sipheader.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627
  1. /*
  2. * Kamailio osp module.
  3. *
  4. * This module enables Kamailio to communicate with an Open Settlement
  5. * Protocol (OSP) server. The Open Settlement Protocol is an ETSI
  6. * defined standard for Inter-Domain VoIP pricing, authorization
  7. * and usage exchange. The technical specifications for OSP
  8. * (ETSI TS 101 321 V4.1.1) are available at www.etsi.org.
  9. *
  10. * Uli Abend was the original contributor to this module.
  11. *
  12. * Copyright (C) 2001-2005 Fhg Fokus
  13. *
  14. * This file is part of Kamailio, a free SIP server.
  15. *
  16. * Kamailio is free software; you can redistribute it and/or modify
  17. * it under the terms of the GNU General Public License as published by
  18. * the Free Software Foundation; either version 2 of the License, or
  19. * (at your option) any later version
  20. *
  21. * Kamailio is distributed in the hope that it will be useful,
  22. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  23. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  24. * GNU General Public License for more details.
  25. *
  26. * You should have received a copy of the GNU General Public License
  27. * along with this program; if not, write to the Free Software
  28. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  29. */
  30. #include <osp/osp.h>
  31. #include <osp/ospb64.h>
  32. #include "../../forward.h"
  33. #include "../../parser/parse_from.h"
  34. #include "../../parser/parse_rpid.h"
  35. #include "../../parser/parse_rr.h"
  36. #include "../../parser/parse_uri.h"
  37. #include "../../data_lump.h"
  38. #include "../../mem/mem.h"
  39. #include "osp_mod.h"
  40. #include "sipheader.h"
  41. extern int _osp_use_rpid;
  42. static void ospSkipPlus(char* e164);
  43. static int ospAppendHeader(struct sip_msg* msg, str* header);
  44. /*
  45. * Copy str to buffer and check overflow
  46. * param source Str
  47. * param buffer Buffer
  48. * param buffersize Size of buffer
  49. */
  50. void ospCopyStrToBuffer(
  51. str* source,
  52. char* buffer,
  53. int buffersize)
  54. {
  55. int copybytes;
  56. if (source->len > buffersize - 1) {
  57. LM_ERR("buffer for copying '%.*s' is too small, will copy the first '%d' bytes\n",
  58. source->len,
  59. source->s,
  60. buffersize);
  61. copybytes = buffersize - 1;
  62. } else {
  63. copybytes = source->len;
  64. }
  65. strncpy(buffer, source->s, copybytes);
  66. buffer[copybytes] = '\0';
  67. }
  68. /*
  69. * Remove '+' in E164 string
  70. * param e164 E164 string
  71. */
  72. static void ospSkipPlus(
  73. char* e164)
  74. {
  75. if (*e164 == '+') {
  76. strncpy(e164, e164 + 1, strlen(e164) - 1);
  77. e164[strlen(e164) - 1] = '\0';
  78. }
  79. }
  80. /*
  81. * Get calling number from From header
  82. * param msg SIP message
  83. * param fromuser User part of From header
  84. * param buffersize Size of fromuser buffer
  85. * return 0 success, -1 failure
  86. */
  87. int ospGetFromUserpart(
  88. struct sip_msg* msg,
  89. char* fromuser,
  90. int buffersize)
  91. {
  92. struct to_body* from;
  93. struct sip_uri uri;
  94. int result = -1;
  95. fromuser[0] = '\0';
  96. if (msg->from != NULL) {
  97. if (parse_from_header(msg) == 0) {
  98. from = get_from(msg);
  99. if (parse_uri(from->uri.s, from->uri.len, &uri) == 0) {
  100. ospCopyStrToBuffer(&uri.user, fromuser, buffersize);
  101. ospSkipPlus(fromuser);
