse outbound proxies */
941
for (i=0; i<ua_cfg->outbound_proxy_cnt; ++i) {
943
pj_str_t hname = { "Route", 5};
946
pj_strdup_with_null(pjsua_var.pool, &tmp, &ua_cfg->outbound_proxy[i]);
948
r = (pjsip_route_hdr*)
949
pjsip_parse_hdr(pjsua_var.pool, &hname, tmp.ptr,
950
(unsigned)tmp.slen, NULL);
952
pjsua_perror(THIS_FILE, "Invalid outbound proxy URI",
954
status = PJSIP_EINVALIDURI;
958
if (pjsua_var.ua_cfg.force_lr) {
959
pjsip_sip_uri *sip_url;
960
if (!PJSIP_URI_SCHEME_IS_SIP(r->name_addr.uri) &&
961
!PJSIP_URI_SCHEME_IS_SIPS(r->name_addr.uri))
963
status = PJSIP_EINVALIDSCHEME;
966
sip_url = (pjsip_sip_uri*)r->name_addr.uri;
967
sip_url->lr_param = 1;
970
pj_list_push_back(&pjsua_var.outbound_proxy, r);
974
/* Initialize PJSUA call subsystem: */
975
status = pjsua_call_subsys_init(ua_cfg);
976
if (status != PJ_SUCCESS)
979
/* Convert deprecated STUN settings */
980
if (pjsua_var.ua_cfg.stun_srv_cnt==0) {
981
if (pjsua_var.ua_cfg.stun_domain.slen) {
982
pjsua_var.ua_cfg.stun_srv[pjsua_var.ua_cfg.stun_srv_cnt++] =
983
pjsua_var.ua_cfg.stun_domain;
985
if (pjsua_var.ua_cfg.stun_host.slen) {
986
pjsua_var.ua_cfg.stun_srv[pjsua_var.ua_cfg.stun_srv_cnt++] =
987
pjsua_var.ua_cfg.stun_host;
991
/* Start resolving STUN server */
992
status = resolve_stun_server(PJ_FALSE);
993
if (status != PJ_SUCCESS && status != PJ_EPENDING) {
994
pjsua_perror(THIS_FILE, "Error resolving STUN server", status);
998
/* Initialize PJSUA media subsystem */
999
status = pjsua_media_subsys_init(media_cfg);
1000
if (status != PJ_SUCCESS)
1004
/* Init core SIMPLE module : */
1005
status = pjsip_evsub_init_module(pjsua_var.endpt);
1006
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
1009
/* Init presence module: */
1010
status = pjsip_pres_init_module( pjsua_var.endpt, pjsip_evsub_instance());
1011
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
1013
/* Initialize MWI support */
1014
status = pjsip_mwi_init_module(pjsua_var.endpt, pjsip_evsub_instance());
1016
/* Init PUBLISH module */
1017
pjsip_publishc_init_module(pjsua_var.endpt);
1019
/* Init xfer/REFER module */
1020
status = pjsip_xfer_init_module( pjsua_var.endpt );
1021
PJ_ASSERT_RETURN(status == PJ_SUCCESS, status);
1023
/* Init pjsua presence handler: */
1024
status = pjsua_pres_init();
1025
if (status != PJ_SUCCESS)
1028
/* Init out-of-dialog MESSAGE request handler. */
1029
status = pjsua_im_init();
1030
if (status != PJ_SUCCESS)
1033
/* Register OPTIONS handler */
1034
pjsip_endpt_register_module(pjsua_var.endpt, &pjsua_options_handler);
1036
/* Add OPTIONS in Allow header */
1037
pjsip_endpt_add_capability(pjsua_var.endpt, NULL, PJSIP_H_ALLOW,
1038
NULL, 1, &STR_OPTIONS);
1040
/* Start worker thread if needed. */
1041
if (pjsua_var.ua_cfg.thread_cnt) {
1044
if (pjsua_var.ua_cfg.thread_cnt > PJ_ARRAY_SIZE(pjsua_var.thread))
1045
pjsua_var.ua_cfg.thread_cnt = PJ_ARRAY_SIZE(pjsua_var.thread);
1047
for (i=0; i<pjsua_var.ua_cfg.thread_cnt; ++i) {
1048
status = pj_thread_create(pjsua_var.pool, "pjsua", &worker_thread,
1049
NULL, 0, 0, &pjsua_var.thread[i]);
1050
if (status != PJ_SUCCESS)
1053
PJ_LOG(4,(THIS_FILE, "%d SIP worker threads created",
1054
pjsua_var.ua_cfg.thread_cnt));
1056
PJ_LOG(4,(THIS_FILE, "No SIP worker threads created"));
1061
PJ_LOG(3,(THIS_FILE, "pjsua version %s for %s initialized",
1062
pj_get_version(), pj_get_sys_info()->info.ptr));
1064
pjsua_set_state(PJSUA_STATE_INIT);
1065
pj_log_pop_indent();
1070
pj_log_pop_indent();
1075
/* Sleep with polling */
1076
static void busy_sleep(unsigned msec)
1078
pj_time_val timeout, now;
1080
pj_gettickcount(&timeout);
1081
timeout.msec += msec;
1082
pj_time_val_normalize(&timeout);
1087
while (pjsua_handle_events(10) > 0 && i > 0)
1089
pj_gettickcount(&now);
1090
} while (PJ_TIME_VAL_LT(now, timeout));
1093
static void stun_resolve_add_ref(pjsua_stun_resolve *sess)
1098
static void destroy_stun_resolve(pjsua_stun_resolve *sess)
1100
sess->destroy_flag = PJ_TRUE;
1101
if (sess->ref_cnt > 0)
1105
pj_list_erase(sess);
1108
pj_assert(sess->stun_sock==NULL);
1109
pj_pool_release(sess->pool);
1112
static void stun_resolve_dec_ref(pjsua_stun_resolve *sess)
1115
if (sess->ref_cnt <= 0 && sess->destroy_flag)
1116
destroy_stun_resolve(sess);
1120
/* This is the internal function to be called when STUN resolution
1121
* session (pj_stun_resolve) has completed.
