Commit Graph

1111 Commits

Author SHA1 Message Date
Michael Jerris 0ba86871b4 FS-9078: [sofia-sip] fix typo in HEP3 2016-04-27 15:34:17 -05:00
Mike Jerris 943e8ef323 FS-9099: [sofia-sip] fix windows build of websocket transport 2016-04-27 16:08:13 -04:00
Michael Jerris 3caa794f7a FS-9078: [sofia-sip] fix linux build of HEPv2/HEPv3 code 2016-04-27 16:02:00 -04:00
Michael Jerris bc74c70562 .update 2016-04-27 14:46:37 -05:00
Michael Jerris c6d0a99495 FS-9078: [sofia-sip] fix linux build of HEPv2/HEPv3 code 2016-04-27 14:45:59 -05:00
Michael Jerris 6ce69adcb3 FS-9099: remove unneeded header include 2016-04-27 14:45:09 -05:00
Mike Jerris e23bb54f9a FS-9078: [sofia-sip] fix windows build of HEPv2/HEPv3 code 2016-04-27 13:50:14 -04:00
Anthony Minessale 18db50c46a FS-9099 #resolve [Websocket raw frame read timeout is too short] 2016-04-25 17:29:50 -05:00
Alexandr Dubovikov 024af441b8 one push one pop 2016-04-19 20:22:49 +02:00
Alexandr Dubovikov d710787fa9 FS-9078 added #pragma for MSVC compiler 2016-04-18 23:10:59 +02:00
Alexandr Dubovikov 981b528c48 FS-9078 added hepv2 and hepv3 support 2016-04-18 19:28:00 +02:00
Anthony Minessale ee7a298f40 FS-8868 #resolve [recording app to respect bandwidth set in SDP] 2016-03-07 21:56:13 -06:00
Anthony Minessale ba5aa94ce8 FS-7486 #resolve update sofia 2015-09-09 12:26:03 -05:00
Anthony Minessale II c1f45cd3a8 Merge pull request #243 in FS/freeswitch from ~ARTURZ/freeswitch:FS-7486-broken-sofia-request-queue to master
* commit '074b07f5458d8584c153a5810bfa2e4011def20c':
  FS-7486: Fix handling of queued requests in Sofia-SIP
2015-09-09 12:23:20 -05:00
Michael Giagnocavo 5e456fe9a6 FS-7966. First pass at moving to Visual Studio 2015.
The new C compiler breaks a lot of things. snprintf and timespec now exist, and redefining causes an error.
Many more things are warnings, so warnings-as-errors will fail - remove it from some projects for now.
V8: don't pass VS version to build batch file.
mod_sofia: Config has too-long if/elseif chain. Break this up to avoid "parser stack overflow; program too complex".
Add mod_conference.h to project and dir to includes.
2015-08-21 18:28:32 -04:00
Michael Jerris 69ea6a444a FS-7587: keep sofia-sip ws lib in sync 2015-06-01 15:27:45 -04:00
Alexander Traud 022fddbe6a Add Perfect Forward Secrecy (DHE PFS) to mod_sofia
Ephemeral ECDH (ECDHE) was supported already. This patch adds Ephemeral
DH (DHE). To enable it, add DH parameters into the private-key file of
your server (agent.pem). For example via:
openssl dhparam -out dh.pem 2048