  102. result = 0;
  103. } else {
  104. LM_ERR("failed to parse From uri\n");
  105. }
  106. } else {
  107. LM_ERR("failed to parse From header\n");
  108. }
  109. } else {
  110. LM_ERR("failed to find From header\n");
  111. }
  112. return result;
  113. }
  114. /*
  115. * Get calling number from Remote-Party-ID header
  116. * param msg SIP message
  117. * param rpiduser User part of Remote-Party-ID header
  118. * param buffersize Size of fromuser buffer
  119. * return 0 success, -1 failure
  120. */
  121. int ospGetRpidUserpart(
  122. struct sip_msg* msg,
  123. char* rpiduser,
  124. int buffersize)
  125. {
  126. struct to_body* rpid;
  127. struct sip_uri uri;
  128. int result = -1;
  129. rpiduser[0] = '\0';
  130. if (_osp_use_rpid != 0) {
  131. if (msg->rpid != NULL) {
  132. if (parse_rpid_header(msg) == 0) {
  133. rpid = get_rpid(msg);
  134. if (parse_uri(rpid->uri.s, rpid->uri.len, &uri) == 0) {
  135. ospCopyStrToBuffer(&uri.user, rpiduser, buffersize);
  136. ospSkipPlus(rpiduser);
  137. result = 0;
  138. } else {
  139. LM_ERR("failed to parse RPID uri\n");
  140. }
  141. } else {
  142. LM_ERR("failed to parse RPID header\n");
  143. }
  144. } else {
  145. LM_DBG("without RPID header\n");
  146. }
  147. } else {
  148. LM_DBG("do not use RPID header\n");
  149. }
  150. return result;
  151. }
  152. /*
  153. * Get called number from To header
  154. * param msg SIP message
  155. * param touser User part of To header
  156. * param buffersize Size of touser buffer
  157. * return 0 success, -1 failure
  158. */
  159. int ospGetToUserpart(
  160. struct sip_msg* msg,
  161. char* touser,
  162. int buffersize)
  163. {
  164. struct to_body* to;
  165. struct sip_uri uri;
  166. int result = -1;
  167. touser[0] = '\0';
  168. if (msg->to != NULL) {
  169. if (parse_headers(msg, HDR_TO_F, 0) == 0) {
  170. to = get_to(msg);
  171. if (parse_uri(to->uri.s, to->uri.len, &uri) == 0) {
  172. ospCopyStrToBuffer(&uri.user, touser, buffersize);
  173. ospSkipPlus(touser);
  174. result = 0;
  175. } else {
  176. LM_ERR("failed to parse To uri\n");
  177. }
  178. } else {
  179. LM_ERR("failed to parse To header\n");
  180. }
  181. } else {
  182. LM_ERR("failed to find To header\n");
  183. }
  184. return result;
  185. }
  186. /*
  187. * Get called number from Request-Line header
  188. * param msg SIP message
  189. * param touser User part of To header
  190. * param buffersize Size of touser buffer
  191. * return 0 success, -1 failure
  192. */
  193. int ospGetUriUserpart(
  194. struct sip_msg* msg,
  195. char* uriuser,
  196. int buffersize)
  197. {
  198. int result = -1;
  199. uriuser[0] = '\0';
  200. if (parse_sip_msg_uri(msg) >= 0) {
  201. ospCopyStrToBuffer(&msg->parsed_uri.user, uriuser, buffersize);
  202. ospSkipPlus(uriuser);
  203. result = 0;
  204. } else {
  205. LM_ERR("failed to parse Request-Line URI\n");
  206. }
  207. return result;
  208. }
  209. /*
  210. * Append header to SIP message
  211. * param msg SIP message
  212. * param header Header to be appended
  213. * return 0 success, -1 failure
  214. */
  215. static int ospAppendHeader(
  216. struct sip_msg* msg,
  217. str* header)
  218. {
  219. char* s;
  220. struct lump* anchor;
  221. if((msg == 0) || (header == 0) || (header->s == 0) || (header->len <= 0)) {
  222. LM_ERR("bad parameters for appending header\n");
  223. return -1;
  224. }
  225. if (parse_headers(msg, HDR_EOH_F, 0) == -1) {