1123
static void stun_resolve_complete(pjsua_stun_resolve *sess)
1125
pj_stun_resolve_result result;
1127
if (sess->has_result)
1130
pj_bzero(&result, sizeof(result));
1131
result.token = sess->token;
1132
result.status = sess->status;
1133
result.name = sess->srv[sess->idx];
1134
pj_memcpy(&result.addr, &sess->addr, sizeof(result.addr));
1135
sess->has_result = PJ_TRUE;
1137
if (result.status == PJ_SUCCESS) {
1138
char addr[PJ_INET6_ADDRSTRLEN+10];
1139
pj_sockaddr_print(&result.addr, addr, sizeof(addr), 3);
1140
PJ_LOG(4,(THIS_FILE,
1141
"STUN resolution success, using %.*s, address is %s",
1142
(int)sess->srv[sess->idx].slen,
1143
sess->srv[sess->idx].ptr,
1146
char errmsg[PJ_ERR_MSG_SIZE];
1147
pj_strerror(result.status, errmsg, sizeof(errmsg));
1148
PJ_LOG(1,(THIS_FILE, "STUN resolution failed: %s", errmsg));
1151
stun_resolve_add_ref(sess);
1153
stun_resolve_dec_ref(sess);
1156
if (!sess->blocking) {
1157
destroy_stun_resolve(sess);
1161
/* This is the callback called by the STUN socket (pj_stun_sock)
1162
* to report it's state. We use this as part of testing the
1165
static pj_bool_t test_stun_on_status(pj_stun_sock *stun_sock,
1169
pjsua_stun_resolve *sess;
1171
sess = (pjsua_stun_resolve*) pj_stun_sock_get_user_data(stun_sock);
1172
pj_assert(stun_sock == sess->stun_sock);
1174
if (status != PJ_SUCCESS) {
1175
char errmsg[PJ_ERR_MSG_SIZE];
1176
pj_strerror(status, errmsg, sizeof(errmsg));
1178
PJ_LOG(4,(THIS_FILE, "STUN resolution for %.*s failed: %s",
1179
(int)sess->srv[sess->idx].slen,
1180
sess->srv[sess->idx].ptr, errmsg));
1182
sess->status = status;
1184
pj_stun_sock_destroy(stun_sock);
1185
sess->stun_sock = NULL;
1188
resolve_stun_entry(sess);
1192
} else if (op == PJ_STUN_SOCK_BINDING_OP) {
1193
pj_stun_sock_info ssi;
1195
pj_stun_sock_get_info(stun_sock, &ssi);
1196
pj_memcpy(&sess->addr, &ssi.srv_addr, sizeof(sess->addr));
1198
sess->status = PJ_SUCCESS;
1199
pj_stun_sock_destroy(stun_sock);
1200
sess->stun_sock = NULL;
1202
stun_resolve_complete(sess);
1211
/* This is an internal function to resolve and test current
1212
* server entry in pj_stun_resolve session. It is called by
1213
* pjsua_resolve_stun_servers() and test_stun_on_status() above
1215
static void resolve_stun_entry(pjsua_stun_resolve *sess)
1217
stun_resolve_add_ref(sess);
1219
/* Loop while we have entry to try */
1220
for (; sess->idx < sess->count; ++sess->idx) {
1221
const int af = pj_AF_INET();
1225
pj_stun_sock_cb stun_sock_cb;
1227
pj_assert(sess->idx < sess->count);
1229
pj_ansi_snprintf(target, sizeof(target), "%.*s",
1230
(int)sess->srv[sess->idx].slen,
1231
sess->srv[sess->idx].ptr);
1233
/* Parse the server entry into host:port */
1234
sess->status = pj_sockaddr_parse2(af, 0, &sess->srv[sess->idx],
1235
&hostpart, &port, NULL);
1236
if (sess->status != PJ_SUCCESS) {
1237
PJ_LOG(2,(THIS_FILE, "Invalid STUN server entry %s", target));
1241
/* Use default port if not specified */
1243
port = PJ_STUN_PORT;
1245
pj_assert(sess->stun_sock == NULL);
1247
PJ_LOG(4,(THIS_FILE, "Trying STUN server %s (%d of %d)..",
1248
target, sess->idx+1, sess->count));
1250
/* Use STUN_sock to test this entry */
1251
pj_bzero(&stun_sock_cb, sizeof(stun_sock_cb));
1252
stun_sock_cb.on_status = &test_stun_on_status;
1253
sess->status = pj_stun_sock_create(&pjsua_var.stun_cfg, "stunresolve",
1254
pj_AF_INET(), &stun_sock_cb,
1255
NULL, sess, &sess->stun_sock);
1256
if (sess->status != PJ_SUCCESS) {
1257
char errmsg[PJ_ERR_MSG_SIZE];
1258
pj_strerror(sess->status, errmsg, sizeof(errmsg));
1259
PJ_LOG(4,(THIS_FILE,
1260
"Error creating STUN socket for %s: %s",
1266
sess->status = pj_stun_sock_start(sess->stun_sock, &hostpart,
1267
port, pjsua_var.resolver);
1268
if (sess->status != PJ_SUCCESS) {
1269
char errmsg[PJ_ERR_MSG_SIZE];
1270
pj_strerror(sess->status, errmsg, sizeof(errmsg));
1271
PJ_LOG(4,(THIS_FILE,
1272
"Error starting STUN socket for %s: %s",
1275
if (sess->stun_sock) {
1276
pj_stun_sock_destroy(sess->stun_sock);
1277
sess->stun_sock = NULL;
1282
/* Done for now, testing will resume/complete asynchronously in
1288
if (sess->idx >= sess->count) {
1289
/* No more entries to try */
1290
PJ_ASSERT_ON_FAIL(sess->status != PJ_SUCCESS,
1291
sess->status = PJ_EUNKNOWN);
1292
stun_resolve_complete(sess);
1296
stun_resolve_dec_ref(sess);
1301
* Resolve STUN server.
1303
PJ_DEF(pj_status_t) pjsua_resolve_stun_servers( unsigned count,
1307
pj_stun_resolve_cb cb)
1310
pjsua_stun_resolve *sess;
1314
PJ_ASSERT_RETURN(count && srv && cb, PJ_EINVAL);
1316
pool = pjsua_pool_create("stunres", 256, 256);
1320
sess = PJ_POOL_ZALLOC_T(pool, pjsua_stun_resolve);
1322
sess->token = token;
1324
sess->count = count;
1325
sess->blocking = wait;
1326
sess->status = PJ_EPENDING;
1327
sess->srv = (pj_str_t*) pj_pool_calloc(pool, count, sizeof(pj_str_t));
1328
for (i=0; i<count; ++i) {
1329
pj_strdup(pool, &sess->srv[i], &srv[i]);
1333
pj_list_push_back(&pjsua_var.stun_res, sess);
1336
resolve_stun_entry(sess);
1341
while (sess->status == PJ_EPENDING) {
1342
pjsua_handle_events(50);
1345
status = sess->status;
1346
destroy_stun_resolve(sess);
1352
* Cancel pending STUN resolution.
1354
PJ_DEF(pj_status_t) pjsua_cancel_stun_resolution( void *token,
1355
pj_bool_t notify_cb)
1357
pjsua_stun_resolve *sess;
1358
unsigned cancelled_count = 0;
1361
sess = pjsua_var.stun_res.next;
1362
while (sess != &pjsua_var.stun_res) {
1363
pjsua_stun_resolve *next = sess->next;
1365
if (sess->token == token) {
1367
pj_stun_resolve_result result;
1369
pj_bzero(&result, sizeof(result));
1370
result.token = token;
1371
result.status = PJ_ECANCELLED;
1376
destroy_stun_resolve(sess);
1384
return cancelled_count ? PJ_SUCCESS : PJ_ENOTFOUND;
1387
static void internal_stun_resolve_cb(const pj_stun_resolve_result *result)
1389
pjsua_var.stun_status = result->status;
1390
if (result->status == PJ_SUCCESS) {
1391
pj_memcpy(&pjsua_var.stun_srv, &result->addr, sizeof(result->addr));
1396
* Resolve STUN server.
