/usr/include/opal/h323/gkserver.h is in libopal-dev 3.10.10~dfsg2-2+b2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 | /*
* gkserver.h
*
* H225 Registration Admission and Security protocol handler
*
* Open H323 Library
*
* Copyright (c) 1998-2001 Equivalence Pty. Ltd.
*
* The contents of this file are subject to the Mozilla Public License
* Version 1.0 (the "License"); you may not use this file except in
* compliance with the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS"
* basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
* the License for the specific language governing rights and limitations
* under the License.
*
* The Original Code is Open H323 Library.
*
* The Initial Developer of the Original Code is Equivalence Pty. Ltd.
*
* This code was based on original code from OpenGate of Egoboo Ltd. thanks
* to Ashley Unitt for his efforts.
*
* Contributor(s): ______________________________________.
*
* $Revision: 24178 $
* $Author: rjongbloed $
* $Date: 2010-04-05 19:10:56 -0500 (Mon, 05 Apr 2010) $
*/
#ifndef OPAL_H323_GKSERVER_H
#define OPAL_H323_GKSERVER_H
#ifdef P_USE_PRAGMA
#pragma interface
#endif
#include <opal/buildopts.h>
#if OPAL_H323
#include <ptlib/safecoll.h>
#include <opal/guid.h>
#include <h323/h225ras.h>
#include <h323/transaddr.h>
#include <h323/h235auth.h>
#include <h323/h323pdu.h>
#include <h323/h323trans.h>
class PASN_Sequence;
class PASN_Choice;
class H225_AliasAddress;
class H225_EndpointIdentifier;
class H225_GatekeeperIdentifier;
class H225_ArrayOf_TransportAddress;
class H225_GatekeeperIdentifier;
class H225_EndpointIdentifier;
class H225_InfoRequestResponse_perCallInfo_subtype;
class H225_RasUsageInformation;
class H323RegisteredEndPoint;
class H323GatekeeperListener;
class H323GatekeeperServer;
class H323RasPDU;
#if OPAL_H501
class H323PeerElement;
#endif
class H323GatekeeperRequest : public H323Transaction
{
PCLASSINFO(H323GatekeeperRequest, H323Transaction);
public:
/**@name Construction */
//@{
/**Create a new gatekeeper server request.
*/
H323GatekeeperRequest(
H323GatekeeperListener & rasChannel,
const H323RasPDU & pdu
);
//@}
virtual H323TransactionPDU * CreateRIP(
unsigned sequenceNumber,
unsigned delay
) const;
virtual PBoolean WritePDU(
H323TransactionPDU & pdu
);
PBoolean CheckCryptoTokens();
PBoolean CheckGatekeeperIdentifier();
PBoolean GetRegisteredEndPoint();
virtual PString GetGatekeeperIdentifier() const = 0;
virtual unsigned GetGatekeeperRejectTag() const = 0;
virtual PString GetEndpointIdentifier() const = 0;
virtual unsigned GetRegisteredEndPointRejectTag() const = 0;
virtual unsigned GetSecurityRejectTag() const = 0;
H323GatekeeperListener & GetRasChannel() const { return rasChannel; }
PSafePtr<H323RegisteredEndPoint> endpoint;
protected:
H323GatekeeperListener & rasChannel;
};
class H323GatekeeperGRQ : public H323GatekeeperRequest
{
PCLASSINFO(H323GatekeeperGRQ, H323GatekeeperRequest);
public:
H323GatekeeperGRQ(
H323GatekeeperListener & listener,
const H323RasPDU & pdu
);
#if PTRACING
virtual const char * GetName() const;
#endif
virtual PString GetGatekeeperIdentifier() const;
virtual unsigned GetGatekeeperRejectTag() const;
virtual PString GetEndpointIdentifier() const;
virtual unsigned GetRegisteredEndPointRejectTag() const;
virtual H235Authenticator::ValidationResult ValidatePDU() const;
virtual unsigned GetSecurityRejectTag() const;
virtual void SetRejectReason(
unsigned reasonCode
);
H225_GatekeeperRequest & grq;
H225_GatekeeperConfirm & gcf;
H225_GatekeeperReject & grj;
protected:
virtual Response OnHandlePDU();
};
class H323GatekeeperRRQ : public H323GatekeeperRequest
{
PCLASSINFO(H323GatekeeperRRQ, H323GatekeeperRequest);
public:
H323GatekeeperRRQ(
H323GatekeeperListener & listener,
const H323RasPDU & pdu
);
#if PTRACING
virtual const char * GetName() const;
#endif
virtual PString GetGatekeeperIdentifier() const;
virtual unsigned GetGatekeeperRejectTag() const;
virtual PString GetEndpointIdentifier() const;
virtual unsigned GetRegisteredEndPointRejectTag() const;
virtual H235Authenticator::ValidationResult ValidatePDU() const;
virtual unsigned GetSecurityRejectTag() const;
virtual void SetRejectReason(
unsigned reasonCode
);
H225_RegistrationRequest & rrq;
H225_RegistrationConfirm & rcf;
H225_RegistrationReject & rrj;
protected:
virtual Response OnHandlePDU();
};
class H323GatekeeperURQ : public H323GatekeeperRequest
{
PCLASSINFO(H323GatekeeperURQ, H323GatekeeperRequest);
public:
H323GatekeeperURQ(
H323GatekeeperListener & listener,
const H323RasPDU & pdu
);
#if PTRACING
virtual const char * GetName() const;
#endif
virtual PString GetGatekeeperIdentifier() const;
virtual unsigned GetGatekeeperRejectTag() const;
virtual PString GetEndpointIdentifier() const;
virtual unsigned GetRegisteredEndPointRejectTag() const;
virtual H235Authenticator::ValidationResult ValidatePDU() const;
virtual unsigned GetSecurityRejectTag() const;
virtual void SetRejectReason(
unsigned reasonCode
);
H225_UnregistrationRequest & urq;
H225_UnregistrationConfirm & ucf;
H225_UnregistrationReject & urj;
protected:
virtual Response OnHandlePDU();
};
class H323GatekeeperARQ : public H323GatekeeperRequest
{
PCLASSINFO(H323GatekeeperARQ, H323GatekeeperRequest);
public:
H323GatekeeperARQ(
H323GatekeeperListener & listener,
const H323RasPDU & pdu
);
#if PTRACING
virtual const char * GetName() const;
#endif
virtual PString GetGatekeeperIdentifier() const;
virtual unsigned GetGatekeeperRejectTag() const;
virtual PString GetEndpointIdentifier() const;
virtual unsigned GetRegisteredEndPointRejectTag() const;
virtual H235Authenticator::ValidationResult ValidatePDU() const;