  226. LM_ERR("failed to parse message\n");
  227. return -1;
  228. }
  229. anchor = anchor_lump(msg, msg->unparsed - msg->buf, 0, 0);
  230. if (anchor == 0) {
  231. LM_ERR("failed to get anchor\n");
  232. return -1;
  233. }
  234. s = (char*)pkg_malloc(header->len);
  235. if (s == 0) {
  236. LM_ERR("no pkg memory\n");
  237. return -1;
  238. }
  239. memcpy(s, header->s, header->len);
  240. if (insert_new_lump_before(anchor, s, header->len, 0) == 0) {
  241. LM_ERR("failed to insert lump\n");
  242. pkg_free(s);
  243. return -1;
  244. }
  245. return 0;
  246. }
  247. /*
  248. * Add OSP token header to SIP message
  249. * param msg SIP message
  250. * param token OSP authorization token
  251. * param tokensize Size of OSP authorization token
  252. * return 0 success, -1 failure
  253. */
  254. int ospAddOspHeader(
  255. struct sip_msg* msg,
  256. unsigned char* token,
  257. unsigned int tokensize)
  258. {
  259. str headerval;
  260. char buffer[OSP_HEADERBUF_SIZE];
  261. unsigned char encodedtoken[OSP_TOKENBUF_SIZE];
  262. unsigned int encodedtokensize = sizeof(encodedtoken);
  263. int result = -1;
  264. if (tokensize == 0) {
  265. LM_DBG("destination is not OSP device\n");
  266. result = 0;
  267. } else {
  268. if (OSPPBase64Encode(token, tokensize, encodedtoken, &encodedtokensize) == 0) {
  269. snprintf(buffer,
  270. sizeof(buffer),
  271. "%s%.*s\r\n",
  272. OSP_TOKEN_HEADER,
  273. encodedtokensize,
  274. encodedtoken);
  275. headerval.s = buffer;
  276. headerval.len = strlen(buffer);
  277. LM_DBG("setting osp token header field '%s'\n", buffer);
  278. if (ospAppendHeader(msg, &headerval) == 0) {
  279. result = 0;
  280. } else {
  281. LM_ERR("failed to append osp header\n");
  282. }
  283. } else {
  284. LM_ERR("failed to base64 encode token\n");
  285. }
  286. }
  287. return result;
  288. }
  289. /*
  290. * Get OSP token from SIP message
  291. * param msg SIP message
  292. * param token OSP authorization token
  293. * param tokensize Size of OSP authorization token
  294. * return 0 success, -1 failure
  295. */
  296. int ospGetOspHeader(
  297. struct sip_msg* msg,
  298. unsigned char* token,
  299. unsigned int* tokensize)
  300. {
  301. struct hdr_field* hf;
  302. int errorcode;
  303. int result = -1;
  304. parse_headers(msg, HDR_EOH_F, 0);
  305. for (hf = msg->headers; hf; hf = hf->next) {
  306. if ((hf->type == HDR_OTHER_T) && (hf->name.len == OSP_HEADER_SIZE - 2)) {
  307. // possible hit
  308. if (strncasecmp(hf->name.s, OSP_TOKEN_HEADER, OSP_HEADER_SIZE) == 0) {
  309. if ((errorcode = OSPPBase64Decode(hf->body.s, hf->body.len, token, tokensize)) == OSPC_ERR_NO_ERROR) {
  310. result = 0;
  311. } else {
  312. LM_ERR("failed to base64 decode token (%d)\n", errorcode);
  313. LM_ERR("header '%.*s' length %d\n", hf->body.len, hf->body.s, hf->body.len);
  314. }
  315. break;
  316. }
  317. }
  318. }
  319. return result;
  320. }
  321. /*
  322. * Get first VIA header and use the IP or host name
  323. * param msg SIP message
  324. * param sourceaddress Source address
  325. * param buffersize Size of sourceaddress
  326. * return 0 success, -1 failure
  327. */
  328. int ospGetSourceAddress(
  329. struct sip_msg* msg,
  330. char* sourceaddress,
  331. int buffersize)
  332. {
  333. struct hdr_field* hf;
  334. struct via_body* via;
  335. int result = -1;
  336. /*
  337. * No need to call parse_headers, called already and VIA is parsed
