daily pastebin goal
18%
SHARE
TWEET

Untitled

a guest Sep 7th, 2014 266 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. tport.c:2773 tport_wakeup() tport_wakeup(0x9f65a48): events IN
  2. tport.c:2864 tport_recv_event() tport_recv_event(0x9f65a48)
  3. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f65a48): tls_read() returned 1307
  4. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f65a48) msg 0xa03b3c8 from (tls/c1.c1.c1.c1:49339) has 1307 bytes, veclen = 1
  5. recv 1307 bytes from tls/[c1.c1.c1.c1]:49339 at 11:04:05.808701:
  6.    ------------------------------------------------------------------------
  7.    INVITE sip:104@my,domain.com SIP/2.0
  8.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-6663a736b6027a60-1---d8754z-;rport
  9.    Max-Forwards: 70
  10.    Contact: <sip:103@c1.c1.c1.c1:49339;transport=TLS>
  11.    To: "104"<sip:104@my,domain.com>
  12.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  13.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  14.    CSeq: 1 INVITE
  15.    Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
  16.    Content-Type: application/sdp
  17.    User-Agent: eyeBeam release 1102u stamp 52345
  18.    Content-Length: 754
  19.    
  20.    v=0
  21.    o=- 3 2 IN IP4 c1.c1.c1.c1
  22.    s=CounterPath eyeBeam 1.5
  23.    c=IN IP4 c1.c1.c1.c1
  24.    t=0 0
  25.    m=audio 49858 RTP/SAVP 107 119 100 0 97 8 102 18 101
  26.    a=alt:1 4 : LKnb5Jkg MBxm3FDS 192.168.17.1 49858
  27.    a=alt:2 3 : sCJloN7Y w/8dGHZ7 192.168.18.1 49858
  28.    a=alt:3 2 : 9xdoqAEz 9GnryPnD 10.42.152.228 49858
  29.    a=alt:4 1 : j0l+Ht3+ 4YdGrcPQ c1.c1.c1.c1 49858
  30.    a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:xwefCFqWRQwh8hPnYQkNpUKN24acattNRPmnx57t
  31.    a=crypto:2 AES_CM_128_HMAC_SHA1_32 inline:2QgH9sg2Ohn0BAi9Hn7GjdAygTg5HWQW3ZftsMPS
  32.    a=fmtp:18 annexb=yes
  33.    a=fmtp:101 0-15
  34.    a=rtpmap:107 BV32/16000
  35.    a=rtpmap:119 BV32-FEC/16000
  36.    a=rtpmap:100 SPEEX/16000
  37.    a=rtpmap:97 SPEEX/8000
  38.    a=rtpmap:102 L16/16000
  39.    a=rtpmap:18 G729/8000
  40.    a=rtpmap:101 telephone-event/8000
  41.    a=sendrecv
  42.    ------------------------------------------------------------------------
  43. tport.c:3023 tport_deliver() tport_deliver(0x9f65a48): msg 0xa03b3c8 (1307 bytes) from tls/c1.c1.c1.c1:49339/sips next=(nil)
  44. nta.c:2880 agent_recv_request() nta: received INVITE sip:104@my,domain.com SIP/2.0 (CSeq 1)
  45. nta.c:3085 agent_recv_request() nta: INVITE (1) going to a default leg
  46. nta.c:1350 set_timeout() nta: timer set to 2000 ms
  47. nua_server.c:102 nua_stack_process_request() nua: nua_stack_process_request: entering
  48. nua_stack.c:899 nh_create() nua: nh_create: entering
  49. nua_common.c:108 nh_create_handle() nua: nh_create_handle: entering
  50. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  51. soa.c:280 soa_clone() soa_clone(static::0x9f9e3f8, 0x9f9da40, 0xa1ee6e8) called
  52. soa.c:403 soa_set_params() soa_set_params(static::0xa099308, ...) called
  53. nta.c:4415 nta_leg_tcreate() nta_leg_tcreate(0xa0c9870)
  54. soa.c:1302 soa_init_offer_answer() soa_init_offer_answer(static::0xa099308) called
  55. soa.c:1171 soa_set_remote_sdp() soa_set_remote_sdp(static::0xa099308, (nil), 0xa366621, 754) called
  56. nua_dialog.c:338 nua_dialog_usage_add() nua(0xa1ee6e8): adding session usage
  57. tport.c:3257 tport_tsend() tport_tsend(0x9f65a48) tpn = TLS/c1.c1.c1.c1:49339
  58. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36b048 121 (121)
  59. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa3664eb 55 (55)
  60. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa3664c7 36 (36)
  61. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa366522 71 (71)
  62. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36b0c1 101 (101)
  63. tport.c:3594 tport_vsend() tport_vsend(0x9f65a48): 384 bytes of 384 to tls/c1.c1.c1.c1:49339
  64. tport.c:3492 tport_send_msg() tport_vsend returned 384
  65. send 384 bytes to tls/[c1.c1.c1.c1]:49339 at 11:04:05.812102:
  66.    ------------------------------------------------------------------------
  67.    SIP/2.0 100 Trying
  68.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-6663a736b6027a60-1---d8754z-;rport=49339
  69.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  70.    To: "104"<sip:104@my,domain.com>
  71.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  72.    CSeq: 1 INVITE
  73.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  74.    Content-Length: 0
  75.    