FS-7561 #resolve
2015-06-01 12:45:19 -05:00
Artur Zaprzała 074b07f545 FS-7486: Fix handling of queued requests in Sofia-SIP 2015-05-29 10:45:13 +02:00
Anthony Minessale b9d64cc206 sofia rebuild 2015-05-28 12:46:53 -05:00
Anthony Minessale bc24e0f28a support AVPF too 2015-05-28 12:46:53 -05:00
Anthony Minessale 287a6c3cb4 sofia rebuild 2015-05-28 12:46:53 -05:00
Anthony Minessale 0d030a0c5b sofia update 2015-05-28 12:46:53 -05:00
Anthony Minessale 970064294c FS-7500: refactoring 2015-05-28 12:46:50 -05:00
Brian West cd98ec85e2 fix line endings 2015-05-28 12:46:43 -05:00
Brian West 4909cdb7fb FS-7322 #resolve 2015-02-24 14:58:26 -06:00
Michael Jerris 320d2eae52 FS-7314 #resolve #comment try to fix openssl configure detection failure caused by broken commit upstream in openssl 1.0.2. I don't have a box with this version of openssl so you'll need to let me know if this doesn't work 2015-02-23 11:51:48 -05:00
Artur Zaprzała 2c8e9c80ce Fix SIP_PAYLOAD_INIT2 macro in sip_header.h 2015-02-18 12:37:20 +01:00
Michael Jerris 4780a7e2af FS-7294: Enable -Werror when building with clang compiler 2015-02-17 18:18:41 -05:00
Michael Jerris cf53a30a4d FS-7294: Enable -Werror when building with clang compiler 2015-02-17 17:12:58 -05:00
Michael Jerris 5f55790d72 FS-7294: Enable -Werror when building with clang compiler 2015-02-17 16:47:17 -05:00
Michael Jerris 302a339fdf FS-7294: Enable -Werror when building with clang compiler #resolve 2015-02-17 12:20:33 -05:00
Michael Jerris d17edb59dc FS-7264: fix signed/unsigned warnings on windows building ws.c 2015-02-11 12:40:04 -05:00
William King 16f7177c3d resolve an automake warning about subdirs on latest automake
The file 'libs/sofia-sip/s2check/exit77.c' was moved in order to
silence the warning and to keep the build working. There might be a
build problem that results from this file move, but after serveral
build tests I have not found one. The contents of the file are
specifically for the make check target, so I believe it would be
highly unlikely to cause problems with any production feature.

FS-7122 #resolve
2015-01-07 11:30:41 -08:00
Mike Jerris 10c961e65e Merge pull request #155 in FS/freeswitch from bugfix/FS-7122-several-libs-do-not-have-the-subdirs to master
* commit '51f2442a9e3e3478b38bfab882c7cfe4bfc37d92':
  resolve an automake warning about subdirs on latest automake
2015-01-07 12:16:29 -06:00
Anthony Minessale 19a0a0fb00 sofia rebuild 2015-01-07 17:18:21 -06:00
Anthony Minessale 5187aaed79 FS-7117 #comment revert bf5210bf72 and implement it in ws.c please be sure to learn to use git commit hooks to properly associate commits with jiras 2015-01-07 17:17:28 -06:00
William King 51f2442a9e resolve an automake warning about subdirs on latest automake
Latest automake will detect then warn if the Makefile uses source
files that are in subdirectories, but the subdirs option is not
set. In the FreeSWITCH build system the current expected behavior is
to expect the subdirs option to be enabled.

FS-7122 #resolve
2015-01-07 10:04:29 -08:00
Anthony Minessale 7c0c3ab8a6 sofia rebuild 2015-01-07 02:12:48 -06:00
Anthony Minessale 6c1bc0e2f6 sync ws code 2015-01-07 02:12:29 -06:00
Jeff Lenk 357ffad817 fix windows build error 2014-12-15 13:37:07 -06:00
Michael Jerris 19272dc5e2 FS-7078: fix sip_header_as_string to properly null_terminate on larger header strings 2014-12-12 10:25:49 -06:00
Anthony Minessale 87a4670d16 FS-6890 #comment please test 2014-11-12 13:09:39 -06:00
Anthony Minessale 46e74e5853 revert 831832c2c6 2014-11-05 09:26:44 -06:00
Anthony Minessale 831832c2c6 FS-6890 #please test 2014-11-04 18:31:44 -06:00
Brian West 32a9ff3d39 Merge pull request #60 in FS/freeswitch from ~SJTHOMASON/freeswitch:FS-6823 to master
* commit 'afb00b2ecc8a9b049801f3f475c80e1111070fa8':
  Force rport on ADTRAN TA Devices
2014-11-04 07:36:36 -06:00
Anthony Minessale 7ca4ac566c FS-5949 FS-6945 #comment this change should be relevant to both of these issues, please test. This patch improves the hold parsing and ignores connection address of 0 implying hold when ice is present and disables the auto interpretation by the lower level stack of 0.0.0.0 to automatically imply sendonly to allow FS to decide on its own 2014-10-31 13:49:39 -05:00
Jeff Lenk 3c1ad1f014 Merge pull request #66 in FS/freeswitch from ~STEFANO.PICERNO/freeswitch:windows-wait-fix to master
* commit '4c9d9301b0f19b1750d567ce62142a572b163944':
  Workaround for Windows limit in su_wait
2014-10-29 11:04:00 -05:00
Anthony Minessale 59352005d0 force sofia rebuild 2014-10-13 18:28:44 -05:00
Spencer Thomason afb00b2ecc Force rport on ADTRAN TA Devices
ADTRAN Total Access devices do not support sending the rport parameter in
the Via header. This allows us to detect the device and force rport when
using the "safe" parameter, enabling the device to be used behind NAT.