  338. * anyway by default
  339. */
  340. for (hf = msg->headers; hf; hf = hf->next) {
  341. if (hf->type == HDR_VIA_T) {
  342. // found first VIA
  343. via = (struct via_body*)hf->parsed;
  344. ospCopyStrToBuffer(&via->host, sourceaddress, buffersize);
  345. LM_DBG("source address '%s'\n", sourceaddress);
  346. result = 0;
  347. break;
  348. }
  349. }
  350. return result;
  351. }
  352. /*
  353. * Get Call-ID header from SIP message
  354. * param msg SIP message
  355. * param callid Call ID
  356. * return 0 success, -1 failure
  357. */
  358. int ospGetCallId(
  359. struct sip_msg* msg,
  360. OSPTCALLID** callid)
  361. {
  362. struct hdr_field* hf;
  363. int result = -1;
  364. hf = (struct hdr_field*)msg->callid;
  365. if (hf != NULL) {
  366. *callid = OSPPCallIdNew(hf->body.len, (unsigned char*)hf->body.s);
  367. if (*callid) {
  368. result = 0;
  369. } else {
  370. LM_ERR("failed to allocate OSPCALLID object for '%.*s'\n", hf->body.len, hf->body.s);
  371. }
  372. } else {
  373. LM_ERR("failed to find Call-ID header\n");
  374. }
  375. return result;
  376. }
  377. /*
  378. * Get route parameters from the 1st Route or Request-Line
  379. * param msg SIP message
  380. * param routeparameters Route parameters
  381. * param buffersize Size of routeparameters
  382. * return 0 success, -1 failure
  383. */
  384. int ospGetRouteParameters(
  385. struct sip_msg* msg,
  386. char* routeparameters,
  387. int buffersize)
  388. {
  389. struct hdr_field* hf;
  390. rr_t* rt;
  391. struct sip_uri uri;
  392. int result = -1;
  393. LM_DBG("parsed uri host '%.*s' port '%d' vars '%.*s'\n",
  394. msg->parsed_uri.host.len,
  395. msg->parsed_uri.host.s,
  396. msg->parsed_uri.port_no,
  397. msg->parsed_uri.params.len,
  398. msg->parsed_uri.params.s);
  399. if (!(hf = msg->route)) {
  400. LM_DBG("there is no Route headers\n");
  401. } else if (!(rt = (rr_t*)hf->parsed)) {
  402. LM_ERR("route headers are not parsed\n");
  403. } else if (parse_uri(rt->nameaddr.uri.s, rt->nameaddr.uri.len, &uri) != 0) {
  404. LM_ERR("failed to parse the Route uri '%.*s'\n", rt->nameaddr.uri.len, rt->nameaddr.uri.s);
  405. } else if (check_self(&uri.host, uri.port_no ? uri.port_no : SIP_PORT, PROTO_NONE) != 1) {
  406. LM_DBG("the Route uri is NOT mine\n");
  407. LM_DBG("host '%.*s' port '%d'\n", uri.host.len, uri.host.s, uri.port_no);
  408. LM_DBG("params '%.*s'\n", uri.params.len, uri.params.s);
  409. } else {
  410. LM_DBG("the Route uri IS mine - '%.*s'\n", uri.params.len, uri.params.s);
  411. LM_DBG("host '%.*s' port '%d'\n", uri.host.len, uri.host.s, uri.port_no);
  412. ospCopyStrToBuffer(&uri.params, routeparameters, buffersize);
  413. result = 0;
  414. }
  415. if ((result == -1) && (msg->parsed_uri.params.len > 0)) {
  416. LM_DBG("using route parameters from Request-Line uri\n");
  417. ospCopyStrToBuffer(&msg->parsed_uri.params, routeparameters, buffersize);
  418. routeparameters[msg->parsed_uri.params.len] = '\0';
  419. result = 0;
  420. }
  421. return result;
  422. }
  423. /*
  424. * Rebuild URI using called number, destination IP, and port
  425. * param newuri URI to be built
  426. * param called Called number
  427. * param dest Destination IP
  428. * param port Destination port
  429. * param format URI format
  430. * return 0 success, -1 failure
  431. */
  432. int ospRebuildDestionationUri(
  433. str* newuri,
  434. char* called,
  435. char* dest,