  76.    ------------------------------------------------------------------------
  77. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  78. nta.c:6789 incoming_reply() nta: sent 100 Trying for INVITE (1)
  79. nua_stack.c:271 nua_stack_event() nua(0xa1ee6e8): event i_invite 100 Trying
  80. nua_session.c:4137 signal_call_state_change() nua(0xa1ee6e8): call state changed: init -> received, received offer
  81. soa.c:1098 soa_get_remote_sdp() soa_get_remote_sdp(static::0xa099308, [0xb61bec6c], [0xb61bec70], [(nil)]) called
  82. nua_stack.c:271 nua_stack_event() nua(0xa1ee6e8): event i_state 100 Trying
  83. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  84. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  85. nua.c:342 nua_handle_bind() nua: nua_handle_bind: entering
  86. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  87. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  88. nua.c:879 nua_respond() nua: nua_respond: entering
  89. nua_stack.c:529 nua_signal() nua(0xa1ee6e8): sent signal r_respond
  90. 2014-09-07 11:04:05.843947 [WARNING] sofia_reg.c:1663 SIP auth challenge (INVITE) on sofia profile 'internal' for [104@my,domain.com] from ip c1.c1.c1.c1
  91. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  92. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  93. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  94. nua_stack.c:573 nua_stack_signal() nua(0xa1ee6e8): recv signal r_respond 407 Proxy Authentication Required
  95. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  96. soa.c:403 soa_set_params() soa_set_params(static::0xa099308, ...) called
  97. nua_session.c:2318 nua_invite_server_respond() nua: nua_invite_server_respond: entering
  98. soa.c:1214 soa_clear_remote_sdp() soa_clear_remote_sdp(static::0xa099308) called
  99. tport.c:3257 tport_tsend() tport_tsend(0x9f65a48) tpn = TLS/c1.c1.c1.c1:49339
  100. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa3699e0 144 (144)
  101. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa3664eb 55 (55)
  102. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa369a70 55 (55)
  103. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa366522 71 (71)
  104. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa369aa7 566 (566)
  105. tport.c:3594 tport_vsend() tport_vsend(0x9f65a48): 891 bytes of 891 to tls/c1.c1.c1.c1:49339
  106. tport.c:3492 tport_send_msg() tport_vsend returned 891
  107. send 891 bytes to tls/[c1.c1.c1.c1]:49339 at 11:04:05.863807:
  108.    ------------------------------------------------------------------------
  109.    SIP/2.0 407 Proxy Authentication Required
  110.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-6663a736b6027a60-1---d8754z-;rport=49339
  111.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  112.    To: "104" <sip:104@my,domain.com>;tag=5N9H61ZXSSeDB
  113.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  114.    CSeq: 1 INVITE
  115.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  116.    Accept: application/sdp
  117.    Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  118.    Supported: timer, path, replaces
  119.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  120.    Proxy-Authenticate: Digest realm="my,domain.com", nonce="27fbcef8-365d-11e4-a762-f79c1e799a68", algorithm=MD5, qop="auth"
  121.    Content-Length: 0
  122.    
  123.    ------------------------------------------------------------------------
  124. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  125. nta.c:6789 incoming_reply() nta: sent 407 Proxy Authentication Required for INVITE (1)
  126. nua_dialog.c:397 nua_dialog_usage_remove_at() nua(0xa1ee6e8): removing session usage
  127. nua_session.c:4137 signal_call_state_change() nua(0xa1ee6e8): call state changed: received -> terminated
  128. nua_stack.c:271 nua_stack_event() nua(0xa1ee6e8): event i_state 407 Proxy Authentication Required
  129. nua_stack.c:271 nua_stack_event() nua(0xa1ee6e8): event i_terminated 407 Proxy Authentication Required
  130. soa.c:356 soa_destroy() soa_destroy(static::0xa099308) called
  131. nta.c:4468 nta_leg_destroy() nta_leg_destroy(0xa0c9870)
  132. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  133. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  134. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  135. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  136. tport.c:2773 tport_wakeup() tport_wakeup(0x9f65a48): events IN
  137. tport.c:2864 tport_recv_event() tport_recv_event(0x9f65a48)
  138. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f65a48): tls_read() returned 331
  139. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f65a48) msg 0x9f90ea0 from (tls/c1.c1.c1.c1:49339) has 331 bytes, veclen = 1
  140. recv 331 bytes from tls/[c1.c1.c1.c1]:49339 at 11:04:06.040766:
  141.    ------------------------------------------------------------------------
  142.    ACK sip:104@my,domain.com SIP/2.0
  143.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-6663a736b6027a60-1---d8754z-;rport
  144.    To: "104" <sip:104@my,domain.com>;tag=5N9H61ZXSSeDB
  145.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  146.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  147.    CSeq: 1 ACK
  148.    Content-Length: 0
  149.    
  150.    ------------------------------------------------------------------------
  151. tport.c:3023 tport_deliver() tport_deliver(0x9f65a48): msg 0x9f90ea0 (331 bytes) from tls/c1.c1.c1.c1:49339/sips next=(nil)
  152. nta.c:2880 agent_recv_request() nta: received ACK sip:104@my,domain.com SIP/2.0 (CSeq 1)
  153. nta.c:3019 agent_recv_request() nta: ACK (1) is going to INVITE (1)
  154. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  155. tport.c:2773 tport_wakeup() tport_wakeup(0x9f65a48): events IN
  156. tport.c:2864 tport_recv_event() tport_recv_event(0x9f65a48)
  157. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f65a48): tls_read() returned 1571
  158. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f65a48) msg 0x9f90ea0 from (tls/c1.c1.c1.c1:49339) has 1571 bytes, veclen = 1
  159. recv 1571 bytes from tls/[c1.c1.c1.c1]:49339 at 11:04:06.041120:
  160.    ------------------------------------------------------------------------
  161.    INVITE sip:104@my,domain.com SIP/2.0
  162.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-af29d2649a65ca62-1---d8754z-;rport
  163.    Max-Forwards: 70
  164.    Contact: <sip:103@c1.c1.c1.c1:49339;transport=TLS>
  165.    To: "104"<sip:104@my,domain.com>
  166.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  167.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  168.    CSeq: 2 INVITE
  169.    Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
  170.    Content-Type: application/sdp
  171.    Proxy-Authorization: Digest username="103",realm="my,domain.com",nonce="27fbcef8-365d-11e4-a762-f79c1e799a68",uri="sip:104@my,domain.com",response="0464674d7a3aa9df30764e1319ca4672",cnonce="0ddb4773a5228c5d933aa0932b5d0808",nc=00000001,qop=auth,algorithm=MD5
  172.    User-Agent: eyeBeam release 1102u stamp 52345
  173.    Content-Length: 754
  174.    