virtual unsigned GetSecurityRejectTag() const;
virtual void SetRejectReason(
unsigned reasonCode
);
H225_AdmissionRequest & arq;
H225_AdmissionConfirm & acf;
H225_AdmissionReject & arj;
PString alternateSecurityID;
protected:
virtual Response OnHandlePDU();
};
class H323GatekeeperDRQ : public H323GatekeeperRequest
{
PCLASSINFO(H323GatekeeperDRQ, H323GatekeeperRequest);
public:
H323GatekeeperDRQ(
H323GatekeeperListener & listener,
const H323RasPDU & pdu
);
#if PTRACING
virtual const char * GetName() const;
#endif
virtual PString GetGatekeeperIdentifier() const;
virtual unsigned GetGatekeeperRejectTag() const;
virtual PString GetEndpointIdentifier() const;
virtual unsigned GetRegisteredEndPointRejectTag() const;
virtual H235Authenticator::ValidationResult ValidatePDU() const;
virtual unsigned GetSecurityRejectTag() const;
virtual void SetRejectReason(
unsigned reasonCode
);
H225_DisengageRequest & drq;
H225_DisengageConfirm & dcf;
H225_DisengageReject & drj;
protected:
virtual Response OnHandlePDU();
};
class H323GatekeeperBRQ : public H323GatekeeperRequest
{
PCLASSINFO(H323GatekeeperBRQ, H323GatekeeperRequest);
public:
H323GatekeeperBRQ(
H323GatekeeperListener & listener,
const H323RasPDU & pdu
);
#if PTRACING
virtual const char * GetName() const;
#endif
virtual PString GetGatekeeperIdentifier() const;
virtual unsigned GetGatekeeperRejectTag() const;
virtual PString GetEndpointIdentifier() const;
virtual unsigned GetRegisteredEndPointRejectTag() const;
virtual H235Authenticator::ValidationResult ValidatePDU() const;
virtual unsigned GetSecurityRejectTag() const;
virtual void SetRejectReason(
unsigned reasonCode
);
H225_BandwidthRequest & brq;
H225_BandwidthConfirm & bcf;
H225_BandwidthReject & brj;
protected:
virtual Response OnHandlePDU();
};
class H323GatekeeperLRQ : public H323GatekeeperRequest
{
PCLASSINFO(H323GatekeeperLRQ, H323GatekeeperRequest);
public:
H323GatekeeperLRQ(
H323GatekeeperListener & listener,
const H323RasPDU & pdu
);
#if PTRACING
virtual const char * GetName() const;
#endif
virtual PString GetGatekeeperIdentifier() const;
virtual unsigned GetGatekeeperRejectTag() const;
virtual PString GetEndpointIdentifier() const;
virtual unsigned GetRegisteredEndPointRejectTag() const;
virtual H235Authenticator::ValidationResult ValidatePDU() const;
virtual unsigned GetSecurityRejectTag() const;
virtual void SetRejectReason(
unsigned reasonCode
);
H225_LocationRequest & lrq;
H225_LocationConfirm & lcf;
H225_LocationReject & lrj;
protected:
virtual Response OnHandlePDU();
};
class H323GatekeeperIRR : public H323GatekeeperRequest
{
PCLASSINFO(H323GatekeeperIRR, H323GatekeeperRequest);
public:
H323GatekeeperIRR(
H323GatekeeperListener & listener,
const H323RasPDU & pdu
);
#if PTRACING
virtual const char * GetName() const;
#endif
virtual PString GetGatekeeperIdentifier() const;
virtual unsigned GetGatekeeperRejectTag() const;
virtual PString GetEndpointIdentifier() const;
virtual unsigned GetRegisteredEndPointRejectTag() const;
virtual H235Authenticator::ValidationResult ValidatePDU() const;
virtual unsigned GetSecurityRejectTag() const;
virtual void SetRejectReason(
unsigned reasonCode
);
H225_InfoRequestResponse & irr;
H225_InfoRequestAck & iack;
H225_InfoRequestNak & inak;
protected:
virtual Response OnHandlePDU();
};
/**This class describes an active call on a gatekeeper.
*/
class H323GatekeeperCall : public PSafeObject
{
PCLASSINFO(H323GatekeeperCall, PSafeObject);
public:
/**@name Construction */
//@{
enum Direction {
AnsweringCall,
OriginatingCall,
UnknownDirection
};
/**Create a new gatekeeper call tracking record.
*/
H323GatekeeperCall(
H323GatekeeperServer & server, ///< Owner gatekeeper server
const OpalGloballyUniqueID & callIdentifier, ///< Unique call identifier
Direction direction ///< Direction of call
);
/**Destroy the call, removing itself from the endpoint.
*/
~H323GatekeeperCall();
//@}
/**@name Overrides from PObject */
//@{
/**Compare two objects.
*/
Comparison Compare(
const PObject & obj ///< Other object
) const;
/**Print the name of the gatekeeper.
*/
void PrintOn(
ostream & strm ///< Stream to print to.
) const;
//@}
/**@name Operations */
//@{
/**Handle an admission ARQ PDU.
The default behaviour sets some internal variables from the ARQ data
and then calls OnResolveAdmission, if necessary, and OnReplyAdmission
every time.
*/
virtual H323GatekeeperRequest::Response OnAdmission(
H323GatekeeperARQ & request
);
/**Shut down a call.
This sendsa DRQ to the endpoint(s) to close the call down.
*/
virtual PBoolean Disengage(
int reason = -1 ///< Reason for disengage
);
/**Handle a disengage DRQ PDU.
The default behaviour simply returns true.
*/
virtual H323GatekeeperRequest::Response OnDisengage(
H323GatekeeperDRQ & request
);
/**Handle a bandwidth BRQ PDU.
The default behaviour adjusts the bandwidth used by the gatekeeper and
adjusts the remote endpoint according to those limits.
*/
virtual H323GatekeeperRequest::Response OnBandwidth(
H323GatekeeperBRQ & request
);
/**Handle an info request response IRR PDU.
The default behaviour resets the heartbeat time monitoring the call.
*/
virtual H323GatekeeperRequest::Response OnInfoResponse(
H323GatekeeperIRR & request,
H225_InfoRequestResponse_perCallInfo_subtype & call
);
/**Call back when an info response detects an Alerting.
*/
virtual void OnAlerting();
/**Call back when an info response detects an Connected.
*/
virtual void OnConnected();
/**Function called to do heartbeat check of the call.
Monitor the state of the call and make sure everything is OK.
A return value of false indicates the call is to be closed for some
reason.