1398
pj_status_t resolve_stun_server(pj_bool_t wait)
1400
if (pjsua_var.stun_status == PJ_EUNKNOWN) {
1403
/* Initialize STUN configuration */
1404
pj_stun_config_init(&pjsua_var.stun_cfg, &pjsua_var.cp.factory, 0,
1405
pjsip_endpt_get_ioqueue(pjsua_var.endpt),
1406
pjsip_endpt_get_timer_heap(pjsua_var.endpt));
1408
/* Start STUN server resolution */
1409
if (pjsua_var.ua_cfg.stun_srv_cnt) {
1410
pjsua_var.stun_status = PJ_EPENDING;
1411
status = pjsua_resolve_stun_servers(pjsua_var.ua_cfg.stun_srv_cnt,
1412
pjsua_var.ua_cfg.stun_srv,
1414
&internal_stun_resolve_cb);
1415
if (wait || status != PJ_SUCCESS) {
1416
pjsua_var.stun_status = status;
1419
pjsua_var.stun_status = PJ_SUCCESS;
1422
} else if (pjsua_var.stun_status == PJ_EPENDING) {
1423
/* STUN server resolution has been started, wait for the
1427
while (pjsua_var.stun_status == PJ_EPENDING) {
1428
if (pjsua_var.thread[0] == NULL)
1429
pjsua_handle_events(10);
1431
pj_thread_sleep(10);
1436
if (pjsua_var.stun_status != PJ_EPENDING &&
1437
pjsua_var.stun_status != PJ_SUCCESS &&
1438
pjsua_var.ua_cfg.stun_ignore_failure)
1440
PJ_LOG(2,(THIS_FILE,
1441
"Ignoring STUN resolution failure (by setting)"));
1442
pjsua_var.stun_status = PJ_SUCCESS;
1445
return pjsua_var.stun_status;
1451
PJ_DEF(pj_status_t) pjsua_destroy2(unsigned flags)
1453
int i; /* Must be signed */
1455
if (pjsua_var.endpt) {
1456
PJ_LOG(4,(THIS_FILE, "Shutting down, flags=%d...", flags));
1459
if (pjsua_var.state > PJSUA_STATE_NULL &&
1460
pjsua_var.state < PJSUA_STATE_CLOSING)
1462
pjsua_set_state(PJSUA_STATE_CLOSING);
1465
/* Signal threads to quit: */
1466
pjsua_var.thread_quit_flag = 1;
1468
/* Wait worker threads to quit: */
1469
for (i=0; i<(int)pjsua_var.ua_cfg.thread_cnt; ++i) {
1470
if (pjsua_var.thread[i]) {
1472
status = pj_thread_join(pjsua_var.thread[i]);
1473
if (status != PJ_SUCCESS) {
1474
PJ_PERROR(4,(THIS_FILE, status, "Error joining worker thread"));
1475
pj_thread_sleep(1000);
1477
pj_thread_destroy(pjsua_var.thread[i]);
1478
pjsua_var.thread[i] = NULL;
1482
if (pjsua_var.endpt) {
1485
pj_log_push_indent();
1487
/* Terminate all calls. */
1488
if ((flags & PJSUA_DESTROY_NO_TX_MSG) == 0) {
1489
pjsua_call_hangup_all();
1492
/* Set all accounts to offline */
1493
for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1494
if (!pjsua_var.acc[i].valid)
1496
pjsua_var.acc[i].online_status = PJ_FALSE;
1497
pj_bzero(&pjsua_var.acc[i].rpid, sizeof(pjrpid_element));
1500
/* Terminate all presence subscriptions. */
1501
pjsua_pres_shutdown(flags);
1503
/* Destroy media (to shutdown media transports etc) */
1504
pjsua_media_subsys_destroy(flags);
1506
/* Wait for sometime until all publish client sessions are done
1509
/* First stage, get the maximum wait time */
1511
for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1512
if (!pjsua_var.acc[i].valid)
1514
if (pjsua_var.acc[i].cfg.unpublish_max_wait_time_msec > max_wait)
1515
max_wait = pjsua_var.acc[i].cfg.unpublish_max_wait_time_msec;
1518
/* No waiting if RX is disabled */
1519
if (flags & PJSUA_DESTROY_NO_RX_MSG) {
1523
/* Second stage, wait for unpublications to complete */
1524
for (i=0; i<(int)(max_wait/50); ++i) {
1526
for (j=0; j<PJ_ARRAY_SIZE(pjsua_var.acc); ++j) {
1527
if (!pjsua_var.acc[j].valid)
1530
if (pjsua_var.acc[j].publish_sess)
1533
if (j != PJ_ARRAY_SIZE(pjsua_var.acc))
1539
/* Third stage, forcefully destroy unfinished unpublications */
1540
for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1541
if (pjsua_var.acc[i].publish_sess) {
1542
pjsip_publishc_destroy(pjsua_var.acc[i].publish_sess);
1543
pjsua_var.acc[i].publish_sess = NULL;
1547
/* Unregister all accounts */
1548
for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1549
if (!pjsua_var.acc[i].valid)
1552
if (pjsua_var.acc[i].regc && (flags & PJSUA_DESTROY_NO_TX_MSG)==0)
1554
pjsua_acc_set_registration(i, PJ_FALSE);
1558
/* Terminate any pending STUN resolution */
1559
if (!pj_list_empty(&pjsua_var.stun_res)) {
1560
pjsua_stun_resolve *sess = pjsua_var.stun_res.next;
1561
while (sess != &pjsua_var.stun_res) {
1562
pjsua_stun_resolve *next = sess->next;
1563
destroy_stun_resolve(sess);
1568
/* Wait until all unregistrations are done (ticket #364) */
1569
/* First stage, get the maximum wait time */
1571
for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1572
if (!pjsua_var.acc[i].valid)
1574
if (pjsua_var.acc[i].cfg.unreg_timeout > max_wait)
1575
max_wait = pjsua_var.acc[i].cfg.unreg_timeout;
1578
/* No waiting if RX is disabled */
1579
if (flags & PJSUA_DESTROY_NO_RX_MSG) {
1583
/* Second stage, wait for unregistrations to complete */
1584
for (i=0; i<(int)(max_wait/50); ++i) {
1586
for (j=0; j<PJ_ARRAY_SIZE(pjsua_var.acc); ++j) {
1587
if (!pjsua_var.acc[j].valid)
1590
if (pjsua_var.acc[j].regc)
1593
if (j != PJ_ARRAY_SIZE(pjsua_var.acc))
1598
/* Note variable 'i' is used below */
1600
/* Wait for some time to allow unregistration and ICE/TURN
1601
* transports shutdown to complete:
1603
if (i < 20 && (flags & PJSUA_DESTROY_NO_RX_MSG) == 0) {
1604
busy_sleep(1000 - i*50);
1607
PJ_LOG(4,(THIS_FILE, "Destroying..."));
1609
/* Must destroy endpoint first before destroying pools in
1610
* buddies or accounts, since shutting down transaction layer
1611
* may emit events which trigger some buddy or account callbacks
1614
pjsip_endpt_destroy(pjsua_var.endpt);
1615
pjsua_var.endpt = NULL;
1617
/* Destroy pool in the buddy object */
1618
for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.buddy); ++i) {
1619
if (pjsua_var.buddy[i].pool) {
1620
pj_pool_release(pjsua_var.buddy[i].pool);
1621
pjsua_var.buddy[i].pool = NULL;
1625
/* Destroy accounts */
1626
for (i=0; i<(int)PJ_ARRAY_SIZE(pjsua_var.acc); ++i) {
1627
if (pjsua_var.acc[i].pool) {
1628
pj_pool_release(pjsua_var.acc[i].pool);
1629
pjsua_var.acc[i].pool = NULL;
1635
if (pjsua_var.mutex) {
1636
pj_mutex_destroy(pjsua_var.mutex);
1637
pjsua_var.mutex = NULL;
1640
/* Destroy pool and pool factory. */
1641
if (pjsua_var.pool) {
1642
pj_pool_release(pjsua_var.pool);
1643
pjsua_var.pool = NULL;
1644
pj_caching_pool_destroy(&pjsua_var.cp);
1646
pjsua_set_state(PJSUA_STATE_NULL);
1648
PJ_LOG(4,(THIS_FILE, "PJSUA destroyed..."));
1651
if (pjsua_var.log_file) {
1652
pj_file_close(pjsua_var.log_file);
1653
pjsua_var.log_file = NULL;
1656
pj_log_pop_indent();
1658
/* Shutdown PJLIB */
1662
/* Clear pjsua_var */
1663
pj_bzero(&pjsua_var, sizeof(pjsua_var));
1669
void pjsua_set_state(pjsua_state new_state)
1671
const char *state_name[] = {
1679
pjsua_state old_state = pjsua_var.state;
1681
pjsua_var.state = new_state;
1682
PJ_LOG(4,(THIS_FILE, "PJSUA state changed: %s --> %s",
1683
state_name[old_state], state_name[new_state]));
1687
PJ_DEF(pjsua_state) pjsua_get_state(void)
1689
return pjsua_var.state;
1692
PJ_DEF(pj_status_t) pjsua_destroy(void)
1694
return pjsua_destroy2(0);
1699
* Application is recommended to call this function after all initialization
1700
* is done, so that the library can do additional checking set up
1703
* @return PJ_SUCCESS on success, or the appropriate error code.