  175.    v=0
  176.    o=- 3 2 IN IP4 c1.c1.c1.c1
  177.    s=CounterPath eyeBeam 1.5
  178.    c=IN IP4 c1.c1.c1.c1
  179.    t=0 0
  180.    m=audio 49858 RTP/SAVP 107 119 100 0 97 8 102 18 101
  181.    a=alt:1 4 : LKnb5Jkg MBxm3FDS 192.168.17.1 49858
  182.    a=alt:2 3 : sCJloN7Y w/8dGHZ7 192.168.18.1 49858
  183.    a=alt:3 2 : 9xdoqAEz 9GnryPnD 10.42.152.228 49858
  184.    a=alt:4 1 : j0l+Ht3+ 4YdGrcPQ c1.c1.c1.c1 49858
  185.    a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:xwefCFqWRQwh8hPnYQkNpUKN24acattNRPmnx57t
  186.    a=crypto:2 AES_CM_128_HMAC_SHA1_32 inline:2QgH9sg2Ohn0BAi9Hn7GjdAygTg5HWQW3ZftsMPS
  187.    a=fmtp:18 annexb=yes
  188.    a=fmtp:101 0-15
  189.    a=rtpmap:107 BV32/16000
  190.    a=rtpmap:119 BV32-FEC/16000
  191.    a=rtpmap:100 SPEEX/16000
  192.    a=rtpmap:97 SPEEX/8000
  193.    a=rtpmap:102 L16/16000
  194.    a=rtpmap:18 G729/8000
  195.    a=rtpmap:101 telephone-event/8000
  196.    a=sendrecv
  197.    ------------------------------------------------------------------------
  198. tport.c:3023 tport_deliver() tport_deliver(0x9f65a48): msg 0x9f90ea0 (1571 bytes) from tls/c1.c1.c1.c1:49339/sips next=(nil)
  199. nta.c:2880 agent_recv_request() nta: received INVITE sip:104@my,domain.com SIP/2.0 (CSeq 2)
  200. nta.c:3085 agent_recv_request() nta: INVITE (2) going to a default leg
  201. nua_server.c:102 nua_stack_process_request() nua: nua_stack_process_request: entering
  202. nua_stack.c:899 nh_create() nua: nh_create: entering
  203. nua_common.c:108 nh_create_handle() nua: nh_create_handle: entering
  204. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  205. soa.c:280 soa_clone() soa_clone(static::0x9f9e3f8, 0x9f9da40, 0xa162c88) called
  206. soa.c:403 soa_set_params() soa_set_params(static::0xa1a6540, ...) called
  207. nta.c:4415 nta_leg_tcreate() nta_leg_tcreate(0xa36be80)
  208. soa.c:1302 soa_init_offer_answer() soa_init_offer_answer(static::0xa1a6540) called
  209. soa.c:1171 soa_set_remote_sdp() soa_set_remote_sdp(static::0xa1a6540, (nil), 0xa36b1f9, 754) called
  210. nua_dialog.c:338 nua_dialog_usage_add() nua(0xa162c88): adding session usage
  211. tport.c:3257 tport_tsend() tport_tsend(0x9f65a48) tpn = TLS/c1.c1.c1.c1:49339
  212. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa386d60 121 (121)
  213. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36afbb 55 (55)
  214. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36af97 36 (36)
  215. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36aff2 71 (71)
  216. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa386dd9 101 (101)
  217. tport.c:3594 tport_vsend() tport_vsend(0x9f65a48): 384 bytes of 384 to tls/c1.c1.c1.c1:49339
  218. tport.c:3492 tport_send_msg() tport_vsend returned 384
  219. send 384 bytes to tls/[c1.c1.c1.c1]:49339 at 11:04:06.043203:
  220.    ------------------------------------------------------------------------
  221.    SIP/2.0 100 Trying
  222.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-af29d2649a65ca62-1---d8754z-;rport=49339
  223.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  224.    To: "104"<sip:104@my,domain.com>
  225.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  226.    CSeq: 2 INVITE
  227.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  228.    Content-Length: 0
  229.    