Default behaviour checks the time since the last received IRR and if
it has been too long does an IRQ to see if the call (and endpoint!) is
still there and running. If the IRQ fails, false is returned.
*/
virtual PBoolean OnHeartbeat();
/**Get the current credit for this call.
This function is only called if the client indicates that it can use
the information provided.
The default behaviour calls the same function on the endpoint.
*/
virtual PString GetCallCreditAmount() const;
/**Get the call credit billing mode for this endpoint.
This function is only called if the client indicates that it can use
the information provided.
The default behaviour calls the same function on the endpoint.
*/
virtual PBoolean GetCallCreditMode() const;
/**Get the duration limit for this call.
This function is only called if the client indicates that it can use
the information provided.
The default behaviour returns zero which indicates there is no
duration limit applicable.
*/
virtual unsigned GetDurationLimit() const;
/**Send the call credit service control PDU.
This will send an SCI pdu to the endpoint with the control service
session information for the current call credit, if enabled.
*/
virtual PBoolean SendCallCreditServiceControl();
/**Add call credit and duration information to PDU.
*/
PBoolean AddCallCreditServiceControl(
H225_ArrayOf_ServiceControlSession & serviceControl
) const;
/**Send the service control session for the PDU.
This will send an SCI pdu to the endpoint with the control service
session information provided.
*/
virtual PBoolean SendServiceControlSession(
const H323ServiceControlSession & session
);
/**Translate a given alias to an alias set and signal address.
This is called by the OnAdmission() handler to fill in the ACF
The default behaviour calls H323GatekeeperServer::TranslateAliasAddress.
*/
virtual PBoolean TranslateAliasAddress(
const H225_AliasAddress & alias,
H225_ArrayOf_AliasAddress & aliases,
H323TransportAddress & address,
PBoolean & isGkRouted
);
//@}
/**@name Access functions */
//@{
H323GatekeeperServer & GetGatekeeper() const { return gatekeeper; }
H323RegisteredEndPoint & GetEndPoint() const { return *PAssertNULL(endpoint); }
PBoolean IsAnsweringCall() const { return direction == AnsweringCall; }
unsigned GetCallReference() const { return callReference; }
const OpalGloballyUniqueID & GetCallIdentifier() const { return callIdentifier; }
const OpalGloballyUniqueID & GetConferenceIdentifier() const { return conferenceIdentifier; }
const PString & GetSourceNumber() const { return srcNumber; }
const PStringArray & GetSourceAliases() const { return srcAliases; }
const H323TransportAddress & GetSourceHost() const { return srcHost; }
PString GetSourceAddress() const;
const PString & GetDestinationNumber() const { return dstNumber; }
const PStringArray & GetDestinationAliases() const { return dstAliases; }
const H323TransportAddress & GetDestinationHost() const { return dstHost; }
PString GetDestinationAddress() const;
unsigned GetBandwidthUsed() const { return bandwidthUsed; }
PBoolean SetBandwidthUsed(unsigned bandwidth);
const PTime & GetLastInfoResponseTime() const { return lastInfoResponse; }
const PTime & GetCallStartTime() const { return callStartTime; }
const PTime & GetAlertingTime() const { return alertingTime; }
const PTime & GetConnectedTime() const { return connectedTime; }
const PTime & GetCallEndTime() const { return callEndTime; }
H323Connection::CallEndReason GetCallEndReason() const { return callEndReason; }
//@}
protected:
void SetUsageInfo(const H225_RasUsageInformation & usage);
H323GatekeeperServer & gatekeeper;
H323RegisteredEndPoint * endpoint;
H323GatekeeperListener * rasChannel;
Direction direction;
unsigned callReference;
OpalGloballyUniqueID callIdentifier;
OpalGloballyUniqueID conferenceIdentifier;
PString srcNumber;
PStringArray srcAliases;
H323TransportAddress srcHost;
PString dstNumber;
PStringArray dstAliases;
H323TransportAddress dstHost;
unsigned bandwidthUsed;
unsigned infoResponseRate;
PTime lastInfoResponse;
PBoolean drqReceived;
PTime callStartTime;
PTime alertingTime;
PTime connectedTime;
PTime callEndTime;
H323Connection::CallEndReason callEndReason;
};
/**This class describes endpoints that are registered with a gatekeeper server.
Note that a registered endpoint has no realationship in this software to a
H323EndPoint class. This is purely a description of endpoints that are
registered with the gatekeeper.
*/
class H323RegisteredEndPoint : public PSafeObject
{
PCLASSINFO(H323RegisteredEndPoint, PSafeObject);
public:
/**@name Construction */
//@{
/**Create a new endpoint registration record.
*/
H323RegisteredEndPoint(
H323GatekeeperServer & server, ///< Gatekeeper server data
const PString & id ///< Identifier
);
//@}
/**@name Overrides from PObject */
//@{
/**Compare two objects.
*/
Comparison Compare(
const PObject & obj ///< Other object
) const;
/**Print the name of the gatekeeper.
*/
void PrintOn(
ostream & strm ///< Stream to print to.
) const;
//@}
/**@name Call Operations */
//@{
/**Add a call to the endpoints list of active calls.
This is largely an internal routine, it is not expected the user would
need to deal with this function.
*/
virtual void AddCall(
H323GatekeeperCall * call
);
/**Remove a call from the endpoints list of active calls.
This is largely an internal routine, it is not expected the user would
need to deal with this function.
*/
virtual PBoolean RemoveCall(
H323GatekeeperCall * call
);
/**Get the count of active calls on this endpoint.
*/
PINDEX GetCallCount() const { return activeCalls.GetSize(); }
/**Get the details of teh active call on this endpoint.
*/
H323GatekeeperCall & GetCall(
PINDEX idx
) { return activeCalls[idx]; }
//@}
/**@name Protocol Operations */
//@{
/**Call back on receiving a RAS registration for this endpoint.
The default behaviour extract information from the RRQ and sets
internal variables to that data.
If returns true then a RCF is sent otherwise an RRJ is sent.
*/
virtual H323GatekeeperRequest::Response OnRegistration(
H323GatekeeperRRQ & request
);
/**Call back on receiving a RAS full registration for this endpoint.
This is not called if the keepAlive flag is set indicating a
lightweight RRQ has been received.
The default behaviour extract information from the RRQ and sets
internal variables to that data.
If returns true then a RCF is sent otherwise an RRJ is sent.
*/
virtual H323GatekeeperRequest::Response OnFullRegistration(
H323GatekeeperRRQ & request
);
/**Call back to set security on RAS full registration for this endpoint.
This is called from OnFullRegistration().