1705
PJ_DEF(pj_status_t) pjsua_start(void)
1709
pjsua_set_state(PJSUA_STATE_STARTING);
1710
pj_log_push_indent();
1712
status = pjsua_call_subsys_start();
1713
if (status != PJ_SUCCESS)
1716
status = pjsua_media_subsys_start();
1717
if (status != PJ_SUCCESS)
1720
status = pjsua_pres_start();
1721
if (status != PJ_SUCCESS)
1724
pjsua_set_state(PJSUA_STATE_RUNNING);
1727
pj_log_pop_indent();
1733
* Poll pjsua for events, and if necessary block the caller thread for
1734
* the specified maximum interval (in miliseconds).
1736
PJ_DEF(int) pjsua_handle_events(unsigned msec_timeout)
1738
#if defined(PJ_SYMBIAN) && PJ_SYMBIAN != 0
1740
return pj_symbianos_poll(-1, msec_timeout);
1749
tv.msec = msec_timeout;
1750
pj_time_val_normalize(&tv);
1752
status = pjsip_endpt_handle_events2(pjsua_var.endpt, &tv, &count);
1754
if (status != PJ_SUCCESS)
1764
* Create memory pool.
1766
PJ_DEF(pj_pool_t*) pjsua_pool_create( const char *name, pj_size_t init_size,
1767
pj_size_t increment)
1769
/* Pool factory is thread safe, no need to lock */
1770
return pj_pool_create(&pjsua_var.cp.factory, name, init_size, increment,
1776
* Internal function to get SIP endpoint instance of pjsua, which is
1777
* needed for example to register module, create transports, etc.
1778
* Probably is only valid after #pjsua_init() is called.
1780
PJ_DEF(pjsip_endpoint*) pjsua_get_pjsip_endpt(void)
1782
return pjsua_var.endpt;
1786
* Internal function to get media endpoint instance.
1787
* Only valid after #pjsua_init() is called.
1789
PJ_DEF(pjmedia_endpt*) pjsua_get_pjmedia_endpt(void)
1791
return pjsua_var.med_endpt;
1795
* Internal function to get PJSUA pool factory.
1797
PJ_DEF(pj_pool_factory*) pjsua_get_pool_factory(void)
1799
return &pjsua_var.cp.factory;
1802
/*****************************************************************************
1803
* PJSUA SIP Transport API.
1807
* Tools to get address string.
1809
static const char *addr_string(const pj_sockaddr_t *addr)
1811
static char str[128];
1813
pj_inet_ntop(((const pj_sockaddr*)addr)->addr.sa_family,
1814
pj_sockaddr_get_addr(addr),
1819
void pjsua_acc_on_tp_state_changed(pjsip_transport *tp,
1820
pjsip_transport_state state,
1821
const pjsip_transport_state_info *info);
1823
/* Callback to receive transport state notifications */
1824
static void on_tp_state_callback(pjsip_transport *tp,
1825
pjsip_transport_state state,
1826
const pjsip_transport_state_info *info)
1828
if (pjsua_var.ua_cfg.cb.on_transport_state) {
1829
(*pjsua_var.ua_cfg.cb.on_transport_state)(tp, state, info);
1831
if (pjsua_var.old_tp_cb) {
1832
(*pjsua_var.old_tp_cb)(tp, state, info);
1834
pjsua_acc_on_tp_state_changed(tp, state, info);
1838
* Create and initialize SIP socket (and possibly resolve public
1839
* address via STUN, depending on config).
1841
static pj_status_t create_sip_udp_sock(int af,
1842
const pjsua_transport_config *cfg,
1844
pj_sockaddr *p_pub_addr)
1846
char stun_ip_addr[PJ_INET6_ADDRSTRLEN];
1847
unsigned port = cfg->port;
1850
pj_sockaddr bind_addr;
1853
/* Make sure STUN server resolution has completed */
1854
status = resolve_stun_server(PJ_TRUE);
1855
if (status != PJ_SUCCESS) {
1856
pjsua_perror(THIS_FILE, "Error resolving STUN server", status);
1860
/* Initialize bound address */
1861
if (cfg->bound_addr.slen) {
1862
status = pj_sockaddr_init(af, &bind_addr, &cfg->bound_addr,
1864
if (status != PJ_SUCCESS) {
1865
pjsua_perror(THIS_FILE,
1866
"Unable to resolve transport bound address",
1871
pj_sockaddr_init(af, &bind_addr, NULL, (pj_uint16_t)port);
1875
status = pj_sock_socket(af, pj_SOCK_DGRAM(), 0, &sock);
1876
if (status != PJ_SUCCESS) {
1877
pjsua_perror(THIS_FILE, "socket() error", status);
1881
/* Apply QoS, if specified */
1882
status = pj_sock_apply_qos2(sock, cfg->qos_type,
1884
2, THIS_FILE, "SIP UDP socket");
1887
status = pj_sock_bind(sock, &bind_addr, pj_sockaddr_get_len(&bind_addr));
1888
if (status != PJ_SUCCESS) {
1889
pjsua_perror(THIS_FILE, "bind() error", status);
1890
pj_sock_close(sock);
1894
/* If port is zero, get the bound port */
1896
pj_sockaddr bound_addr;
1897
int namelen = sizeof(bound_addr);
1898
status = pj_sock_getsockname(sock, &bound_addr, &namelen);
1899
if (status != PJ_SUCCESS) {
1900
pjsua_perror(THIS_FILE, "getsockname() error", status);
1901
pj_sock_close(sock);
1905
port = pj_sockaddr_get_port(&bound_addr);
1908
if (pjsua_var.stun_srv.addr.sa_family != 0) {
1909
pj_ansi_strcpy(stun_ip_addr,pj_inet_ntoa(pjsua_var.stun_srv.ipv4.sin_addr));
1910
stun_srv = pj_str(stun_ip_addr);
1915
/* Get the published address, either by STUN or by resolving
1916
* the name of local host.
1918
if (pj_sockaddr_has_addr(p_pub_addr)) {
1920
* Public address is already specified, no need to resolve the
1921
* address, only set the port.
1923
if (pj_sockaddr_get_port(p_pub_addr) == 0)
1924
pj_sockaddr_set_port(p_pub_addr, (pj_uint16_t)port);
1926
} else if (stun_srv.slen) {
1927
pjstun_setting stun_opt;
1930
* STUN is specified, resolve the address with STUN.
1932
if (af != pj_AF_INET()) {
1933
pjsua_perror(THIS_FILE, "Cannot use STUN", PJ_EAFNOTSUP);
1934
pj_sock_close(sock);
1935
return PJ_EAFNOTSUP;
1938
pj_bzero(&stun_opt, sizeof(stun_opt));
1939
stun_opt.use_stun2 = pjsua_var.ua_cfg.stun_map_use_stun2;
1940
stun_opt.srv1 = stun_opt.srv2 = stun_srv;
1941
stun_opt.port1 = stun_opt.port2 =
1942
pj_ntohs(pjsua_var.stun_srv.ipv4.sin_port);
1943
status = pjstun_get_mapped_addr2(&pjsua_var.cp.factory, &stun_opt,
1944
1, &sock, &p_pub_addr->ipv4);
1945
if (status != PJ_SUCCESS) {
1946
pjsua_perror(THIS_FILE, "Error contacting STUN server", status);
1947
pj_sock_close(sock);
1952
pj_bzero(p_pub_addr, sizeof(pj_sockaddr));
1954
if (pj_sockaddr_has_addr(&bind_addr)) {
1955
pj_sockaddr_copy_addr(p_pub_addr, &bind_addr);
1957
status = pj_gethostip(af, p_pub_addr);
1958
if (status != PJ_SUCCESS) {
1959
pjsua_perror(THIS_FILE, "Unable to get local host IP", status);
1960
pj_sock_close(sock);
1965
p_pub_addr->addr.sa_family = (pj_uint16_t)af;
1966
pj_sockaddr_set_port(p_pub_addr, (pj_uint16_t)port);
1971
PJ_LOG(4,(THIS_FILE, "SIP UDP socket reachable at %s:%d",
1972
addr_string(p_pub_addr),
1973
(int)pj_sockaddr_get_port(p_pub_addr)));
1980
* Create SIP transport.