  230.    ------------------------------------------------------------------------
  231. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  232. nta.c:6789 incoming_reply() nta: sent 100 Trying for INVITE (2)
  233. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_invite 100 Trying
  234. nua_session.c:4137 signal_call_state_change() nua(0xa162c88): call state changed: init -> received, received offer
  235. soa.c:1098 soa_get_remote_sdp() soa_get_remote_sdp(static::0xa1a6540, [0xb61bec6c], [0xb61bec70], [(nil)]) called
  236. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_state 100 Trying
  237. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  238. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  239. nua.c:342 nua_handle_bind() nua: nua_handle_bind: entering
  240. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  241. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  242. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  243. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  244. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  245. nua_common.c:108 nh_create_handle() nua: nh_create_handle: entering
  246. nua.c:342 nua_handle_bind() nua: nua_handle_bind: entering
  247. nua.c:633 nua_invite() nua: nua_invite: entering
  248. nua_stack.c:569 nua_stack_signal() nua(0xa139fc8): recv signal r_invite
  249. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  250. soa.c:280 soa_clone() soa_clone(static::0x9f9e3f8, 0x9f9da40, 0xa139fc8) called
  251. soa.c:403 soa_set_params() soa_set_params(static::0xa0e91c0, ...) called
  252. soa.c:403 soa_set_params() soa_set_params(static::0xa0e91c0, ...) called
  253. soa.c:1052 soa_set_user_sdp() soa_set_user_sdp(static::0xa0e91c0, (nil), 0xa38a384, -1) called
  254. soa.c:890 soa_set_capability_sdp() soa_set_capability_sdp(static::0xa0e91c0, (nil), 0xa38a384, -1) called
  255. nua_dialog.c:338 nua_dialog_usage_add() nua(0xa139fc8): adding session usage
  256. nua_stack.c:529 nua_signal() nua(0xa139fc8): sent signal r_invite
  257. nta.c:4415 nta_leg_tcreate() nta_leg_tcreate(0x9ff4360)
  258. soa.c:1302 soa_init_offer_answer() soa_init_offer_answer(static::0xa0e91c0) called
  259. soa.c:1426 soa_generate_offer() soa_generate_offer(static::0xa0e91c0, 0) called
  260. soa_static.c:1137 offer_answer_step() soa_static_offer_answer_action(0xa0e91c0, soa_generate_offer): called
  261. soa_static.c:1168 offer_answer_step() soa_static(0xa0e91c0, soa_generate_offer): generating local description
  262. soa_static.c:1196 offer_answer_step() soa_static(0xa0e91c0, soa_generate_offer): upgrade with local description
  263. soa_static.c:1020 soa_sdp_mode_set() soa_sdp_mode_set(0xb61bcf0c, (nil), ""): called
  264. soa_static.c:1425 offer_answer_step() soa_static(0xa0e91c0, soa_generate_offer): storing local description
  265. soa.c:1270 soa_get_local_sdp() soa_get_local_sdp(static::0xa0e91c0, [(nil)], [0xb61bf048], [0xb61bf04c]) called
  266. nta.c:2665 nta_tpn_by_url() nta: selecting scheme sip
  267. tport.c:4588 tport_by_name() tport(0x9fa0fd8): found 0x9f91100 by name TLS/c2.c2.c2.c2:31731
  268. tport.c:3257 tport_tsend() tport_tsend(0x9f91100) tpn = TLS/c2.c2.c2.c2:31731
  269. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa35e8a8 0xb5603fe8 946 (946)
  270. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa35e8a8 0xb56043f0 91 (91)
  271. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa35e8a8 0xb56034e8 742 (742)
  272. tport.c:3594 tport_vsend() tport_vsend(0x9f91100): 1779 bytes of 1779 to tls/c2.c2.c2.c2:31731
  273. tport.c:3492 tport_send_msg() tport_vsend returned 1779
  274. send 1779 bytes to tls/[c2.c2.c2.c2]:31731 at 11:04:06.125472:
  275.    ------------------------------------------------------------------------
  276.    INVITE sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff SIP/2.0
  277.    Via: SIP/2.0/TLS s.s.s.s;branch=z9hG4bKUa0jt8XUND88D
  278.    Max-Forwards: 69
  279.    From: "Vaas2" <sip:103@my,domain.com>;tag=77U39Q14KBUjj
  280.    To: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>
  281.    Call-ID: ff821301-b0ff-1232-d990-b798974bb4ea
  282.    CSeq: 64700659 INVITE
  283.    Contact: <sip:mod_sofia@s.s.s.s:5061;transport=tls>
  284.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  285.    Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  286.    Supported: timer, path, replaces
  287.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  288.    Content-Type: application/sdp
  289.    Content-Disposition: session
  290.    Content-Length: 742
  291.    X-FS-Support: update_display,send_info
  292.    Remote-Party-ID: "Vaas2" <sip:103@my,domain.com>;party=calling;screen=yes;privacy=off
  293.    