The default behaviour extract information from the RRQ and sets
internal variables to that data.
If returns true then a RCF is sent otherwise an RRJ is sent.
*/
virtual H323GatekeeperRequest::Response OnSecureRegistration(
H323GatekeeperRRQ & request
);
/**Call back on receiving a RAS unregistration for this endpoint.
The default behaviour clears all calls owned by this endpoint.
*/
virtual H323GatekeeperRequest::Response OnUnregistration(
H323GatekeeperURQ & request
);
/**Force unregistration of the endpoint.
This sendsa URQ to the endpoint(s) to close the call down.
*/
virtual PBoolean Unregister(
int reason = -1 ///< Reason for unregistration
);
/**Handle an info request response IRR PDU.
The default behaviour finds each call current for endpoint and calls
the function of the same name in the H323GatekeeperCall instance.
*/
virtual H323GatekeeperRequest::Response OnInfoResponse(
H323GatekeeperIRR & request
);
/**Function called to do time to live check of the call.
Monitor the state of the endpoint and make sure everything is OK.
A return value of false indicates the endpoint has expired and is to be
unregistered and removed.
Default behaviour checks the time since the last received RRQ and if
it has been too long does an IRQ to see if the endpoint is
still there and running. If the IRQ fails, false is returned.
*/
virtual PBoolean OnTimeToLive();
/**Get the current call credit for this endpoint.
This function is only called if the client indicates that it can use
the information provided. If a server wishes to enable this feature by
returning a non-empty string, it must be consistent in that usage. That
is the H323GatekeeperCall::GetCallCreditAmount() for this endpoint
must also return non-empty value.
The return value is a UTF-8 string for amount, including currency.
The default behaviour returns an empty string disabling the function.
*/
virtual PString GetCallCreditAmount() const;
/**Get the call credit billing mode for this endpoint.
This function is only called if the client indicates that it can use
the information provided.
The default behaviour return true indicating that calls will debit the
account.
*/
virtual PBoolean GetCallCreditMode() const;
/**Send the service control session for the PDU.
This will send an SCI pdu to the endpoint with the control service
session information provided.
*/
virtual PBoolean SendServiceControlSession(
const H323ServiceControlSession & session
);
/**Set the service control session for the PDU.
This is an internal function.
*/
virtual PBoolean AddServiceControlSession(
const H323ServiceControlSession & session,
H225_ArrayOf_ServiceControlSession & serviceControl
);
//@}
/**@name Access functions */
//@{
/**Set password for user activating H.235 security.
*/
virtual PBoolean SetPassword(
const PString & password,
const PString & username = PString::Empty()
);
/**Get the endpoint identifier assigned to the endpoint.
*/
const PString & GetIdentifier() const { return identifier; }
/**Get the Peer Element descriptor ID assigned to the endpoint.
*/
const OpalGloballyUniqueID & GetDescriptorID() const { return descriptorID; }
/**Get the gatekeeper server data object that owns this endpoint.
*/
H323GatekeeperServer & GetGatekeeper() const { return gatekeeper; }
/**Get the addresses that can be used to contact this endpoint via the
RAS protocol.
*/
const H323TransportAddressArray & GetRASAddresses() const { return rasAddresses; }
/**Get the number of addresses that can be used to contact this
endpoint via the RAS protocol.
*/
PINDEX GetRASAddressCount() const { return rasAddresses.GetSize(); }
/**Get an address that can be used to contact this endpoint via the RAS
protocol.
*/
H323TransportAddress GetRASAddress(
PINDEX idx
) const { return rasAddresses[idx]; }
/**Get the addresses that can be used to contact this
endpoint via the H.225/Q.931 protocol, ie normal calls.
*/
const H323TransportAddressArray & GetSignalAddresses() const { return signalAddresses; }
/**Get the number of addresses that can be used to contact this
endpoint via the H.225/Q.931 protocol, ie normal calls.
*/
PINDEX GetSignalAddressCount() const { return signalAddresses.GetSize(); }
/**Get an address that can be used to contact this endpoint via the
H.225/Q.931 protocol, ie normal calls.
*/
H323TransportAddress GetSignalAddress(
PINDEX idx
) const { return signalAddresses[idx]; }
/**Get the aliases this endpoint may be identified by.
*/
const PStringArray & GetAliases() const { return aliases; }
/**Determine if alias is an alias that this endpoint may be identified by.
*/
PBoolean ContainsAlias(
const PString & alias
) { return aliases.GetStringsIndex(alias) != P_MAX_INDEX; }
/**Get the number of aliases this endpoint may be identified by.
*/
PINDEX GetAliasCount() const { return aliases.GetSize(); }
/**Get an alias that this endpoint may be identified by.
*/
PString GetAlias(
PINDEX idx
) const { if (idx < aliases.GetSize()) return aliases[idx]; return PString::Empty(); }
/** Remove an alias that this endpoint may be identified by.
* If this was the last alias, then endpoint will be deleted soon
* after by a cleanup thread. As this function is in the endpoint itself
* it is not possible for this function to delete the endpoint immediately
*/
void RemoveAlias(
const PString & alias
);
/**Get the security context for this RAS connection.
*/
virtual const H235Authenticators & GetAuthenticators() const { return authenticators; }
/**Get the number of prefixes this endpoint can accept.
*/
PINDEX GetPrefixCount() const { return voicePrefixes.GetSize(); }
/**Get a prefix that this endpoint can accept.
*/
PString GetPrefix(
PINDEX idx
) const { return voicePrefixes[idx]; }
/**Get application info (name/version etc) for endpoint.
*/
PCaselessString GetApplicationInfo() const { return productInfo.AsString(); }
/**Get application info (name/version etc) for endpoint.
*/
const OpalProductInfo & GetProductInfo() const { return productInfo; }
/**Get the protocol version the endpoint registered with.
*/
unsigned GetProtocolVersion() const { return protocolVersion; }
/**Return if gatekeeper thinks the endpoint is behind a firewall.
*/
PBoolean IsBehindNAT() const { return isBehindNAT; }
/**Get the flag indicating the endpoint can display credit amounts.
*/
PBoolean CanDisplayAmountString() const { return canDisplayAmountString; }
/**Get the flag indicating the endpoint can enforce a duration limit.
*/
PBoolean CanEnforceDurationLimit() const { return canEnforceDurationLimit; }
/**Get the flag indicating the endpoint can handle RIPs (H225v1 endpoints cannot)
*/
PBoolean CanReceiveRIP() const;
/**Get the H225 version reported in the RRQ
*/
PBoolean GetH225Version() const { return h225Version; }
//@}
/**@name H.501 access functions */
//@{
/**
* Function called when gatekeeper sends a descriptor for this endpoint.
