[asterisk-commits] tilghman: branch 1.6.1 r170637 - in /branches/1.6.1: ./ channels/chan_iax2.c
SVN commits to the Asterisk project
asterisk-commits at lists.digium.com
Fri Jan 23 13:37:17 CST 2009
Author: tilghman
Date: Fri Jan 23 13:37:17 2009
New Revision: 170637
URL: http://svn.digium.com/svn-view/asterisk?view=rev&rev=170637
Log:
Merged revisions 170608 via svnmerge from
https://origsvn.digium.com/svn/asterisk/trunk
................
r170608 | tilghman | 2009-01-23 13:25:10 -0600 (Fri, 23 Jan 2009) | 9 lines
Merged revisions 170588 via svnmerge from
https://origsvn.digium.com/svn/asterisk/branches/1.4
........
r170588 | tilghman | 2009-01-23 13:20:44 -0600 (Fri, 23 Jan 2009) | 2 lines
Additions to AST-2009-001
........
................
Modified:
branches/1.6.1/ (props changed)
branches/1.6.1/channels/chan_iax2.c
Propchange: branches/1.6.1/
------------------------------------------------------------------------------
Binary property 'trunk-merged' - no diff available.
Modified: branches/1.6.1/channels/chan_iax2.c
URL: http://svn.digium.com/svn-view/asterisk/branches/1.6.1/channels/chan_iax2.c?view=diff&rev=170637&r1=170636&r2=170637
==============================================================================
--- branches/1.6.1/channels/chan_iax2.c (original)
+++ branches/1.6.1/channels/chan_iax2.c Fri Jan 23 13:37:17 2009
@@ -6364,6 +6364,10 @@
p = find_peer(peer, 1);
ast_mutex_lock(&iaxsl[callno]);
if (!p || !iaxs[callno]) {
+ if (iaxs[callno]) {
+ /* Anything, as long as it's non-blank */
+ ast_string_field_set(iaxs[callno], secret, "badsecret");
+ }
if (authdebug && !p)
ast_log(LOG_NOTICE, "No registration for peer '%s' (from %s)\n", peer, ast_inet_ntoa(sin->sin_addr));
goto return_unref;
@@ -6443,21 +6447,24 @@
goto return_unref;
} else
ast_set_flag(&iaxs[callno]->state, IAX_STATE_AUTHENTICATED);
- } else if (!ast_strlen_zero(md5secret) || !ast_strlen_zero(secret)) {
- if (authdebug)
- ast_log(LOG_NOTICE, "Inappropriate authentication received\n");
+ } else if (!ast_strlen_zero(p->secret) || !ast_strlen_zero(p->inkeys)) {
+ if (authdebug &&
+ ((!ast_strlen_zero(p->secret) && (p->authmethods & IAX_AUTH_MD5) && !ast_strlen_zero(iaxs[callno]->challenge)) ||
+ (!ast_strlen_zero(p->inkeys) && (p->authmethods & IAX_AUTH_RSA) && !ast_strlen_zero(iaxs[callno]->challenge)))) {
+ ast_log(LOG_NOTICE, "Inappropriate authentication received for '%s'\n", p->name);
+ }
goto return_unref;
}
+ ast_devstate_changed(AST_DEVICE_UNKNOWN, "IAX2/%s", p->name); /* Activate notification */
+
+return_unref:
ast_string_field_set(iaxs[callno], peer, peer);
/* Choose lowest expiry number */
if (expire && (expire < iaxs[callno]->expiry))
iaxs[callno]->expiry = expire;
- ast_devstate_changed(AST_DEVICE_UNKNOWN, "IAX2/%s", p->name); /* Activate notification */
-
res = 0;
-return_unref:
if (p)
peer_unref(p);
@@ -7193,7 +7200,6 @@
struct iax2_peer *p;
char challenge[10];
const char *peer_name;
- int res = -1;
int sentauthmethod;
peer_name = ast_strdupa(iaxs[callno]->peer);
@@ -7207,11 +7213,7 @@
ast_mutex_lock(&iaxsl[callno]);
if (!iaxs[callno])
goto return_unref;
- if (!p && !delayreject) {
- ast_log(LOG_WARNING, "No such peer '%s'\n", peer_name);
- goto return_unref;
- }
-
+
memset(&ied, 0, sizeof(ied));
/* The selection of which delayed reject is sent may leak information,
* if it sets a static response. For example, if a host is known to only
@@ -7229,12 +7231,12 @@
}
iax_ie_append_str(&ied, IAX_IE_USERNAME, peer_name);
- res = 0;
-
return_unref:
- peer_unref(p);
-
- return res ? res : send_command(iaxs[callno], AST_FRAME_IAX, IAX_COMMAND_REGAUTH, 0, ied.buf, ied.pos, -1);;
+ if (p) {
+ peer_unref(p);
+ }
+
+ return iaxs[callno] ? send_command(iaxs[callno], AST_FRAME_IAX, IAX_COMMAND_REGAUTH, 0, ied.buf, ied.pos, -1) : -1;
}
static int registry_rerequest(struct iax_ies *ies, int callno, struct sockaddr_in *sin)
More information about the asterisk-commits
mailing list