  294.    v=0
  295.    o=- 3 2 IN IP4 c1.c1.c1.c1
  296.    s=CounterPath eyeBeam 1.5
  297.    c=IN IP4 c1.c1.c1.c1
  298.    t=0 0
  299.    m=audio 49858 RTP/SAVP 107 119 100 0 97 8 102 18 101
  300.    a=rtpmap:107 BV32/16000
  301.    a=rtpmap:119 BV32-FEC/16000
  302.    a=rtpmap:100 SPEEX/16000
  303.    a=rtpmap:97 SPEEX/8000
  304.    a=rtpmap:102 L16/16000
  305.    a=rtpmap:18 G729/8000
  306.    a=fmtp:18 annexb=yes
  307.    a=rtpmap:101 telephone-event/8000
  308.    a=fmtp:101 0-15
  309.    a=alt:1 4 : LKnb5Jkg MBxm3FDS 192.168.17.1 49858
  310.    a=alt:2 3 : sCJloN7Y w/8dGHZ7 192.168.18.1 49858
  311.    a=alt:3 2 : 9xdoqAEz 9GnryPnD 10.42.152.228 49858
  312.    a=alt:4 1 : j0l+Ht3+ 4YdGrcPQ c1.c1.c1.c1 49858
  313.    a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:xwefCFqWRQwh8hPnYQkNpUKN24acattNRPmnx57t
  314.    a=crypto:2 AES_CM_128_HMAC_SHA1_32 inline:2QgH9sg2Ohn0BAi9Hn7GjdAygTg5HWQW3ZftsMPS
  315.    ------------------------------------------------------------------------
  316. tport.c:2296 tport_set_secondary_timer() tport(0x9f91100): reset timer
  317. nta.c:8302 outgoing_send() nta: sent INVITE (64700659) to TLS/c2.c2.c2.c2:31731
  318. tport.c:4160 tport_pend() tport_pend(0x9f91100): pending 0xb5601340 for tls/c2.c2.c2.c2:31731 (already 0)
  319. nua_session.c:4137 signal_call_state_change() nua(0xa139fc8): call state changed: init -> calling, sent offer
  320. soa.c:1270 soa_get_local_sdp() soa_get_local_sdp(static::0xa0e91c0, [0xb61bf044], [0xb61bf048], [(nil)]) called
  321. nua_stack.c:269 nua_stack_event() nua(0xa139fc8): event i_state INVITE sent
  322. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  323. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  324. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  325. tport.c:2773 tport_wakeup() tport_wakeup(0x9f91100): events IN
  326. tport.c:2864 tport_recv_event() tport_recv_event(0x9f91100)
  327. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f91100): tls_read() returned 307
  328. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f91100) msg 0xb5601df0 from (tls/c2.c2.c2.c2:31731) has 307 bytes, veclen = 1
  329. recv 307 bytes from tls/[c2.c2.c2.c2]:31731 at 11:04:06.424877:
  330.    ------------------------------------------------------------------------
  331.    SIP/2.0 100 Trying
  332.    Via: SIP/2.0/TLS s.s.s.s;branch=z9hG4bKUa0jt8XUND88D
  333.    To: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>
  334.    From: "Vaas2" <sip:103@my,domain.com>;tag=77U39Q14KBUjj
  335.    Call-ID: ff821301-b0ff-1232-d990-b798974bb4ea
  336.    CSeq: 64700659 INVITE
  337.    Content-Length: 0
  338.    
  339.    ------------------------------------------------------------------------
  340. tport.c:3023 tport_deliver() tport_deliver(0x9f91100): msg 0xb5601df0 (307 bytes) from tls/c2.c2.c2.c2:31731/sips next=(nil)
  341. nta.c:3297 agent_recv_response() nta: received 100 Trying for INVITE (64700659)
  342. nta.c:3364 agent_recv_response() nta: 100 Trying is going to a transaction
  343. nta.c:9562 outgoing_estimate_delay() nta_outgoing: RTT is 299.49 ms
  344. tport.c:4222 tport_release() tport_release(0x9f91100): 0xb5601340 by 0xb56037d8 with 0xb5601df0 (preliminary)
  345. tport.c:2296 tport_set_secondary_timer() tport(0x9f91100): reset timer
  346. tport.c:2773 tport_wakeup() tport_wakeup(0x9f91100): events IN
  347. tport.c:2864 tport_recv_event() tport_recv_event(0x9f91100)
  348. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f91100): tls_read() returned 449
  349. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f91100) msg 0xb5601df0 from (tls/c2.c2.c2.c2:31731) has 449 bytes, veclen = 1
  350. recv 449 bytes from tls/[c2.c2.c2.c2]:31731 at 11:04:06.497499:
  351.    ------------------------------------------------------------------------
  352.    SIP/2.0 180 Ringing
  353.    Via: SIP/2.0/TLS s.s.s.s;branch=z9hG4bKUa0jt8XUND88D
  354.    Contact: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>
  355.    To: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>;tag=526db868
  356.    From: "Vaas2"<sip:103@my,domain.com>;tag=77U39Q14KBUjj
  357.    Call-ID: ff821301-b0ff-1232-d990-b798974bb4ea
  358.    CSeq: 64700659 INVITE
  359.    User-Agent: eyeBeam release 1102u stamp 52345
  360.    Content-Length: 0
  361.    
  362.    ------------------------------------------------------------------------
  363. tport.c:3023 tport_deliver() tport_deliver(0x9f91100): msg 0xb5601df0 (449 bytes) from tls/c2.c2.c2.c2:31731/sips next=(nil)
  364. nta.c:3297 agent_recv_response() nta: received 180 Ringing for INVITE (64700659)
  365. nta.c:3364 agent_recv_response() nta: 180 Ringing is going to a transaction
  366. tport.c:4222 tport_release() tport_release(0x9f91100): 0xb5601340 by 0xb56037d8 with 0xb5601df0 (preliminary)
  367. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event r_invite 180 Ringing
  368. nua_session.c:4137 signal_call_state_change() nua(0xa139fc8): call state changed: calling -> proceeding
  369. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event i_state 180 Ringing
  370. tport.c:2296 tport_set_secondary_timer() tport(0x9f91100): reset timer
  371. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  372. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  373. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  374. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  375. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  376. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  377. nua.c:879 nua_respond() nua: nua_respond: entering
  378. nua_stack.c:529 nua_signal() nua(0xa162c88): sent signal r_respond
  379. nua_stack.c:573 nua_stack_signal() nua(0xa162c88): recv signal r_respond 180 Ringing
  380. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  381. soa.c:403 soa_set_params() soa_set_params(static::0xa1a6540, ...) called
  382. nua_session.c:2318 nua_invite_server_respond() nua: nua_invite_server_respond: entering
  383. tport.c:3257 tport_tsend() tport_tsend(0x9f65a48) tpn = TLS/c1.c1.c1.c1:49339
  384. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb5607be8 122 (122)
  385. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36afbb 55 (55)
  386. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb5607c62 55 (55)
  387. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36aff2 71 (71)
  388. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb5607c99 590 (590)
  389. tport.c:3594 tport_vsend() tport_vsend(0x9f65a48): 893 bytes of 893 to tls/c1.c1.c1.c1:49339
  390. tport.c:3492 tport_send_msg() tport_vsend returned 893
  391. send 893 bytes to tls/[c1.c1.c1.c1]:49339 at 11:04:06.509132:
  392.    ------------------------------------------------------------------------
  393.    SIP/2.0 180 Ringing
  394.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-af29d2649a65ca62-1---d8754z-;rport=49339
  395.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  396.    To: "104" <sip:104@my,domain.com>;tag=6y2a8vg1p24Zp
  397.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  398.    CSeq: 2 INVITE
  399.    Contact: <sip:104@s.s.s.s:5061;transport=tls>
  400.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  401.    Accept: application/sdp
  402.    Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  403.    Supported: timer, path, replaces
  404.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  405.    Content-Length: 0
  406.    Remote-Party-ID: "Outbound Call" <sip:104@my,domain.com>;party=calling;privacy=off;screen=no
  407.    