1982
PJ_DEF(pj_status_t) pjsua_transport_create( pjsip_transport_type_e type,
1983
const pjsua_transport_config *cfg,
1984
pjsua_transport_id *p_id)
1986
pjsip_transport *tp;
1992
/* Find empty transport slot */
1993
for (id=0; id < PJ_ARRAY_SIZE(pjsua_var.tpdata); ++id) {
1994
if (pjsua_var.tpdata[id].data.ptr == NULL)
1998
if (id == PJ_ARRAY_SIZE(pjsua_var.tpdata)) {
1999
status = PJ_ETOOMANY;
2000
pjsua_perror(THIS_FILE, "Error creating transport", status);
2004
/* Create the transport */
2005
if (type==PJSIP_TRANSPORT_UDP || type==PJSIP_TRANSPORT_UDP6) {
2007
* Create UDP transport (IPv4 or IPv6).
2009
pjsua_transport_config config;
2010
char hostbuf[PJ_INET6_ADDRSTRLEN];
2011
pj_sock_t sock = PJ_INVALID_SOCKET;
2012
pj_sockaddr pub_addr;
2013
pjsip_host_port addr_name;
2015
/* Supply default config if it's not specified */
2017
pjsua_transport_config_default(&config);
2021
/* Initialize the public address from the config, if any */
2022
pj_sockaddr_init(pjsip_transport_type_get_af(type), &pub_addr,
2023
NULL, (pj_uint16_t)cfg->port);
2024
if (cfg->public_addr.slen) {
2025
status = pj_sockaddr_set_str_addr(pjsip_transport_type_get_af(type),
2026
&pub_addr, &cfg->public_addr);
2027
if (status != PJ_SUCCESS) {
2028
pjsua_perror(THIS_FILE,
2029
"Unable to resolve transport public address",
2035
/* Create the socket and possibly resolve the address with STUN
2036
* (only when public address is not specified).
2038
status = create_sip_udp_sock(pjsip_transport_type_get_af(type),
2039
cfg, &sock, &pub_addr);
2040
if (status != PJ_SUCCESS)
2043
pj_ansi_strcpy(hostbuf, addr_string(&pub_addr));
2044
addr_name.host = pj_str(hostbuf);
2045
addr_name.port = pj_sockaddr_get_port(&pub_addr);
2047
/* Create UDP transport */
2048
status = pjsip_udp_transport_attach2(pjsua_var.endpt, type, sock,
2049
&addr_name, 1, &tp);
2050
if (status != PJ_SUCCESS) {
2051
pjsua_perror(THIS_FILE, "Error creating SIP UDP transport",
2053
pj_sock_close(sock);
2058
/* Save the transport */
2059
pjsua_var.tpdata[id].type = type;
2060
pjsua_var.tpdata[id].local_name = tp->local_name;
2061
pjsua_var.tpdata[id].data.tp = tp;
2063
#if defined(PJ_HAS_TCP) && PJ_HAS_TCP!=0
2065
} else if (type == PJSIP_TRANSPORT_TCP || type == PJSIP_TRANSPORT_TCP6) {
2067
* Create TCP transport.
2069
pjsua_transport_config config;
2070
pjsip_tpfactory *tcp;
2071
pjsip_tcp_transport_cfg tcp_cfg;
2074
af = (type==PJSIP_TRANSPORT_TCP6) ? pj_AF_INET6() : pj_AF_INET();
2075
pjsip_tcp_transport_cfg_default(&tcp_cfg, af);
2077
/* Supply default config if it's not specified */
2079
pjsua_transport_config_default(&config);
2083
/* Configure bind address */
2085
pj_sockaddr_set_port(&tcp_cfg.bind_addr, (pj_uint16_t)cfg->port);
2087
if (cfg->bound_addr.slen) {
2088
status = pj_sockaddr_set_str_addr(tcp_cfg.af,
2091
if (status != PJ_SUCCESS) {
2092
pjsua_perror(THIS_FILE,
2093
"Unable to resolve transport bound address",
2099
/* Set published name */
2100
if (cfg->public_addr.slen)
2101
tcp_cfg.addr_name.host = cfg->public_addr;
2103
/* Copy the QoS settings */
2104
tcp_cfg.qos_type = cfg->qos_type;
2105
pj_memcpy(&tcp_cfg.qos_params, &cfg->qos_params,
2106
sizeof(cfg->qos_params));
2108
/* Create the TCP transport */
2109
status = pjsip_tcp_transport_start3(pjsua_var.endpt, &tcp_cfg, &tcp);
2111
if (status != PJ_SUCCESS) {
2112
pjsua_perror(THIS_FILE, "Error creating SIP TCP listener",
2117
/* Save the transport */
2118
pjsua_var.tpdata[id].type = type;
2119
pjsua_var.tpdata[id].local_name = tcp->addr_name;
2120
pjsua_var.tpdata[id].data.factory = tcp;
2122
#endif /* PJ_HAS_TCP */
2124
#if defined(PJSIP_HAS_TLS_TRANSPORT) && PJSIP_HAS_TLS_TRANSPORT!=0
2125
} else if (type == PJSIP_TRANSPORT_TLS || type == PJSIP_TRANSPORT_TLS6) {
2127
* Create TLS transport.
2129
pjsua_transport_config config;
2130
pjsip_host_port a_name;
2131
pjsip_tpfactory *tls;
2132
pj_sockaddr local_addr;
2135
/* Supply default config if it's not specified */
2137
pjsua_transport_config_default(&config);
2142
/* Init local address */
2143
af = (type==PJSIP_TRANSPORT_TLS) ? pj_AF_INET() : pj_AF_INET6();
2144
pj_sockaddr_init(af, &local_addr, NULL, 0);
2147
pj_sockaddr_set_port(&local_addr, (pj_uint16_t)cfg->port);
2149
if (cfg->bound_addr.slen) {
2150
status = pj_sockaddr_set_str_addr(af, &local_addr,
2152
if (status != PJ_SUCCESS) {
2153
pjsua_perror(THIS_FILE,
2154
"Unable to resolve transport bound address",
2160
/* Init published name */
2161
pj_bzero(&a_name, sizeof(pjsip_host_port));
2162
if (cfg->public_addr.slen)
2163
a_name.host = cfg->public_addr;
2165
status = pjsip_tls_transport_start2(pjsua_var.endpt,
2167
&local_addr, &a_name, 1, &tls);
2168
if (status != PJ_SUCCESS) {
2169
pjsua_perror(THIS_FILE, "Error creating SIP TLS listener",
2174
/* Save the transport */
2175
pjsua_var.tpdata[id].type = type;
2176
pjsua_var.tpdata[id].local_name = tls->addr_name;
2177
pjsua_var.tpdata[id].data.factory = tls;
2181
status = PJSIP_EUNSUPTRANSPORT;
2182
pjsua_perror(THIS_FILE, "Error creating transport", status);
2186
/* Set transport state callback */
2188
pjsip_tp_state_callback tpcb;
2191
tpmgr = pjsip_endpt_get_tpmgr(pjsua_var.endpt);
2192
tpcb = pjsip_tpmgr_get_state_cb(tpmgr);
2194
if (tpcb != &on_tp_state_callback) {
2195
pjsua_var.old_tp_cb = tpcb;
2196
pjsip_tpmgr_set_state_cb(tpmgr, &on_tp_state_callback);
2201
if (p_id) *p_id = id;
2203
status = PJ_SUCCESS;
2214
* Register transport that has been created by application.