  436. char* port,
  437. int format)
  438. {
  439. static const str TRANS = {";transport=tcp", 14};
  440. char* buffer;
  441. int calledsize;
  442. int destsize;
  443. int portsize;
  444. calledsize = strlen(called);
  445. destsize = strlen(dest);
  446. portsize = strlen(port);
  447. LM_DBG("'%s'(%d) '%s'(%d) '%s'(%d) '%d'\n",
  448. called,
  449. calledsize,
  450. dest,
  451. destsize,
  452. port,
  453. portsize,
  454. format);
  455. /* "sip:" + called + "@" + dest + : + port + " SIP/2.0" for URI format 0 */
  456. /* "<sip:" + called + "@" + dest + : + port> + " SIP/2.0" for URI format 1 */
  457. newuri->s = (char*)pkg_malloc(1 + 4 + calledsize + 1 + destsize + 1 + portsize + 1 + 1 + 16 + TRANS.len);
  458. if (newuri == NULL) {
  459. LM_ERR("no pkg memory\n");
  460. return -1;
  461. }
  462. buffer = newuri->s;
  463. if (format == 1) {
  464. *buffer++ = '<';
  465. }
  466. *buffer++ = 's';
  467. *buffer++ = 'i';
  468. *buffer++ = 'p';
  469. *buffer++ = ':';
  470. memcpy(buffer, called, calledsize);
  471. buffer += calledsize;
  472. *buffer++ = '@';
  473. if (*dest == '[') {
  474. /* leave out annoying [] */
  475. memcpy(buffer, dest + 1, destsize - 2);
  476. buffer += destsize - 2;
  477. } else {
  478. memcpy(buffer, dest, destsize);
  479. buffer += destsize;
  480. }
  481. if (portsize > 0) {
  482. *buffer++ = ':';
  483. memcpy(buffer, port, portsize);
  484. buffer += portsize;
  485. }
  486. if (format == 1) {
  487. *buffer++ = '>';
  488. }
  489. /*
  490. *buffer++ = ' ';
  491. *buffer++ = 'S';
  492. *buffer++ = 'I';
  493. *buffer++ = 'P';
  494. *buffer++ = '/';
  495. *buffer++ = '2';
  496. *buffer++ = '.';
  497. *buffer++ = '0';
  498. memcpy(buffer, TRANS.s, TRANS.len);
  499. buffer += TRANS.len;
  500. *buffer = '\0';
  501. */
  502. newuri->len = buffer - newuri->s;
  503. LM_DBG("new uri '%.*s'\n", newuri->len, newuri->s);
  504. return 0;
  505. }
  506. /*
  507. * Get next hop using the first Route not generated by this proxy or URI from the Request-Line
  508. * param msg SIP message
  509. * param nexthop Next hop IP
  510. * param buffersize Size of nexthop
  511. */
  512. void ospGetNextHop(
  513. struct sip_msg* msg,
  514. char* nexthop,
  515. int buffersize)
  516. {
  517. struct hdr_field* hf;
  518. struct sip_uri uri;
  519. rr_t* rt;
  520. int found = 0;
  521. for (hf = msg->headers; hf; hf = hf->next) {
  522. if (hf->type == HDR_ROUTE_T) {
  523. for (rt = (rr_t*)hf->parsed; rt; rt = rt->next) {
  524. if (parse_uri(rt->nameaddr.uri.s, rt->nameaddr.uri.len, &uri) == 0) {
  525. LM_DBG("host '%.*s' port '%d'\n", uri.host.len, uri.host.s, uri.port_no);
  526. if (check_self(&uri.host, uri.port_no ? uri.port_no : SIP_PORT, PROTO_NONE) != 1) {
  527. LM_DBG("it is NOT me, FOUND!\n");
  528. ospCopyStrToBuffer(&uri.host, nexthop, buffersize);
  529. found = 1;
  530. break;
  531. } else {
  532. LM_DBG("it IS me, keep looking\n");
  533. }
  534. } else {
  535. LM_ERR("failed to parse route uri '%.*s'\n",
  536. rt->nameaddr.uri.len,
  537. rt->nameaddr.uri.s);
  538. }
  539. }
  540. if (found == 1) {
  541. break;
  542. }
  543. }
  544. }
  545. if (!found) {
  546. LM_DBG("using the Request-Line instead host '%.*s' port '%d'\n",
  547. msg->parsed_uri.host.len,
  548. msg->parsed_uri.host.s,
  549. msg->parsed_uri.port_no);
  550. ospCopyStrToBuffer(&msg->parsed_uri.host, nexthop, buffersize);
  551. found = 1;
  552. }
  553. }