  408.    ------------------------------------------------------------------------
  409. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  410. nta.c:6789 incoming_reply() nta: sent 180 Ringing for INVITE (2)
  411. nua_session.c:4137 signal_call_state_change() nua(0xa162c88): call state changed: received -> early
  412. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_state 180 Ringing
  413. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  414. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  415. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  416. nta.c:5823 incoming_reclaim_queued() incoming_reclaim_all((nil), (nil), 0xb61bf160)
  417. nta.c:7186 _nta_incoming_timer() nta_incoming_timer: 0/0 resent, 0/0 tout, 0/0 term, 1/2 free
  418. nta.c:1296 agent_timer() nta: timer set next to 58698 ms
  419. tport.c:2773 tport_wakeup() tport_wakeup(0x9f91100): events IN
  420. tport.c:2864 tport_recv_event() tport_recv_event(0x9f91100)
  421. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f91100): tls_read() returned 1200
  422. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f91100) msg 0xb5605400 from (tls/c2.c2.c2.c2:31731) has 1200 bytes, veclen = 1
  423. recv 1200 bytes from tls/[c2.c2.c2.c2]:31731 at 11:04:11.732157:
  424.    ------------------------------------------------------------------------
  425.    SIP/2.0 200 OK
  426.    Via: SIP/2.0/TLS s.s.s.s;branch=z9hG4bKUa0jt8XUND88D
  427.    Contact: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>
  428.    To: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>;tag=526db868
  429.    From: "Vaas2"<sip:103@my,domain.com>;tag=77U39Q14KBUjj
  430.    Call-ID: ff821301-b0ff-1232-d990-b798974bb4ea
  431.    CSeq: 64700659 INVITE
  432.    Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
  433.    Content-Type: application/sdp
  434.    User-Agent: eyeBeam release 1102u stamp 52345
  435.    Content-Length: 640
  436.    
  437.    v=0
  438.    o=- 5 2 IN IP4 c2.c2.c2.c2
  439.    s=CounterPath eyeBeam 1.5
  440.    c=IN IP4 c2.c2.c2.c2
  441.    t=0 0
  442.    m=audio 6880 RTP/SAVP 107 119 100 0 97 8 18 101
  443.    a=alt:1 4 : o8X2/f3G dz7uvJmG 192.168.2.1 6880
  444.    a=alt:2 3 : 4BipZSSH wN7BejnM 192.168.152.1 6880
  445.    a=alt:3 2 : aivX2vMD Q2iKkG8g 192.168.216.1 6880
  446.    a=alt:4 1 : qhGnaO+Z 1Wtenrwp c2.c2.c2.c2 6880
  447.    a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:3JqwUBnrG6FWCrmsm8+7tzBPh60VoUdjsvgxNXM5
  448.    a=fmtp:18 annexb=yes
  449.    a=fmtp:101 0-15
  450.    a=rtpmap:107 BV32/16000
  451.    a=rtpmap:119 BV32-FEC/16000
  452.    a=rtpmap:100 SPEEX/16000
  453.    a=rtpmap:97 SPEEX/8000
  454.    a=rtpmap:18 G729/8000
  455.    a=rtpmap:101 telephone-event/8000
  456.    a=sendrecv
  457.    ------------------------------------------------------------------------
  458. tport.c:3023 tport_deliver() tport_deliver(0x9f91100): msg 0xb5605400 (1200 bytes) from tls/c2.c2.c2.c2:31731/sips next=(nil)
  459. nta.c:3297 agent_recv_response() nta: received 200 OK for INVITE (64700659)
  460. nta.c:3364 agent_recv_response() nta: 200 OK is going to a transaction
  461. tport.c:4222 tport_release() tport_release(0x9f91100): 0xb5601340 by 0xb56037d8 with 0xb5605400
  462. nta.c:1348 set_timeout() nta: timer shortened to 32000 ms
  463. soa.c:1171 soa_set_remote_sdp() soa_set_remote_sdp(static::0xa0e91c0, (nil), 0xb5604828, 640) called
  464. soa.c:1595 soa_process_answer() soa_process_answer(static::0xa0e91c0) called
  465. soa_static.c:1137 offer_answer_step() soa_static_offer_answer_action(0xa0e91c0, soa_process_answer): called
  466. soa_static.c:1020 soa_sdp_mode_set() soa_sdp_mode_set(0xb5602728, 0xb560a550, ""): called
  467. soa_static.c:1283 offer_answer_step() soa_static(0xa0e91c0, soa_process_answer): upgrade codecs with remote description
  468. soa_static.c:1425 offer_answer_step() soa_static(0xa0e91c0, soa_process_answer): storing local description
  469. soa.c:1730 soa_activate() soa_activate(static::0xa0e91c0, (nil)) called
  470. nua_session.c:988 nua_session_client_response() nua(0xa139fc8): INVITE: processed SDP answer in 200 OK
  471. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event r_invite 200 OK
  472. nua_session.c:4137 signal_call_state_change() nua(0xa139fc8): call state changed: proceeding -> completing, received answer
  473. soa.c:1098 soa_get_remote_sdp() soa_get_remote_sdp(static::0xa0e91c0, [0xb61bea9c], [0xb61beaa0], [(nil)]) called
  474. soa.c:616 soa_get_params() soa_get_params(static::0xa0e91c0, ...) called
  475. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event i_state 200 OK
  476. tport.c:2296 tport_set_secondary_timer() tport(0x9f91100): reset timer
  477. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  478. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  479. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  480. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  481. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  482. nua.c:639 nua_ack() nua: nua_ack: entering
  483. nua_stack.c:529 nua_signal() nua(0xa139fc8): sent signal r_ack
  484. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  485. nua_stack.c:569 nua_stack_signal() nua(0xa139fc8): recv signal r_ack
  486. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  487. soa.c:403 soa_set_params() soa_set_params(static::0xa0e91c0, ...) called