* This allows the gatekeeper to alter the descriptor information before
* it is sent.
*
* If returns false then the desriptor is not sent
*/
virtual PBoolean OnSendDescriptorForEndpoint(
H225_ArrayOf_AliasAddress & aliases, ///< aliases for the enndpoint
H225_EndpointType & terminalType, ///< terminal type
H225_ArrayOf_AliasAddress & transportAddresses ///< transport addresses
);
//@}
protected:
H323GatekeeperServer & gatekeeper;
H323GatekeeperListener * rasChannel;
PString identifier;
OpalGloballyUniqueID descriptorID;
H323TransportAddressArray rasAddresses;
H323TransportAddressArray signalAddresses;
PStringArray aliases;
PStringArray voicePrefixes;
OpalProductInfo productInfo;
unsigned protocolVersion;
PBoolean isBehindNAT;
PBoolean canDisplayAmountString;
PBoolean canEnforceDurationLimit;
unsigned h225Version;
unsigned timeToLive;
H235Authenticators authenticators;
PTime lastRegistration;
PTime lastInfoResponse;
PSortedList<H323GatekeeperCall> activeCalls;
POrdinalDictionary<PString> serviceControlSessions;
};
/**This class embodies the low level H.225.0 RAS protocol on gatekeepers.
One or more instances of this class may be used to access a single
H323GatekeeperServer instance. Thus specific interfaces could be set up
to receive UDP packets, all operating as the same gatekeeper.
*/
class H323GatekeeperListener : public H225_RAS
{
PCLASSINFO(H323GatekeeperListener, H225_RAS);
public:
/**@name Construction */
//@{
/**Create a new gatekeeper listener.
*/
H323GatekeeperListener(
H323EndPoint & endpoint, ///< Local endpoint
H323GatekeeperServer & server, ///< Database for gatekeeper
const PString & gatekeeperIdentifier, ///< Name of this gatekeeper
H323Transport * transport = NULL ///< Transport over which gatekeepers communicates.
);
/**Destroy gatekeeper listener.
*/
~H323GatekeeperListener();
//@}
/**@name Operations */
//@{
/**Send a UnregistrationRequest (URQ) to endpoint.
*/
PBoolean UnregistrationRequest(
const H323RegisteredEndPoint & ep,
unsigned reason
);
/**Send a DisengageRequest (DRQ) to endpoint.
*/
PBoolean DisengageRequest(
const H323GatekeeperCall & call,
unsigned reason
);
/**Send an InfoRequest (IRQ) to endpoint.
*/
virtual PBoolean InfoRequest(
H323RegisteredEndPoint & ep,
H323GatekeeperCall * call = NULL
);
/**Send an ServiceControlIndication (SCI) to endpoint.
*/
virtual PBoolean ServiceControlIndication(
H323RegisteredEndPoint & ep,
const H323ServiceControlSession & session,
H323GatekeeperCall * call = NULL
);
//@}
/**@name Operation callbacks */
//@{
/**Handle a discovery GRQ PDU.
The default behaviour does some checks and calls the gatekeeper server
instances function of the same name.
*/
virtual H323GatekeeperRequest::Response OnDiscovery(
H323GatekeeperGRQ & request
);
/**Handle a registration RRQ PDU.
The default behaviour does some checks and calls the gatekeeper server
instances function of the same name.
*/
virtual H323GatekeeperRequest::Response OnRegistration(
H323GatekeeperRRQ & request
);
/**Handle an unregistration URQ PDU.
The default behaviour does some checks and calls the gatekeeper server
instances function of the same name.
*/
virtual H323GatekeeperRequest::Response OnUnregistration(
H323GatekeeperURQ & request
);
/**Handle an admission ARQ PDU.
The default behaviour does some checks and calls the gatekeeper server
instances function of the same name.
*/
virtual H323GatekeeperRequest::Response OnAdmission(
H323GatekeeperARQ & request
);
/**Handle a disengage DRQ PDU.
The default behaviour does some checks and calls the gatekeeper server
instances function of the same name.
*/
virtual H323GatekeeperRequest::Response OnDisengage(
H323GatekeeperDRQ & request
);
/**Handle a bandwidth BRQ PDU.
The default behaviour does some checks and calls the gatekeeper server
instances function of the same name.
*/
virtual H323GatekeeperRequest::Response OnBandwidth(
H323GatekeeperBRQ & request
);
/**Handle a location LRQ PDU.
The default behaviour does some checks and calls the gatekeeper server
instances function of the same name.
*/
virtual H323GatekeeperRequest::Response OnLocation(
H323GatekeeperLRQ & request
);
/**Handle an info request response IRR PDU.
The default behaviour does some checks and calls the gatekeeper server
instances function of the same name.
*/
virtual H323GatekeeperRequest::Response OnInfoResponse(
H323GatekeeperIRR & request
);
//@}
/**@name Low level protocol callbacks */
//@{
virtual PBoolean OnReceiveGatekeeperRequest(const H323RasPDU &, const H225_GatekeeperRequest &);
virtual PBoolean OnReceiveRegistrationRequest(const H323RasPDU &, const H225_RegistrationRequest &);
virtual PBoolean OnReceiveUnregistrationRequest(const H323RasPDU &, const H225_UnregistrationRequest &);
virtual PBoolean OnReceiveUnregistrationConfirm(const H225_UnregistrationConfirm &);
virtual PBoolean OnReceiveUnregistrationReject(const H225_UnregistrationReject &);
virtual PBoolean OnReceiveAdmissionRequest(const H323RasPDU &, const H225_AdmissionRequest &);
virtual PBoolean OnReceiveBandwidthRequest(const H323RasPDU &, const H225_BandwidthRequest &);
virtual PBoolean OnReceiveBandwidthConfirm(const H225_BandwidthConfirm &);
virtual PBoolean OnReceiveBandwidthReject(const H225_BandwidthReject &);
virtual PBoolean OnReceiveDisengageRequest(const H323RasPDU &, const H225_DisengageRequest &);
virtual PBoolean OnReceiveDisengageConfirm(const H225_DisengageConfirm &);
virtual PBoolean OnReceiveDisengageReject(const H225_DisengageReject &);
virtual PBoolean OnReceiveLocationRequest(const H323RasPDU &, const H225_LocationRequest &);
virtual PBoolean OnReceiveInfoRequestResponse(const H323RasPDU &, const H225_InfoRequestResponse &);
virtual PBoolean OnReceiveResourcesAvailableConfirm(const H225_ResourcesAvailableConfirm &);
virtual PBoolean OnSendFeatureSet(unsigned, H225_FeatureSet & features) const;
virtual void OnReceiveFeatureSet(unsigned, const H225_FeatureSet & features) const;
//@}
/**@name Member access */
//@{
H323GatekeeperServer & GetGatekeeper() const { return gatekeeper; }
//@}
protected:
H323GatekeeperServer & gatekeeper;
};
/**This class implements a basic gatekeeper server functionality.
