FreeCalypso > hg > themwi-system-sw
diff utils/sip-out-test.c @ 52:ffb563a17f23
wrote sip-out-test program
author | Mychaela Falconia <falcon@freecalypso.org> |
---|---|
date | Thu, 08 Sep 2022 00:27:48 -0800 |
parents | |
children |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/utils/sip-out-test.c Thu Sep 08 00:27:48 2022 -0800 @@ -0,0 +1,260 @@ +/* + * This program is a contraption for testing manually constructed + * outgoing SIP calls to BulkVS. + */ + +#include <sys/types.h> +#include <sys/socket.h> +#include <sys/time.h> +#include <sys/errno.h> +#include <netinet/in.h> +#include <arpa/inet.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <strings.h> +#include <unistd.h> + +#define MAX_SIP_TX_PACKET 1472 + +static struct in_addr local_ip, remote_ip; +static unsigned local_sip_port, local_rtp_port, remote_port; +static char *invite_filename, *log_filename; +static char invite_packet[MAX_SIP_TX_PACKET]; +static unsigned invite_packet_len; +static FILE *logF; +static struct timeval curtime; + +static void +read_invite_file() +{ + FILE *inf; + char linebuf[128], *cp, *dp; + int lineno; + unsigned size_accum, linelen; + + inf = fopen(invite_filename, "r"); + if (!inf) { + perror(invite_filename); + exit(1); + } + size_accum = 0; + dp = invite_packet; + for (lineno = 1; fgets(linebuf, sizeof(linebuf), inf); lineno++) { + cp = index(linebuf, '\n'); + if (!cp) { + fprintf(stderr, + "%s line %d: too long or missing newline\n", + invite_filename, lineno); + exit(1); + } + *cp = '\0'; + linelen = cp - linebuf; + if (size_accum + linelen + 2 > MAX_SIP_TX_PACKET) { + fprintf(stderr, "%s line %d: packet overflow\n", + invite_filename, lineno); + exit(1); + } + bcopy(linebuf, dp, linelen); + dp += linelen; + *dp++ = '\r'; + *dp++ = '\n'; + size_accum += linelen + 2; + } + fclose(inf); + if (!size_accum) { + fprintf(stderr, "error: %s is empty\n", invite_filename); + exit(1); + } + invite_packet_len = size_accum; +} + +static void +log_common(msg, msglen, sin, dir, outf) + char *msg, *dir; + unsigned msglen; + struct sockaddr_in *sin; + FILE *outf; +{ + unsigned sec, ms; + + sec = curtime.tv_sec % 86400; + ms = curtime.tv_usec / 1000; + fprintf(outf, "Msg %s %s:%u %u bytes %02u:%02u:%02u.%03u\n", dir, + inet_ntoa(sin->sin_addr), ntohs(sin->sin_port), msglen, + sec / 3600, (sec / 60) % 60, sec % 60, ms); + fwrite(msg, 1, msglen, outf); + putc('\n', outf); + fflush(outf); +} + +static void +log_sip_msg_rx(msg, msglen, sin) + char *msg; + unsigned msglen; + struct sockaddr_in *sin; +{ + log_common(msg, msglen, sin, "from", stdout); + if (logF) + log_common(msg, msglen, sin, "from", logF); +} + +static void +log_sip_msg_tx(msg, msglen, sin) + char *msg; + unsigned msglen; + struct sockaddr_in *sin; +{ + log_common(msg, msglen, sin, "to", stdout); + if (logF) + log_common(msg, msglen, sin, "to", logF); +} + +main(argc, argv) + char **argv; +{ + struct sockaddr_in sin_local, sin_rtp, sin_rtcp, sin_remote, sin_rx; + int sock_sip, sock_rtp, sock_rtcp, max_fd; + socklen_t addrlen; + fd_set fds; + char recv_buf[4096]; + int rc; + + /* grok command line arguments */ + if (argc < 7 || argc > 8) { + fprintf(stderr, +"usage: %s local-ip local-sip local-rtp remote-ip remote-sip inv-file [logfile]\n", + argv[0]); + exit(1); + } + local_ip.s_addr = inet_addr(argv[1]); + if (local_ip.s_addr == INADDR_NONE) { + fprintf(stderr, "error: invalid IP address \"%s\"\n", argv[1]); + exit(1); + } + local_sip_port = atoi(argv[2]); + local_rtp_port = atoi(argv[3]); + remote_ip.s_addr = inet_addr(argv[4]); + if (remote_ip.s_addr == INADDR_NONE) { + fprintf(stderr, "error: invalid IP address \"%s\"\n", argv[4]); + exit(1); + } + remote_port = atoi(argv[5]); + invite_filename = argv[6]; + log_filename = argv[7]; + /* fill sin structures */ + sin_local.sin_family = AF_INET; + sin_local.sin_addr = local_ip; + sin_local.sin_port = htons(local_sip_port); + sin_rtp.sin_family = AF_INET; + sin_rtp.sin_addr = local_ip; + sin_rtp.sin_port = htons(local_rtp_port); + sin_rtcp.sin_family = AF_INET; + sin_rtcp.sin_addr = local_ip; + sin_rtcp.sin_port = htons(local_rtp_port+1); + sin_remote.sin_family = AF_INET; + sin_remote.sin_addr = remote_ip; + sin_remote.sin_port = htons(remote_port); + /* create and bind sockets */ + sock_sip = socket(AF_INET, SOCK_DGRAM, 0); + if (sock_sip < 0) { + perror("socket"); + exit(1); + } + rc = bind(sock_sip, (struct sockaddr *) &sin_local, + sizeof(struct sockaddr_in)); + if (rc < 0) { + perror("bind"); + exit(1); + } + sock_rtp = socket(AF_INET, SOCK_DGRAM, 0); + if (sock_rtp < 0) { + perror("socket"); + exit(1); + } + rc = bind(sock_rtp, (struct sockaddr *) &sin_rtp, + sizeof(struct sockaddr_in)); + if (rc < 0) { + perror("bind"); + exit(1); + } + sock_rtcp = socket(AF_INET, SOCK_DGRAM, 0); + if (sock_rtcp < 0) { + perror("socket"); + exit(1); + } + rc = bind(sock_rtcp, (struct sockaddr *) &sin_rtcp, + sizeof(struct sockaddr_in)); + if (rc < 0) { + perror("bind"); + exit(1); + } + /* read the INVITE packet */ + read_invite_file(); + /* open the log file, if we have one */ + if (log_filename) { + logF = fopen(log_filename, "a"); + if (!logF) { + perror(log_filename); + exit(1); + } + } + /* now get down to business */ + max_fd = sock_sip; + if (sock_rtp > max_fd) + max_fd = sock_rtp; + if (sock_rtcp > max_fd) + max_fd = sock_rtcp; + addrlen = sizeof(struct sockaddr_in); + rc = sendto(sock_sip, invite_packet, invite_packet_len, 0, + (struct sockaddr *) &sin_remote, addrlen); + if (rc < 0) { + perror("sendto"); + exit(1); + } + gettimeofday(&curtime, 0); + log_sip_msg_tx(invite_packet, invite_packet_len, &sin_remote); + /* main select loop */ + for (;;) { + FD_ZERO(&fds); + FD_SET(sock_sip, &fds); + FD_SET(sock_rtp, &fds); + FD_SET(sock_rtcp, &fds); + rc = select(max_fd+1, &fds, 0, 0, 0); + if (rc < 0) { + if (errno == EINTR) + continue; + perror("select"); + exit(1); + } + gettimeofday(&curtime, 0); + if (FD_ISSET(sock_sip, &fds)) { + addrlen = sizeof(struct sockaddr_in); + rc = recvfrom(sock_sip, recv_buf, sizeof recv_buf, 0, + (struct sockaddr *) &sin_rx, &addrlen); + if (rc < 0) { + perror("recvfrom"); + exit(1); + } + log_sip_msg_rx(recv_buf, rc, &sin_rx); + } + if (FD_ISSET(sock_rtp, &fds)) { + addrlen = sizeof(struct sockaddr_in); + rc = recvfrom(sock_rtp, recv_buf, sizeof recv_buf, 0, + (struct sockaddr *) &sin_rx, &addrlen); + if (rc < 0) { + perror("recvfrom"); + exit(1); + } + } + if (FD_ISSET(sock_rtcp, &fds)) { + addrlen = sizeof(struct sockaddr_in); + rc = recvfrom(sock_rtp, recv_buf, sizeof recv_buf, 0, + (struct sockaddr *) &sin_rx, &addrlen); + if (rc < 0) { + perror("recvfrom"); + exit(1); + } + } + } +}