  488. soa.c:1730 soa_activate() soa_activate(static::0xa0e91c0, (nil)) called
  489. nta.c:2665 nta_tpn_by_url() nta: selecting scheme sip
  490. tport.c:4588 tport_by_name() tport(0x9fa0fd8): found 0x9f91100 by name TLS/c2.c2.c2.c2:31731
  491. tport.c:3257 tport_tsend() tport_tsend(0x9f91100) tpn = TLS/c2.c2.c2.c2:31731
  492. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa35e8a8 0xb560de70 457 (457)
  493. tport.c:3594 tport_vsend() tport_vsend(0x9f91100): 457 bytes of 457 to tls/c2.c2.c2.c2:31731
  494. tport.c:3492 tport_send_msg() tport_vsend returned 457
  495. send 457 bytes to tls/[c2.c2.c2.c2]:31731 at 11:04:11.733695:
  496.    ------------------------------------------------------------------------
  497.    ACK sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff SIP/2.0
  498.    Via: SIP/2.0/TLS s.s.s.s;branch=z9hG4bKvKSBv3eZjpyUS
  499.    Max-Forwards: 70
  500.    From: "Vaas2" <sip:103@my,domain.com>;tag=77U39Q14KBUjj
  501.    To: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>;tag=526db868
  502.    Call-ID: ff821301-b0ff-1232-d990-b798974bb4ea
  503.    CSeq: 64700659 ACK
  504.    Contact: <sip:mod_sofia@s.s.s.s:5061;transport=tls>
  505.    Content-Length: 0
  506.    
  507.    ------------------------------------------------------------------------
  508. tport.c:2296 tport_set_secondary_timer() tport(0x9f91100): reset timer
  509. nta.c:8302 outgoing_send() nta: sent ACK (64700659) to TLS/c2.c2.c2.c2:31731
  510. nua_session.c:4137 signal_call_state_change() nua(0xa139fc8): call state changed: completing -> ready
  511. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event i_state 200 ACK sent
  512. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event i_active 200 Call active
  513. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  514. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  515. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  516. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  517. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  518. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  519. nua.c:879 nua_respond() nua: nua_respond: entering
  520. nua_stack.c:529 nua_signal() nua(0xa162c88): sent signal r_respond
  521. nua_stack.c:573 nua_stack_signal() nua(0xa162c88): recv signal r_respond 200 OK
  522. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  523. soa.c:403 soa_set_params() soa_set_params(static::0xa1a6540, ...) called
  524. soa.c:1052 soa_set_user_sdp() soa_set_user_sdp(static::0xa1a6540, (nil), 0xa369b0f, -1) called
  525. soa.c:890 soa_set_capability_sdp() soa_set_capability_sdp(static::0xa1a6540, (nil), 0xa369b0f, -1) called
  526. nua_session.c:2318 nua_invite_server_respond() nua: nua_invite_server_respond: entering
  527. soa.c:1515 soa_generate_answer() soa_generate_answer(static::0xa1a6540) called
  528. soa_static.c:1137 offer_answer_step() soa_static_offer_answer_action(0xa1a6540, soa_generate_answer): called
  529. soa_static.c:1168 offer_answer_step() soa_static(0xa1a6540, soa_generate_answer): generating local description
  530. soa_static.c:1209 offer_answer_step() soa_static(0xa1a6540, soa_generate_answer): upgrade with remote description
  531. soa_static.c:1020 soa_sdp_mode_set() soa_sdp_mode_set(0xb61bcf9c, 0xa3861f8, ""): called
  532. soa_static.c:1425 offer_answer_step() soa_static(0xa1a6540, soa_generate_answer): storing local description
  533. soa.c:1730 soa_activate() soa_activate(static::0xa1a6540, (nil)) called
  534. soa.c:1270 soa_get_local_sdp() soa_get_local_sdp(static::0xa1a6540, [(nil)], [0xb61bf0c8], [0xb61bf0cc]) called
  535. tport.c:3257 tport_tsend() tport_tsend(0x9f65a48) tpn = TLS/c1.c1.c1.c1:49339
  536. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb560e278 117 (117)
  537. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36afbb 55 (55)
  538. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb560e2ed 55 (55)
  539. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xa36aff2 71 (71)
  540. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb560e324 628 (628)
  541. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb5615b98 628 (628)
  542. tport.c:3594 tport_vsend() tport_vsend(0x9f65a48): 1554 bytes of 1554 to tls/c1.c1.c1.c1:49339
  543. tport.c:3492 tport_send_msg() tport_vsend returned 1554
  544. send 1554 bytes to tls/[c1.c1.c1.c1]:49339 at 11:04:11.752349:
  545.    ------------------------------------------------------------------------
  546.    SIP/2.0 200 OK
  547.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-af29d2649a65ca62-1---d8754z-;rport=49339
  548.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  549.    To: "104" <sip:104@my,domain.com>;tag=6y2a8vg1p24Zp
  550.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  551.    CSeq: 2 INVITE
  552.    Contact: <sip:104@s.s.s.s:5061;transport=tls>
  553.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  554.    Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  555.    Supported: timer, path, replaces
  556.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  557.    Content-Type: application/sdp
  558.    Content-Disposition: session
  559.    Content-Length: 628
  560.    Remote-Party-ID: "Outbound Call" <sip:104@my,domain.com>;party=calling;privacy=off;screen=no
  561.    