An instance of this class contains all of the state information and
operations for a gatekeeper. Multiple gatekeeper listeners may be using
this class to link individual UDP (or other protocol) packets from various
sources (interfaces etc) into a single instance.
There is typically only one instance of this class, though it is not
limited to that. An application would also quite likely descend from this
class and override call back functions to implement more complex policy.
*/
class H323GatekeeperServer : public H323TransactionServer
{
PCLASSINFO(H323GatekeeperServer, H323TransactionServer);
public:
/**@name Construction */
//@{
/**Create a new gatekeeper.
*/
H323GatekeeperServer(
H323EndPoint & endpoint
);
/**Destroy gatekeeper.
*/
~H323GatekeeperServer();
//@}
WORD GetDefaultUdpPort() { return H225_RAS::DefaultRasUdpPort; }
/**@name Protocol Handler Operations */
//@{
/**Create a new H323GatkeeperListener.
The user woiuld not usually use this function as it is used internally
by the server when new listeners are added by H323TransportAddress.
However, a user may override this function to create objects that are
user defined descendants of H323GatekeeperListener so the user can
maintain extra information on a interface by interface basis.
*/
virtual H323Transactor * CreateListener(
H323Transport * transport ///< Transport for listener
);
//@}
/**@name EndPoint Operations */
//@{
/**Handle a discovery GRQ PDU.
The default behaviour deals with the authentication scheme nogotiation.
*/
virtual H323GatekeeperRequest::Response OnDiscovery(
H323GatekeeperGRQ & request
);
/**Call back on receiving a RAS registration for this endpoint.
The default behaviour checks if the registered endpoint already exists
and if not creates a new endpoint. It then calls the OnRegistration()
on that new endpoint instance.
If returns true then a RCF is sent otherwise an RRJ is sent.
*/
virtual H323GatekeeperRequest::Response OnRegistration(
H323GatekeeperRRQ & request
);
/**Handle an unregistration URQ PDU.
The default behaviour removes the aliases defined in the URQ and if all
aliases for the registered endpoint are removed then the endpoint itself
is removed.
*/
virtual H323GatekeeperRequest::Response OnUnregistration(
H323GatekeeperURQ & request
);
/**Handle an info request response IRR PDU.
The default behaviour calls the function of the same name in the
endpoint instance.
*/
virtual H323GatekeeperRequest::Response OnInfoResponse(
H323GatekeeperIRR & request
);
/**Add a new registered endpoint to the server database.
Once the endpoint has been added it is then owned by the server and
will be deleted when it is removed.
The user woiuld not usually use this function as it is used internally
by the server when new registration requests (RRQ) are received.
Note that a registered endpoint has no relationship in this software
to a H323EndPoint class.
*/
virtual void AddEndPoint(
H323RegisteredEndPoint * ep
);
/**Remove a registered endpoint from the server database.
*/
virtual PBoolean RemoveEndPoint(
H323RegisteredEndPoint * ep
);
/**Create a new registered endpoint object.
The user woiuld not usually use this function as it is used internally
by the server when new registration requests (RRQ) are received.
However, a user may override this function to create objects that are
user defined descendants of H323RegisteredEndPoint so the user can
maintain extra information on a endpoint by endpoint basis.
*/
virtual H323RegisteredEndPoint * CreateRegisteredEndPoint(
H323GatekeeperRRQ & request
);
/**Create a new unique identifier for the registered endpoint.
The returned identifier must be unique over the lifetime of this
gatekeeper server.
The default behaviour simply returns the string representation of the
member variable nextIdentifier. There could be a problem in this
implementation after 4,294,967,296 have been registered.
*/
virtual PString CreateEndPointIdentifier();
/**Find a registered endpoint given its endpoint identifier.
*/
virtual PSafePtr<H323RegisteredEndPoint> FindEndPointByIdentifier(
const PString & identifier,
PSafetyMode mode = PSafeReference
);
/**Find a registered endpoint given a list of signal addresses.
*/
virtual PSafePtr<H323RegisteredEndPoint> FindEndPointBySignalAddresses(
const H225_ArrayOf_TransportAddress & addresses,
PSafetyMode mode = PSafeReference
);
/**Find a registered endpoint given its signal address.
*/
virtual PSafePtr<H323RegisteredEndPoint> FindEndPointBySignalAddress(
const H323TransportAddress & address,
PSafetyMode mode = PSafeReference
);
/**Find a registered endpoint given its raw alias address.
*/
virtual PSafePtr<H323RegisteredEndPoint> FindEndPointByAliasAddress(
const H225_AliasAddress & alias,
PSafetyMode mode = PSafeReadWrite
);
/**Find a registered endpoint given its simple alias string.
*/
virtual PSafePtr<H323RegisteredEndPoint> FindEndPointByAliasString(
const PString & alias,
PSafetyMode mode = PSafeReference
);
/**Find the first registered endpoint given a partial alias string.
*/
virtual PSafePtr<H323RegisteredEndPoint> FindEndPointByPartialAlias(
const PString & alias,
PSafetyMode mode = PSafeReference
);
/**Find the first registered endpoint given a number prefix string.
*/
virtual PSafePtr<H323RegisteredEndPoint> FindEndPointByPrefixString(
const PString & prefix,
PSafetyMode mode = PSafeReference
);
/**Get first endpoint for enumeration.
*/
PSafePtr<H323RegisteredEndPoint> GetFirstEndPoint(
PSafetyMode mode = PSafeReference
) { return PSafePtr<H323RegisteredEndPoint>(byIdentifier, mode); }
//@}
PSafePtr<H323RegisteredEndPoint> FindDestinationEndPoint(
const OpalGloballyUniqueID & id,
H323GatekeeperCall::Direction direction
);
/**@name Call Operations */
//@{
/**Handle an admission ARQ PDU.
The default behaviour verifies that the call is allowed by the policies
the gatekeeper server requires, then attempts to look up the required
signal address for the call. It also manages bandwidth allocations.
*/
virtual H323GatekeeperRequest::Response OnAdmission(
H323GatekeeperARQ & request
);
/**Handle a disengage DRQ PDU.
The default behaviour finds the call by its id provided in the DRQ and
removes it from the gatekeeper server database.