2216
PJ_DEF(pj_status_t) pjsua_transport_register( pjsip_transport *tp,
2217
pjsua_transport_id *p_id)
2223
/* Find empty transport slot */
2224
for (id=0; id < PJ_ARRAY_SIZE(pjsua_var.tpdata); ++id) {
2225
if (pjsua_var.tpdata[id].data.ptr == NULL)
2229
if (id == PJ_ARRAY_SIZE(pjsua_var.tpdata)) {
2230
pjsua_perror(THIS_FILE, "Error creating transport", PJ_ETOOMANY);
2235
/* Save the transport */
2236
pjsua_var.tpdata[id].type = (pjsip_transport_type_e) tp->key.type;
2237
pjsua_var.tpdata[id].local_name = tp->local_name;
2238
pjsua_var.tpdata[id].data.tp = tp;
2241
if (p_id) *p_id = id;
2250
* Enumerate all transports currently created in the system.
2252
PJ_DEF(pj_status_t) pjsua_enum_transports( pjsua_transport_id id[],
2259
for (i=0, count=0; i<PJ_ARRAY_SIZE(pjsua_var.tpdata) && count<*p_count;
2262
if (!pjsua_var.tpdata[i].data.ptr)
2277
* Get information about transports.
2279
PJ_DEF(pj_status_t) pjsua_transport_get_info( pjsua_transport_id id,
2280
pjsua_transport_info *info)
2282
pjsua_transport_data *t = &pjsua_var.tpdata[id];
2285
pj_bzero(info, sizeof(*info));
2287
/* Make sure id is in range. */
2288
PJ_ASSERT_RETURN(id>=0 && id<(int)PJ_ARRAY_SIZE(pjsua_var.tpdata),
2291
/* Make sure that transport exists */
2292
PJ_ASSERT_RETURN(pjsua_var.tpdata[id].data.ptr != NULL, PJ_EINVAL);
2296
if (t->type == PJSIP_TRANSPORT_UDP) {
2298
pjsip_transport *tp = t->data.tp;
2302
return PJ_EINVALIDOP;
2306
info->type = (pjsip_transport_type_e) tp->key.type;
2307
info->type_name = pj_str(tp->type_name);
2308
info->info = pj_str(tp->info);
2309
info->flag = tp->flag;
2310
info->addr_len = tp->addr_len;
2311
info->local_addr = tp->local_addr;
2312
info->local_name = tp->local_name;
2313
info->usage_count = pj_atomic_get(tp->ref_cnt);
2315
status = PJ_SUCCESS;
2317
} else if (t->type == PJSIP_TRANSPORT_TCP ||
2318
t->type == PJSIP_TRANSPORT_TLS)
2321
pjsip_tpfactory *factory = t->data.factory;
2323
if (factory == NULL) {
2325
return PJ_EINVALIDOP;
2329
info->type = t->type;
2330
info->type_name = (t->type==PJSIP_TRANSPORT_TCP)? pj_str("TCP"):
2332
info->info = (t->type==PJSIP_TRANSPORT_TCP)? pj_str("TCP transport"):
2333
pj_str("TLS transport");
2334
info->flag = factory->flag;
2335
info->addr_len = sizeof(factory->local_addr);
2336
info->local_addr = factory->local_addr;
2337
info->local_name = factory->addr_name;
2338
info->usage_count = 0;
2340
status = PJ_SUCCESS;
2343
pj_assert(!"Unsupported transport");
2344
status = PJ_EINVALIDOP;
2355
* Disable a transport or re-enable it.
2357
PJ_DEF(pj_status_t) pjsua_transport_set_enable( pjsua_transport_id id,
2360
/* Make sure id is in range. */
2361
PJ_ASSERT_RETURN(id>=0 && id<(int)PJ_ARRAY_SIZE(pjsua_var.tpdata),
2364
/* Make sure that transport exists */
2365
PJ_ASSERT_RETURN(pjsua_var.tpdata[id].data.ptr != NULL, PJ_EINVAL);
2369
PJ_TODO(pjsua_transport_set_enable);
2370
PJ_UNUSED_ARG(enabled);
2372
return PJ_EINVALIDOP;
2377
* Close the transport.
2379
PJ_DEF(pj_status_t) pjsua_transport_close( pjsua_transport_id id,
2384
/* Make sure id is in range. */
2385
PJ_ASSERT_RETURN(id>=0 && id<(int)PJ_ARRAY_SIZE(pjsua_var.tpdata),
2388
/* Make sure that transport exists */
2389
PJ_ASSERT_RETURN(pjsua_var.tpdata[id].data.ptr != NULL, PJ_EINVAL);
2391
/* Note: destroy() may not work if there are objects still referencing
2395
switch (pjsua_var.tpdata[id].type) {
2396
case PJSIP_TRANSPORT_UDP:
2397
status = pjsip_transport_shutdown(pjsua_var.tpdata[id].data.tp);
2398
if (status != PJ_SUCCESS)
2400
status = pjsip_transport_destroy(pjsua_var.tpdata[id].data.tp);
2401
if (status != PJ_SUCCESS)
2405
case PJSIP_TRANSPORT_TLS:
2406
case PJSIP_TRANSPORT_TCP:
2407
/* This will close the TCP listener, but existing TCP/TLS
2408
* connections (if any) will still linger
2410
status = (*pjsua_var.tpdata[id].data.factory->destroy)
2411
(pjsua_var.tpdata[id].data.factory);
2412
if (status != PJ_SUCCESS)
2422
/* If force is not specified, transports will be closed at their
2423
* convenient time. However this will leak PJSUA-API transport
2424
* descriptors as PJSUA-API wouldn't know when exactly the
2425
* transport is closed thus it can't cleanup PJSUA transport
2428
switch (pjsua_var.tpdata[id].type) {
2429
case PJSIP_TRANSPORT_UDP:
2430
return pjsip_transport_shutdown(pjsua_var.tpdata[id].data.tp);
2431
case PJSIP_TRANSPORT_TLS:
2432
case PJSIP_TRANSPORT_TCP:
2433
return (*pjsua_var.tpdata[id].data.factory->destroy)
2434
(pjsua_var.tpdata[id].data.factory);
2440
/* Cleanup pjsua data when force is applied */
2442
pjsua_var.tpdata[id].type = PJSIP_TRANSPORT_UNSPECIFIED;
2443
pjsua_var.tpdata[id].data.ptr = NULL;
2451
* Add additional headers etc in msg_data specified by application
2452
* when sending requests.