FS-6823 #resolve
2014-10-02 13:09:15 -07:00
Anthony Minessale 35aeae0170 FS-6822 #comment The code in question appears to have been added by me (18f20e24). I think this patch is the correct solution. 2014-10-01 18:11:01 -05:00
Anthony Minessale 0150c862a2 FS-6854 #comment try this patch 2014-09-30 20:35:19 +05:00
Brian West 7c89c21153 FS-6860 #resolve this was fixed once but was lost in the last sync 2014-09-26 09:00:09 -05:00
Anthony Minessale f7de058acd FS-6854 #resolve 2014-09-25 21:44:02 +05:00
Anthony Minessale 9e72c8477f fix possible buffer overrun in websocket uri and sync the ws.c between sofia and verto (missing code from last commit) 2014-09-24 01:09:44 +05:00
Anthony Minessale 59e71341db fix possible buffer overrun in websocket uri and sync the ws.c between sofia and verto 2014-09-23 20:17:20 +05:00
Stefano Picerno 4c9d9301b0 Workaround for Windows limit in su_wait
Windows has a 64 descriptor limit in WSAWaitForMultipleEvents system call.
Implemented some custom login in su_wait to work around this limitation.
Changed SU_WAIT_MAX from 64 to 0x7fffffff, like on other plaftorms.
2014-09-23 13:09:57 +02:00
Travis Cross 3c32dd3bc9 Return NULL from `sub_alloc` for zero size
When zero was passed for the size to `sub_alloc`, we were passing this
size on to `malloc` or `calloc`, which is unusual enough that static
analyzers warn about this (POSIX says that either NULL or a pointer
will be returned).

We'll instead just return NULL right away.
2014-08-22 02:47:04 +00:00
Jeff Lenk 571cf932dc fix VS2010 build warning 2014-08-16 18:22:41 -05:00
Anthony Minessale cbe0bc05d0 force sofia rebuild 2014-08-16 01:34:30 +05:00
Anthony Minessale 24413bfa11 copy changes from verto ws.c to sofia 2014-08-16 00:43:25 +05:00
Anthony Minessale 2411550727 add homer capture line to websocket transport 2014-08-11 21:02:25 +05:00
Travis Cross 8414c498cf Fix line endings per .gitattributes 2014-08-08 15:24:42 +00:00
Brian West 327146cecf Fix WS Compile on MSVC2012 2014-07-25 11:34:08 -05:00
Anthony Minessale 6c80281ce9 buffer websocket headers and body before sending to avoid fragmentation 2014-07-17 01:07:57 +05:00
Anthony Minessale b53ba668fa rebuild 2014-07-12 04:39:56 +05:00
Anthony Minessale cc75547672 merge ws.c change to sofia 2014-07-12 04:39:41 +05:00
Brian West d2a487dce3 date would have done the same thing 2014-06-18 08:58:49 -05:00
Brian West fb92ebc8f2 FS-5223 and FS-6603, don't trust docs... sheesh 2014-06-18 08:33:57 -05:00
Brian West 311889634b FS-5223 FS-6603 on platforms that have SO_REUSEPORT it also implies SO_REUSEADDR, On platforms that only have SO_REUSEADDR it seems to imply both in the absence of SO_REUSEPORT. 2014-06-17 21:15:02 -05:00
Anthony Minessale 0685027bd8 FS-6574 --resolve 2014-06-09 14:29:08 -04:00
Michael Jerris b5a223cd1b CID:1215201 Explicit null dereferenced 2014-05-22 15:39:59 +00:00
Anthony Minessale f0aa0fc1d8 seek chain cert from wss.pem just cat together the cert, the key and the chain cert into wss.pem 2014-05-20 23:18:38 +05:00
Michael Jerris 77bddb9f9c FS-6538: silence gcc 4.9 throwing incorrect warning 2014-05-20 15:46:46 +00:00
Anthony Minessale af6c4b00b7 force sofia rebuild 2014-05-20 20:29:17 +05:00
Michael Jerris f683ac2165 FS-6533: --resolve fix gcc 4.9 warning due to useless right-hand operand of comma expression 2014-05-19 10:36:02 -05:00
Anthony Minessale 88ce7dae1c minor tweak to make ws code work in blocking mode properly when used outside sofia 2014-05-07 06:13:27 +05:00
Natanael Copa 317f4b1442 Fix building with musl libc
POSIX says poll.h and signal.h should not be prefixed with sys/ (ie
poll.h instead of sys/poll.h)