*/
virtual H323GatekeeperRequest::Response OnDisengage(
H323GatekeeperDRQ & request
);
/**Handle a bandwidth BRQ PDU.
The default behaviour finds the call and does some checks then calls
the H323GatekeeperCall function of the same name.
*/
virtual H323GatekeeperRequest::Response OnBandwidth(
H323GatekeeperBRQ & request
);
/**Create a new call object.
The user woiuld not usually use this function as it is used internally
by the server when new calls (ARQ) are made.
However, a user may override this function to create objects that are
user defined descendants of H323GatekeeperCall so the user can
maintain extra information on a call by call basis.
*/
virtual H323GatekeeperCall * CreateCall(
const OpalGloballyUniqueID & callIdentifier,
H323GatekeeperCall::Direction direction
);
/** Called whenever a new call is started
*/
virtual void AddCall(H323GatekeeperCall *)
{ }
/** Called whenever call is ended. By default, removes the call from the call list
*/
virtual void RemoveCall(
H323GatekeeperCall * call
);
/**Find the call given the identifier.
*/
virtual PSafePtr<H323GatekeeperCall> FindCall(
const PString & description,
PSafetyMode mode = PSafeReference
);
/**Find the call given the identifier.
*/
virtual PSafePtr<H323GatekeeperCall> FindCall(
const OpalGloballyUniqueID & callIdentifier,
PBoolean answeringCall,
PSafetyMode mode = PSafeReference
);
/**Find the call given the identifier.
*/
virtual PSafePtr<H323GatekeeperCall> FindCall(
const OpalGloballyUniqueID & callIdentifier,
H323GatekeeperCall::Direction direction,
PSafetyMode mode = PSafeReference
);
/**Get first endpoint for enumeration.
*/
PSafePtr<H323GatekeeperCall> GetFirstCall(
PSafetyMode mode = PSafeReference
) { return PSafePtr<H323GatekeeperCall>(activeCalls, mode); }
//@}
/**@name Routing operations */
//@{
/**Handle a location LRQ PDU.
The default behaviour just uses TranslateAliasAddressToSignalAddress to
determine the endpoints location.
It is expected that a user would override this function to implement
application specified look up algorithms.
*/
virtual H323GatekeeperRequest::Response OnLocation(
H323GatekeeperLRQ & request
);
/**Translate a given alias to an alias set and signal address.
This is called by the OnAdmission() handler to fill in the ACF
or OnLocation() to fill the LCF informing the calling endpoint where
to actually connect to.
It is expected that a user would override this function to implement
application specified look up algorithms.
The default behaviour calls TranslateAliasAddressToSignalAddress() which
is provided only for backwards compatibility.
*/
virtual PBoolean TranslateAliasAddress(
const H225_AliasAddress & alias,
H225_ArrayOf_AliasAddress & aliases,
H323TransportAddress & address,
PBoolean & isGkRouted,
H323GatekeeperCall * call
);
/**Translate a given alias to a signal address.
This is called by the OnAdmission() handler to fill in the ACF
or OnLocation() to fill the LCF informing the calling endpoint where
to actually connect to.
It is expected that a user would override this function to implement
application specified look up algorithms.
The default behaviour checks the isGatekeeperRouted and if true simply
returns the gatekeepers associated endpoints (not registered endpoint,
but real H323EndPoint) listening address.
If isGatekeeperRouted is false then it looks up the registered
endpoints by alias and uses the saved signal address in the database.
If the alias is not registered then the address parameter is not
changed and the function returns true if it is a valid address, false
if it was empty.
*/
virtual PBoolean TranslateAliasAddressToSignalAddress(
const H225_AliasAddress & alias,
H323TransportAddress & address
);
//@}
/**@name Policy operations */
//@{
/**Check the signal address against the security policy.
This validates that the specified endpoint is allowed to make a
connection to or from the specified signal address.
It is expected that a user would override this function to implement
application specified security policy algorithms.
The default behaviour simply returns true.
*/
virtual PBoolean CheckSignalAddressPolicy(
const H323RegisteredEndPoint & ep,
const H225_AdmissionRequest & arq,
const H323TransportAddress & address
);
/**Check the alias address against the security policy.
This validates that the specified endpoint is allowed to make a
connection to or from the specified alias address.
It is expected that a user would override this function to implement
application specified security policy algorithms.
The default behaviour checks the canOnlyAnswerRegisteredEP or
canOnlyCallRegisteredEP meber variables depending on if it is an
incoming call and if that is true only allows the call to proceed
if the alias is also registered with the gatekeeper.
*/
virtual PBoolean CheckAliasAddressPolicy(
const H323RegisteredEndPoint & ep,
const H225_AdmissionRequest & arq,
const H225_AliasAddress & alias
);
/**Check the alias address against the security policy.
This validates that the specified endpoint is allowed to make a
connection to or from the specified simple alias string.
It is expected that a user would override this function to implement
application specified security policy algorithms.
The default behaviour checks the canOnlyAnswerRegisteredEP or
canOnlyCallRegisteredEP meber variables depending on if it is an
incoming call and if that is true only allows the call to proceed
if the alias is also registered with the gatekeeper.
*/
virtual PBoolean CheckAliasStringPolicy(
const H323RegisteredEndPoint & ep,
const H225_AdmissionRequest & arq,
const PString & alias
);
/**Allocate or change the bandwidth being used.
This function modifies the total bandwidth used by the all endpoints
registered with this gatekeeper. It is called when ARQ or BRQ PDU's are
received.
*/
virtual unsigned AllocateBandwidth(
unsigned newBandwidth,
unsigned oldBandwidth = 0
);
//@}
/**@name Security and authentication functions */
//@{
/**Get separate H.235 authentication for the connection.
This allows an individual ARQ to override the authentical credentials
used in H.235 based RAS for this particular connection.
A return value of false indicates to use the default credentials of the
endpoint, while true indicates that new credentials are to be used.
The default behavour does nothing and returns false.
*/
virtual PBoolean GetAdmissionRequestAuthentication(
H323GatekeeperARQ & info, ///< ARQ being constructed
H235Authenticators & authenticators ///< New authenticators for ARQ
);
/**Get password for user if H.235 security active.
Returns true if user is found and password returned. Note the password
may be empty in which case the user was found but explicitly ddoes not
require security, possibly overriding the requireH235 flag.
*/
virtual PBoolean GetUsersPassword(
const PString & alias,
PString & password,
H323RegisteredEndPoint & registeredEndpoint
) const;
virtual PBoolean GetUsersPassword(
const PString & alias,
PString & password
) const;
//@}
#if OPAL_H501
/**@name H.323 Annex G Peer Element support */
//@{
/**Get the associated peer element for the gatekeeper.