2454
void pjsua_process_msg_data(pjsip_tx_data *tdata,
2455
const pjsua_msg_data *msg_data)
2457
pj_bool_t allow_body;
2458
const pjsip_hdr *hdr;
2460
/* Always add User-Agent */
2461
if (pjsua_var.ua_cfg.user_agent.slen &&
2462
tdata->msg->type == PJSIP_REQUEST_MSG)
2464
const pj_str_t STR_USER_AGENT = { "User-Agent", 10 };
2466
h = (pjsip_hdr*)pjsip_generic_string_hdr_create(tdata->pool,
2468
&pjsua_var.ua_cfg.user_agent);
2469
pjsip_msg_add_hdr(tdata->msg, h);
2475
hdr = msg_data->hdr_list.next;
2476
while (hdr && hdr != &msg_data->hdr_list) {
2479
new_hdr = (pjsip_hdr*) pjsip_hdr_clone(tdata->pool, hdr);
2480
pjsip_msg_add_hdr(tdata->msg, new_hdr);
2485
allow_body = (tdata->msg->body == NULL);
2487
if (allow_body && msg_data->content_type.slen && msg_data->msg_body.slen) {
2488
pjsip_media_type ctype;
2489
pjsip_msg_body *body;
2491
pjsua_parse_media_type(tdata->pool, &msg_data->content_type, &ctype);
2492
body = pjsip_msg_body_create(tdata->pool, &ctype.type, &ctype.subtype,
2493
&msg_data->msg_body);
2494
tdata->msg->body = body;
2498
if (!pj_list_empty(&msg_data->multipart_parts) &&
2499
msg_data->multipart_ctype.type.slen)
2501
pjsip_msg_body *bodies;
2502
pjsip_multipart_part *part;
2503
pj_str_t *boundary = NULL;
2505
bodies = pjsip_multipart_create(tdata->pool,
2506
&msg_data->multipart_ctype,
2508
part = msg_data->multipart_parts.next;
2509
while (part != &msg_data->multipart_parts) {
2510
pjsip_multipart_part *part_copy;
2512
part_copy = pjsip_multipart_clone_part(tdata->pool, part);
2513
pjsip_multipart_add_part(tdata->pool, bodies, part_copy);
2517
if (tdata->msg->body) {
2518
part = pjsip_multipart_create_part(tdata->pool);
2519
part->body = tdata->msg->body;
2520
pjsip_multipart_add_part(tdata->pool, bodies, part);
2522
tdata->msg->body = NULL;
2525
tdata->msg->body = bodies;
2531
* Add route_set to outgoing requests
2533
void pjsua_set_msg_route_set( pjsip_tx_data *tdata,
2534
const pjsip_route_hdr *route_set )
2536
const pjsip_route_hdr *r;
2538
r = route_set->next;
2539
while (r != route_set) {
2540
pjsip_route_hdr *new_r;
2542
new_r = (pjsip_route_hdr*) pjsip_hdr_clone(tdata->pool, r);
2543
pjsip_msg_add_hdr(tdata->msg, (pjsip_hdr*)new_r);
2551
* Simple version of MIME type parsing (it doesn't support parameters)
2553
void pjsua_parse_media_type( pj_pool_t *pool,
2554
const pj_str_t *mime,
2555
pjsip_media_type *media_type)
2560
pj_bzero(media_type, sizeof(*media_type));
2562
pj_strdup_with_null(pool, &tmp, mime);
2564
pos = pj_strchr(&tmp, '/');
2566
media_type->type.ptr = tmp.ptr;
2567
media_type->type.slen = (pos-tmp.ptr);
2568
media_type->subtype.ptr = pos+1;
2569
media_type->subtype.slen = tmp.ptr+tmp.slen-pos-1;
2571
media_type->type = tmp;
2577
* Internal function to init transport selector from transport id.
2579
void pjsua_init_tpselector(pjsua_transport_id tp_id,
2580
pjsip_tpselector *sel)
2582
pjsua_transport_data *tpdata;
2585
pj_bzero(sel, sizeof(*sel));
2586
if (tp_id == PJSUA_INVALID_ID)
2589
pj_assert(tp_id >= 0 && tp_id < (int)PJ_ARRAY_SIZE(pjsua_var.tpdata));
2590
tpdata = &pjsua_var.tpdata[tp_id];
2592
flag = pjsip_transport_get_flag_from_type(tpdata->type);
2594
if (flag & PJSIP_TRANSPORT_DATAGRAM) {
2595
sel->type = PJSIP_TPSELECTOR_TRANSPORT;
2596
sel->u.transport = tpdata->data.tp;
2598
sel->type = PJSIP_TPSELECTOR_LISTENER;
2599
sel->u.listener = tpdata->data.factory;
2604
/* Callback upon NAT detection completion */
2605
static void nat_detect_cb(void *user_data,
2606
const pj_stun_nat_detect_result *res)
2608
PJ_UNUSED_ARG(user_data);
2610
pjsua_var.nat_in_progress = PJ_FALSE;
2611
pjsua_var.nat_status = res->status;
2612
pjsua_var.nat_type = res->nat_type;
2614
if (pjsua_var.ua_cfg.cb.on_nat_detect) {
2615
(*pjsua_var.ua_cfg.cb.on_nat_detect)(res);
2623
PJ_DEF(pj_status_t) pjsua_detect_nat_type()
2627
if (pjsua_var.nat_in_progress)
2630
/* Make sure STUN server resolution has completed */
2631
status = resolve_stun_server(PJ_TRUE);
2632
if (status != PJ_SUCCESS) {
2633
pjsua_var.nat_status = status;
2634
pjsua_var.nat_type = PJ_STUN_NAT_TYPE_ERR_UNKNOWN;
2638
/* Make sure we have STUN */
2639
if (pjsua_var.stun_srv.ipv4.sin_family == 0) {
2640
pjsua_var.nat_status = PJNATH_ESTUNINSERVER;
2641
return PJNATH_ESTUNINSERVER;
2644
status = pj_stun_detect_nat_type(&pjsua_var.stun_srv.ipv4,
2645
&pjsua_var.stun_cfg,
2646
NULL, &nat_detect_cb);
2648
if (status != PJ_SUCCESS) {
2649
pjsua_var.nat_status = status;
2650
pjsua_var.nat_type = PJ_STUN_NAT_TYPE_ERR_UNKNOWN;
2654
pjsua_var.nat_in_progress = PJ_TRUE;
2663
PJ_DEF(pj_status_t) pjsua_get_nat_type(pj_stun_nat_type *type)
2665
*type = pjsua_var.nat_type;
2666
return pjsua_var.nat_status;
2670
* Verify that valid url is given.
2672
PJ_DEF(pj_status_t) pjsua_verify_url(const char *c_url)
2677
int len = (c_url ? pj_ansi_strlen(c_url) : 0);
2679
if (!len) return PJSIP_EINVALIDURI;
2681
pool = pj_pool_create(&pjsua_var.cp.factory, "check%p", 1024, 0, NULL);
2682
if (!pool) return PJ_ENOMEM;
2684
url = (char*) pj_pool_alloc(pool, len+1);
2685
pj_ansi_strcpy(url, c_url);
2687
p = pjsip_parse_uri(pool, url, len, 0);
2689
pj_pool_release(pool);
2690
return p ? 0 : PJSIP_EINVALIDURI;
2694
* Verify that valid SIP url is given.
2696
PJ_DEF(pj_status_t) pjsua_verify_sip_url(const char *c_url)
2701
int len = (c_url ? pj_ansi_strlen(c_url) : 0);
2703
if (!len) return PJSIP_EINVALIDURI;
2705
pool = pj_pool_create(&pjsua_var.cp.factory, "check%p", 1024, 0, NULL);
2706
if (!pool) return PJ_ENOMEM;
2708
url = (char*) pj_pool_alloc(pool, len+1);
2709
pj_ansi_strcpy(url, c_url);
2711
p = pjsip_parse_uri(pool, url, len, 0);
2712
if (!p || (pj_stricmp2(pjsip_uri_get_scheme(p), "sip") != 0 &&
2713
pj_stricmp2(pjsip_uri_get_scheme(p), "sips") != 0))
2718
pj_pool_release(pool);
2719
return p ? 0 : PJSIP_EINVALIDURI;
2723
* Schedule a timer entry.
2726
PJ_DEF(pj_status_t) pjsua_schedule_timer_dbg( pj_timer_entry *entry,
2727
const pj_time_val *delay,
2728
const char *src_file,
2731
return pjsip_endpt_schedule_timer_dbg(pjsua_var.endpt, entry, delay,
2732
src_file, src_line);
2735
PJ_DEF(pj_status_t) pjsua_schedule_timer( pj_timer_entry *entry,
2736
const pj_time_val *delay)
2738
return pjsip_endpt_schedule_timer(pjsua_var.endpt, entry, delay);
2742
/* Timer callback */
2743
static void timer_cb( pj_timer_heap_t *th,
2744
pj_timer_entry *entry)
2746
pjsua_timer_list *tmr = (pjsua_timer_list *)entry->user_data;
2747
void (*cb)(void *user_data) = tmr->cb;
2748
void *user_data = tmr->user_data;
2752
pj_mutex_lock(pjsua_var.timer_mutex);
2753
pj_list_push_back(&pjsua_var.timer_list, tmr);
2754
pj_mutex_unlock(pjsua_var.timer_mutex);
2761
* Schedule a timer callback.
