summaryrefslogtreecommitdiff
path: root/net/sipsak
diff options
context:
space:
mode:
authordrochner <drochner>2005-08-11 17:58:33 +0000
committerdrochner <drochner>2005-08-11 17:58:33 +0000
commit4436db5d1f63fd0c0a91b2b2874e51c9c951e54a (patch)
treeda4ce0e5610b01a5cb93402d3b270773d2bca70b /net/sipsak
parent94f2898fc3a9bd23efe74cf16dfd8a0d3bebf8e4 (diff)
downloadpkgsrc-4436db5d1f63fd0c0a91b2b2874e51c9c951e54a.tar.gz
import sipsak-0.9.1, a commandline SIP tester, based on the work of
Georg Schwarz in pkgsrc-wip
Diffstat (limited to 'net/sipsak')
-rw-r--r--net/sipsak/DESCR3
-rw-r--r--net/sipsak/Makefile15
-rw-r--r--net/sipsak/PLIST3
-rw-r--r--net/sipsak/distinfo6
-rw-r--r--net/sipsak/patches/patch-aa148
5 files changed, 175 insertions, 0 deletions
diff --git a/net/sipsak/DESCR b/net/sipsak/DESCR
new file mode 100644
index 00000000000..3b9e28310e8
--- /dev/null
+++ b/net/sipsak/DESCR
@@ -0,0 +1,3 @@
+sipsak is a small comand line tool for developers and administrators of
+Session Initiation Protocol (SIP) applications. It can be used for some
+simple tests on SIP applications and devices.
diff --git a/net/sipsak/Makefile b/net/sipsak/Makefile
new file mode 100644
index 00000000000..d78039107a9
--- /dev/null
+++ b/net/sipsak/Makefile
@@ -0,0 +1,15 @@
+# $NetBSD: Makefile,v 1.1.1.1 2005/08/11 17:58:33 drochner Exp $
+#
+
+DISTNAME= sipsak-0.9.1
+CATEGORIES= net comms
+MASTER_SITES= http://download.berlios.de/sipsak/
+
+MAINTAINER= schwarz@NetBSD.org
+HOMEPAGE= http://sipsak.org/
+COMMENT= Command-line SIP testing utility
+
+GNU_CONFIGURE= yes
+
+.include "../../security/openssl/buildlink3.mk"
+.include "../../mk/bsd.pkg.mk"
diff --git a/net/sipsak/PLIST b/net/sipsak/PLIST
new file mode 100644
index 00000000000..1472a8d3c5f
--- /dev/null
+++ b/net/sipsak/PLIST
@@ -0,0 +1,3 @@
+@comment $NetBSD: PLIST,v 1.1.1.1 2005/08/11 17:58:33 drochner Exp $
+bin/sipsak
+man/man1/sipsak.1
diff --git a/net/sipsak/distinfo b/net/sipsak/distinfo
new file mode 100644
index 00000000000..247c85bd04e
--- /dev/null
+++ b/net/sipsak/distinfo
@@ -0,0 +1,6 @@
+$NetBSD: distinfo,v 1.1.1.1 2005/08/11 17:58:33 drochner Exp $
+
+SHA1 (sipsak-0.9.1.tar.gz) = e4039b51708194d504618b059b41e074f2533f77
+RMD160 (sipsak-0.9.1.tar.gz) = 48d2f49344406cdb874b847d6a7e958a977aaf3b
+Size (sipsak-0.9.1.tar.gz) = 144812 bytes
+SHA1 (patch-aa) = 9c332267bd199920a3e22914997bec77164183aa
diff --git a/net/sipsak/patches/patch-aa b/net/sipsak/patches/patch-aa
new file mode 100644
index 00000000000..a418eda77e8
--- /dev/null
+++ b/net/sipsak/patches/patch-aa
@@ -0,0 +1,148 @@
+$NetBSD: patch-aa,v 1.1.1.1 2005/08/11 17:58:33 drochner Exp $
+
+--- shoot.c.orig 2005-07-29 01:04:15.000000000 +0200
++++ shoot.c
+@@ -340,7 +340,7 @@ int recv_message(char *buf, int size) {
+ #endif
+ *(buf+ ret) = '\0';
+ if (ret > 0) {
+- if (!inv_trans && (regexec(&proexp, rec, 0, 0, 0) != REG_NOERROR)) {
++ if (!inv_trans && (regexec(&proexp, rec, 0, 0, 0) != 0)) {
+ retryAfter = SIP_T1;
+ }
+ /* store the biggest delay if one occured */
+@@ -407,7 +407,7 @@ void handle_3xx(struct sockaddr_in *tadr
+ /* we'll try to handle 301 and 302 here, other 3xx are to complex */
+ regcomp(&redexp, "^SIP/[0-9]\\.[0-9] 30[125] ",
+ REG_EXTENDED|REG_NOSUB|REG_ICASE);
+- if (regexec(&redexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&redexp, rec, 0, 0, 0) == 0) {
+ /* try to find the contact in the redirect */
+ contact = uri_from_contact(rec);
+ if (contact==NULL) {
+@@ -451,7 +451,7 @@ void trace_reply()
+ {
+ char *contact;
+
+- if (regexec(&tmhexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&tmhexp, rec, 0, 0, 0) == 0) {
+ /* we received 483 to many hops */
+ printf("%i: ", namebeg);
+ if (verbose > 2) {