*/
H323PeerElement * GetPeerElement() const { return peerElement; }
/**Set the associated peer element for the gatekeeper.
The existing peer element is automatically deleted.
*/
void SetPeerElement(
H323PeerElement * newPeerElement
);
/**Create an associated peer element for the gatekeeper.
The existing peer element is checked to be listening on the same
interface as specified and if it is not it is changed to the specified
address.
*/
void CreatePeerElement(
const H323TransportAddress & h501Interface
);
/**Create a new Peer Element and establish a service relationship.
If append is false, the existing peer element is automatically deleted
and recreated. If append is true then a new service relationship is
added to the existing peer element.
*/
PBoolean OpenPeerElement(
const H323TransportAddress & remotePeer,
PBoolean append = false,
PBoolean keepTrying = true
);
//@}
#endif
/**@name Access functions */
//@{
/**Get the identifier name for this gatekeeper.
*/
const PString & GetGatekeeperIdentifier() const { return gatekeeperIdentifier; }
/**Set the identifier name for this gatekeeper.
If adjustListeners is true then all gatekeeper listeners that are
attached to this gatekeeper server have their identifier names changed
as well.
*/
void SetGatekeeperIdentifier(
const PString & id,
PBoolean adjustListeners = true
);
/**Get the total bandwidth available in 100's of bits per second.
*/
unsigned GetAvailableBandwidth() const { return totalBandwidth; }
/**Set the total bandwidth available in 100's of bits per second.
*/
void SetAvailableBandwidth(unsigned bps100) { totalBandwidth = bps100; }
/**Get the total bandwidth used in 100's of bits per second.
*/
unsigned GetUsedBandwidth() const { return usedBandwidth; }
/**Get the default bandwidth for calls.
*/
unsigned GetDefaultBandwidth() const { return defaultBandwidth; }
/**Get the default time to live for new registered endpoints.
*/
unsigned GetTimeToLive() const { return defaultTimeToLive; }
/**Set the default time to live for new registered endpoints.
*/
void SetTimeToLive(unsigned seconds) { defaultTimeToLive = seconds; }
/**Get the default time for monitoring calls via IRR.
*/
unsigned GetInfoResponseRate() const { return defaultInfoResponseRate; }
/**Set the default time for monitoring calls via IRR.
*/
void SetInfoResponseRate(unsigned seconds) { defaultInfoResponseRate = seconds; }
/**Get flag for is gatekeeper routed.
*/
PBoolean IsGatekeeperRouted() const { return isGatekeeperRouted; }
/**Get flag for if H.235 authentication is required.
*/
PBoolean IsRequiredH235() const { return requireH235; }
/**Get the currently active registration count.
*/
unsigned GetActiveRegistrations() const { return byIdentifier.GetSize(); }
/**Get the peak registration count.
*/
unsigned GetPeakRegistrations() const { return peakRegistrations; }
/**Get the total registrations since start up.
*/
unsigned GetTotalRegistrations() const { return totalRegistrations; }
/**Get the total registrations rejected since start up.
*/
unsigned GetRejectedRegistrations() const { return rejectedRegistrations; }
/**Get the currently active call count.
*/
unsigned GetActiveCalls() const { return activeCalls.GetSize(); }
/**Get the peak calls count.
*/
unsigned GetPeakCalls() const { return peakCalls; }
/**Get the total calls since start up.
*/
unsigned GetTotalCalls() const { return totalCalls; }
/**Get the total calls rejected since start up.
*/
unsigned GetRejectedCalls() const { return rejectedCalls; }
//@}
// Remove an alias from the server database.
void RemoveAlias(
H323RegisteredEndPoint & ep,
const PString & alias
);
// called when an endpoint needs to send a descriptor to the H.501 peer element
virtual PBoolean OnSendDescriptorForEndpoint(
H323RegisteredEndPoint & /*ep*/, ///< endpoint
H225_ArrayOf_AliasAddress & /*aliases*/, ///< aliases for the enndpoint
H225_EndpointType & /*terminalType*/, ///< terminal type
H225_ArrayOf_AliasAddress & /*transportAddresses*/ ///< transport addresses
)
{ return true; }
virtual PBoolean AllowDuplicateAlias(const H225_ArrayOf_AliasAddress & /*aliases*/)
{ return canHaveDuplicateAlias; }
virtual PBoolean OnSendFeatureSet(unsigned, H225_FeatureSet & features) const;
virtual void OnReceiveFeatureSet(unsigned, const H225_FeatureSet & features) const;
protected:
PDECLARE_NOTIFIER(PThread, H323GatekeeperServer, MonitorMain);
// Configuration & policy variables
PString gatekeeperIdentifier;
unsigned totalBandwidth;
unsigned usedBandwidth;
unsigned defaultBandwidth;
unsigned maximumBandwidth;
unsigned defaultTimeToLive;
unsigned defaultInfoResponseRate;
PBoolean overwriteOnSameSignalAddress;
PBoolean canHaveDuplicateAlias;
PBoolean canHaveDuplicatePrefix;
PBoolean canOnlyCallRegisteredEP;
PBoolean canOnlyAnswerRegisteredEP;
PBoolean answerCallPreGrantedARQ;
PBoolean makeCallPreGrantedARQ;
PBoolean isGatekeeperRouted;
PBoolean aliasCanBeHostName;
PBoolean requireH235;
PBoolean disengageOnHearbeatFail;
PStringToString passwords;
// Dynamic variables
PMutex mutex;
time_t identifierBase;
unsigned nextIdentifier;
PThread * monitorThread;
PSyncPoint monitorExit;
PLIST(ListenerList, H323GatekeeperListener);
ListenerList listeners;
#if OPAL_H501
H323PeerElement * peerElement;
#endif
PSafeDictionary<PString, H323RegisteredEndPoint> byIdentifier;
class StringMap : public PString {
PCLASSINFO(StringMap, PString);
public:
StringMap(const PString & from, const PString & id)
: PString(from), identifier(id) { }
PString identifier;
};
PSortedStringList byAddress;
PSortedStringList byAlias;
PSortedStringList byVoicePrefix;
PSafeSortedList<H323GatekeeperCall> activeCalls;
PINDEX peakRegistrations;
PINDEX totalRegistrations;
PINDEX rejectedRegistrations;
PINDEX peakCalls;
PINDEX totalCalls;
PINDEX rejectedCalls;
friend class H323GatekeeperRRQ;
friend class H323GatekeeperARQ;
};
#endif // OPAL_H323
#endif // OPAL_H323_GKSERVER_H
/////////////////////////////////////////////////////////////////////////////
|