limits.h also defines a TZNAME_MAX so we change name of the define for
spandsp.
2014-05-02 11:20:36 -04:00
Michael Jerris 906467b360 fix log message on sending tport ping over ws to log error in failure cases 2014-05-01 14:20:27 -04:00
Michael Jerris cfd8d28bc8 silence clang unused function warnings and get rid of some unused functions 2014-05-01 09:03:19 -04:00
Michael Jerris fc25bbc23c remove unused function 2014-05-01 08:32:23 -04:00
Michael Jerris b55ba90def fix 2 potential use after free errors 2014-05-01 08:30:52 -04:00
Anthony Minessale 2cdae46b19 FS-6476 regression where sock would sometimes drop while reading logical frames 2014-04-29 18:25:05 -04:00
Anthony Minessale 61e22e8b50 FS-6476 --resolve 2014-04-22 23:25:41 +05:00
Anthony Minessale cbd20d8a05 update 2014-04-17 04:33:02 +05:00
Anthony Minessale bce51017fb FS-6462 --resolve
I found a problem here but it may not completely match your expectations.
I reviewed the RFC 4028 and checked against the code and I discovered we should not be putting a Min-SE in any response at all besides a 422:

section 5:

   The Min-SE header field MUST NOT be used in responses except for
   those with a 422 response code.  It indicates the minimum value of
   the session interval that the server is willing to accept.

I corrected this problem and implemented the 422 response so if you request a value lower than the minimum specified for the profile.
If the value is equal or higher to the minimum, it will be reflected in the Session-Expires header in the response and no Min-SE will be present.
2014-04-17 04:26:43 +05:00
Anthony Minessale 01254eaa5c force sofia rebuild 2014-04-04 13:42:49 -05:00
Anthony Minessale 180282cd9a FS-6287 2014-04-04 13:42:13 -05:00
Anthony Minessale 7ea4acaece FS-6426 --resolve 2014-04-03 23:25:48 +05:00
Michael Jerris f50f04be51 FS-6356: --resolve fix assert when you set the time > 15 days in the future during operation while things are in queue to be processeed 2014-03-28 14:33:47 -04:00
Brian West 74ab9515a4 FS-6294 DragonFly requires this also. 2014-03-21 11:14:15 -05:00
Brian West 16577339be FS-6387 don't fail if your openssl package has been compiled without EC support...LOOKING AT YOU GENTOO 2014-03-20 08:07:53 -05:00
Brian West c4c0f38aab FS-6294 FS-6308 NetBSD support should work test and report back please. 2014-03-19 14:34:07 -05:00
Brian West c210510c15 FS-6375 bump sofia so it rebuilds 2014-03-18 17:44:05 -05:00
Brian West f6d9027282 FS-6375 ifdef for sun in this case 2014-03-18 17:43:46 -05:00
Anthony Minessale 240f5d984f force sofia rebuild 2014-03-17 16:18:24 -05:00
Anthony Minessale bd1492e43e FS-6287 --resolve 2014-03-17 16:16:42 -05:00
Anthony Minessale 1d28639cac revert revert 2014-03-17 16:15:59 -05:00
Brian West be1efcc1fa Revert 6e818216e2, from FS-6287 as it breaks challenge to invites we don't come back and respond 2014-03-17 15:03:08 -05:00
Michael Jerris 340b697e1b FS-6341: --resolve add 3pcc invite w/o sdp support for 100rel/PRACK 2014-03-17 12:27:42 -04:00
Travis Cross 19fc943f59 Mitigate the CRIME TLS flaw
If an attacker can cause a device to make an authenticated request to
a service via TLS while including a payload of the attacker's choice
in that request, and if TLS compression is enabled, the attacker can
uncover the plaintext authentication information by making a series of
guesses and observing changes in the length of the ciphertext.

This is CVE-2012-4929.

FS-6360 --resolve

Thanks-to: Brian West <brian@freeswitch.org>
2014-03-16 16:24:58 +00:00