2764
PJ_DEF(pj_status_t) pjsua_schedule_timer2_dbg( void (*cb)(void *user_data),
2766
unsigned msec_delay,
2767
const char *src_file,
2770
PJ_DEF(pj_status_t) pjsua_schedule_timer2( void (*cb)(void *user_data),
2772
unsigned msec_delay)
2775
pjsua_timer_list *tmr = NULL;
2779
pj_mutex_lock(pjsua_var.timer_mutex);
2781
if (pj_list_empty(&pjsua_var.timer_list)) {
2782
tmr = PJ_POOL_ALLOC_T(pjsua_var.pool, pjsua_timer_list);
2784
tmr = pjsua_var.timer_list.next;
2787
pj_timer_entry_init(&tmr->entry, 0, tmr, timer_cb);
2789
tmr->user_data = user_data;
2791
delay.msec = msec_delay;
2794
status = pjsip_endpt_schedule_timer_dbg(pjsua_var.endpt, &tmr->entry,
2795
&delay, src_file, src_line);
2797
status = pjsip_endpt_schedule_timer(pjsua_var.endpt, &tmr->entry, &delay);
2799
if (status != PJ_SUCCESS) {
2800
pj_list_push_back(&pjsua_var.timer_list, tmr);
2803
pj_mutex_unlock(pjsua_var.timer_mutex);
2809
* Cancel the previously scheduled timer.
2812
PJ_DEF(void) pjsua_cancel_timer(pj_timer_entry *entry)
2814
pjsip_endpt_cancel_timer(pjsua_var.endpt, entry);
2818
* Normalize route URI (check for ";lr" and append one if it doesn't
2819
* exist and pjsua_config.force_lr is set.
2821
pj_status_t normalize_route_uri(pj_pool_t *pool, pj_str_t *uri)
2824
pj_pool_t *tmp_pool;
2826
pjsip_sip_uri *sip_uri;
2828
tmp_pool = pjsua_pool_create("tmplr%p", 512, 512);
2832
pj_strdup_with_null(tmp_pool, &tmp_uri, uri);
2834
uri_obj = pjsip_parse_uri(tmp_pool, tmp_uri.ptr, tmp_uri.slen, 0);
2836
PJ_LOG(1,(THIS_FILE, "Invalid route URI: %.*s",
2837
(int)uri->slen, uri->ptr));
2838
pj_pool_release(tmp_pool);
2839
return PJSIP_EINVALIDURI;
2842
if (!PJSIP_URI_SCHEME_IS_SIP(uri_obj) &&
2843
!PJSIP_URI_SCHEME_IS_SIPS(uri_obj))
2845
PJ_LOG(1,(THIS_FILE, "Route URI must be SIP URI: %.*s",
2846
(int)uri->slen, uri->ptr));
2847
pj_pool_release(tmp_pool);
2848
return PJSIP_EINVALIDSCHEME;
2851
sip_uri = (pjsip_sip_uri*) pjsip_uri_get_uri(uri_obj);
2853
/* Done if force_lr is disabled or if lr parameter is present */
2854
if (!pjsua_var.ua_cfg.force_lr || sip_uri->lr_param) {
2855
pj_pool_release(tmp_pool);
2860
sip_uri->lr_param = 1;
2863
tmp_uri.ptr = (char*) pj_pool_alloc(tmp_pool, PJSIP_MAX_URL_SIZE);
2864
tmp_uri.slen = pjsip_uri_print(PJSIP_URI_IN_ROUTING_HDR, uri_obj,
2865
tmp_uri.ptr, PJSIP_MAX_URL_SIZE);
2866
if (tmp_uri.slen < 1) {
2867
PJ_LOG(1,(THIS_FILE, "Route URI is too long: %.*s",
2868
(int)uri->slen, uri->ptr));
2869
pj_pool_release(tmp_pool);
2870
return PJSIP_EURITOOLONG;
2874
pj_strdup_with_null(pool, uri, &tmp_uri);
2876
pj_pool_release(tmp_pool);
2881
* This is a utility function to dump the stack states to log, using
2882
* verbosity level 3.
2884
PJ_DEF(void) pjsua_dump(pj_bool_t detail)
2889
PJ_LOG(3,(THIS_FILE, "Start dumping application states:"));
2891
old_decor = pj_log_get_decor();
2892
pj_log_set_decor(old_decor & (PJ_LOG_HAS_NEWLINE | PJ_LOG_HAS_CR));
2897
pjsip_endpt_dump(pjsua_get_pjsip_endpt(), detail);
2899
pjmedia_endpt_dump(pjsua_get_pjmedia_endpt());
2901
PJ_LOG(3,(THIS_FILE, "Dumping media transports:"));
2902
for (i=0; i<pjsua_var.ua_cfg.max_calls; ++i) {
2903
pjsua_call *call = &pjsua_var.calls[i];
2904
pjsua_acc_config *acc_cfg;
2905
pjmedia_transport *tp[PJSUA_MAX_CALL_MEDIA*2];
2906
unsigned tp_cnt = 0;
2909
/* Collect media transports in this call */
2910
for (j = 0; j < call->med_cnt; ++j) {
2911
if (call->media[j].tp != NULL)
2912
tp[tp_cnt++] = call->media[j].tp;
2914
for (j = 0; j < call->med_prov_cnt; ++j) {
2915
pjmedia_transport *med_tp = call->media_prov[j].tp;
2918
pj_bool_t used = PJ_FALSE;
2919
for (k = 0; k < tp_cnt; ++k) {
2920
if (med_tp == tp[k]) {
2926
tp[tp_cnt++] = med_tp;
2930
acc_cfg = &pjsua_var.acc[call->acc_id].cfg;
2932
/* Dump the media transports in this call */
2933
for (j = 0; j < tp_cnt; ++j) {
2934
pjmedia_transport_info tpinfo;
2937
pjmedia_transport_info_init(&tpinfo);
2938
pjmedia_transport_get_info(tp[j], &tpinfo);
2939
PJ_LOG(3,(THIS_FILE, " %s: %s",
2940
(acc_cfg->ice_cfg.enable_ice ? "ICE" : "UDP"),
2941
pj_sockaddr_print(&tpinfo.sock_info.rtp_addr_name,
2943
sizeof(addr_buf), 3)));
2947
pjsip_tsx_layer_dump(detail);
2948
pjsip_ua_dump(detail);
2950
// Dumping complete call states may require a 'large' buffer
2951
// (about 3KB per call session, including RTCP XR).
2953
/* Dump all invite sessions: */
2954
PJ_LOG(3,(THIS_FILE, "Dumping invite sessions:"));
2956
if (pjsua_call_get_count() == 0) {
2958
PJ_LOG(3,(THIS_FILE, " - no sessions -"));
2963
for (i=0; i<pjsua_var.ua_cfg.max_calls; ++i) {
2964
if (pjsua_call_is_active(i)) {
2965
/* Tricky logging, since call states log string tends to be
2966
* longer than PJ_LOG_MAX_SIZE.
2969
unsigned call_dump_len;
2974
pjsua_call_dump(i, detail, buf, sizeof(buf), " ");
2975
call_dump_len = strlen(buf);
2977
log_decor = pj_log_get_decor();
2978
pj_log_set_decor(log_decor & ~(PJ_LOG_HAS_NEWLINE |
2980
PJ_LOG(3,(THIS_FILE, "\n"));
2981
pj_log_set_decor(0);
2984
part_len = PJ_LOG_MAX_SIZE-80;
2985
while (part_idx < call_dump_len) {
2989
if (part_idx + part_len > call_dump_len)
2990
part_len = call_dump_len - part_idx;
2991
p_orig = p[part_len];
2993
PJ_LOG(3,(THIS_FILE, "%s", p));
2994
p[part_len] = p_orig;
2995
part_idx += part_len;
2997
pj_log_set_decor(log_decor);
3003
/* Dump presence status */
3004
pjsua_pres_dump(detail);
3006
pj_log_set_decor(old_decor);
3007
PJ_LOG(3,(THIS_FILE, "Dump complete"));