+@@ -470,7 +470,7 @@ void trace_reply()
+ set_maxforw(req, namebeg);
+ return;
+ }
+- else if (regexec(&proexp, rec, 0, 0, 0) == REG_NOERROR) {
++ else if (regexec(&proexp, rec, 0, 0, 0) == 0) {
+ /* we received a provisional response */
+ printf("%i: ", namebeg);
+ if (verbose > 2) {
+@@ -504,7 +504,7 @@ void trace_reply()
+ else {
+ printf("\twithout Contact header\n");
+ }
+- if (regexec(&okexp, rec, 0, 0, 0) == REG_NOERROR)
++ if (regexec(&okexp, rec, 0, 0, 0) == 0)
+ on_success(rec);
+ else
+ exit_code(1);
+@@ -516,7 +516,7 @@ void handle_default()
+ {
+ /* in the normal send and reply case anything other
+ then 1xx will be treated as final response*/
+- if (regexec(&proexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&proexp, rec, 0, 0, 0) == 0) {
+ if (verbose > 1) {
+ printf("%s\n\n", rec);
+ printf("** reply received ");
+@@ -564,7 +564,7 @@ void handle_default()
+ else if (timing) {
+ printf("%.3f ms\n", deltaT(&firstsendt, &recvtime));
+ }
+- if (regexec(&okexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&okexp, rec, 0, 0, 0) == 0) {
+ on_success(rec);
+ }
+ else {
+@@ -578,7 +578,7 @@ void handle_randtrash()
+ {
+ /* in randomzing trash we are expexting 4?? error codes
+ everything else should not be normal */
+- if (regexec(&errexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&errexp, rec, 0, 0, 0) == 0) {
+ if (verbose > 2)
+ printf("received:\n%s\n", rec);
+ if (verbose > 1) {
+@@ -620,7 +620,7 @@ void handle_usrloc()
+ char *crlf;
+ char ruri[11+12+20]; //FIXME: username length 20 should be dynamic
+
+- if (regexec(&proexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&proexp, rec, 0, 0, 0) == 0) {
+ if (verbose > 2) {
+ print_message_line(rec);
+ printf("ignoring provisional response\n\n");
+@@ -638,7 +638,7 @@ void handle_usrloc()
+ case REG_REP:
+ /* we have sent a register and look
+ at the response now */
+- if (regexec(&okexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&okexp, rec, 0, 0, 0) == 0) {
+ if (verbose > 1) {
+ printf ("\tOK\n");
+ }
+@@ -748,7 +748,7 @@ void handle_usrloc()
+ dontsend=1;
+ return;
+ }
+- if (regexec(&okexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&okexp, rec, 0, 0, 0) == 0) {
+ if (verbose > 1) {
+ printf("\t200 OK received\n");
+ }
+@@ -891,7 +891,7 @@ void handle_usrloc()
+ dontsend=1;
+ return;
+ }
+- if (regexec(&okexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&okexp, rec, 0, 0, 0) == 0) {
+ if (verbose > 1) {
+ printf(" reply received\n\n");
+ }
+@@ -986,7 +986,7 @@ void handle_usrloc()
+ dontsend=1;
+ return;
+ }
+- if (regexec(&okexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (regexec(&okexp, rec, 0, 0, 0) == 0) {
+ if (verbose > 1) {
+ printf(" OK\n\n");
+ }
+@@ -1313,7 +1313,7 @@ void shoot(char *buf, int buff_size)
+ }
+ /* send ACK for non-provisional reply on INVITE */
+ if ((STRNCASECMP(req, "INVITE", 6)==0) &&
+- (regexec(&replyexp, rec, 0, 0, 0) == REG_NOERROR) &&
++ (regexec(&replyexp, rec, 0, 0, 0) == 0) &&
+ (regexec(&proexp, rec, 0, 0, 0) == REG_NOMATCH)) {
+ build_ack(req, rec);
+ dontsend = 0;
+@@ -1331,7 +1331,7 @@ void shoot(char *buf, int buff_size)
+ dontsend = 1;
+ continue;
+ }
+- else if (regexec(&authexp, rec, 0, 0, 0) == REG_NOERROR) {
++ else if (regexec(&authexp, rec, 0, 0, 0) == 0) {
+ if (!username) {
+ printf("%s\nerror: received 401 but cannot "
+ "authentication without a username\n", rec);
+@@ -1346,7 +1346,7 @@ void shoot(char *buf, int buff_size)
+ continue;
+ } /* if auth...*/
+ /* lets see if received a redirect */
+- if (redirects == 1 && regexec(&redexp, rec, 0, 0, 0) == REG_NOERROR) {
++ if (redirects == 1 && regexec(&redexp, rec, 0, 0, 0) == 0) {
+ handle_3xx(&addr);
+ } /* if redircts... */
+ else if (trace == 1) {