  562.    v=0
  563.    o=- 5 2 IN IP4 c2.c2.c2.c2
  564.    s=CounterPath eyeBeam 1.5
  565.    c=IN IP4 c2.c2.c2.c2
  566.    t=0 0
  567.    m=audio 6880 RTP/SAVP 107 119 100 0 97 8 18 101
  568.    a=rtpmap:107 BV32/16000
  569.    a=rtpmap:119 BV32-FEC/16000
  570.    a=rtpmap:100 SPEEX/16000
  571.    a=rtpmap:97 SPEEX/8000
  572.    a=rtpmap:18 G729/8000
  573.    a=fmtp:18 annexb=yes
  574.    a=rtpmap:101 telephone-event/8000
  575.    a=fmtp:101 0-15
  576.    a=alt:1 4 : o8X2/f3G dz7uvJmG 192.168.2.1 6880
  577.    a=alt:2 3 : 4BipZSSH wN7BejnM 192.168.152.1 6880
  578.    a=alt:3 2 : aivX2vMD Q2iKkG8g 192.168.216.1 6880
  579.    a=alt:4 1 : qhGnaO+Z 1Wtenrwp c2.c2.c2.c2 6880
  580.    a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:3JqwUBnrG6FWCrmsm8+7tzBPh60VoUdjsvgxNXM5
  581.    ------------------------------------------------------------------------
  582. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  583. nta.c:6789 incoming_reply() nta: sent 200 OK for INVITE (2)
  584. nta.c:1348 set_timeout() nta: timer shortened to 500 ms
  585. nua_session.c:4137 signal_call_state_change() nua(0xa162c88): call state changed: early -> completed, sent answer
  586. soa.c:1270 soa_get_local_sdp() soa_get_local_sdp(static::0xa1a6540, [0xb61bf154], [0xb61bf158], [(nil)]) called
  587. soa.c:616 soa_get_params() soa_get_params(static::0xa1a6540, ...) called
  588. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_state 200 OK
  589. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  590. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  591. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  592. tport.c:2773 tport_wakeup() tport_wakeup(0x9f65a48): events IN
  593. tport.c:2864 tport_recv_event() tport_recv_event(0x9f65a48)
  594. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f65a48): tls_read() returned 730
  595. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f65a48) msg 0xb5600500 from (tls/c1.c1.c1.c1:49339) has 730 bytes, veclen = 1
  596. recv 730 bytes from tls/[c1.c1.c1.c1]:49339 at 11:04:12.046672:
  597.    ------------------------------------------------------------------------
  598.    ACK sip:104@s.s.s.s:5061;transport=tls SIP/2.0
  599.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-b869bc2d287cff28-1---d8754z-;rport
  600.    Max-Forwards: 70
  601.    Contact: <sip:103@c1.c1.c1.c1:49339;transport=TLS>
  602.    To: "104"<sip:104@my,domain.com>;tag=6y2a8vg1p24Zp
  603.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  604.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  605.    CSeq: 2 ACK
  606.    Proxy-Authorization: Digest username="103",realm="my,domain.com",nonce="27fbcef8-365d-11e4-a762-f79c1e799a68",uri="sip:104@my,domain.com",response="0464674d7a3aa9df30764e1319ca4672",cnonce="0ddb4773a5228c5d933aa0932b5d0808",nc=00000001,qop=auth,algorithm=MD5
  607.    User-Agent: eyeBeam release 1102u stamp 52345
  608.    Content-Length: 0
  609.    
  610.    ------------------------------------------------------------------------
  611. tport.c:3023 tport_deliver() tport_deliver(0x9f65a48): msg 0xb5600500 (730 bytes) from tls/c1.c1.c1.c1:49339/sips next=(nil)
  612. nta.c:2880 agent_recv_request() nta: received ACK sip:104@s.s.s.s:5061;transport=tls SIP/2.0 (CSeq 2)
  613. nta.c:3019 agent_recv_request() nta: ACK (2) is going to INVITE (2)
  614. nua_session.c:2567 process_ack_or_cancel() nua: process_ack_or_cancel: entering
  615. soa.c:1214 soa_clear_remote_sdp() soa_clear_remote_sdp(static::0xa1a6540) called
  616. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_ack 200 OK
  617. nua_session.c:4137 signal_call_state_change() nua(0xa162c88): call state changed: completed -> ready
  618. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_state 200 OK
  619. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_active 200 Call active
  620. nta.c:5742 incoming_free() nta: incoming_free(0xa17cf58)
  621. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  622. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  623. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  624. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  625. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  626. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  627. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  628. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  629. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  630. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  631. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  632. tport.c:2773 tport_wakeup() tport_wakeup(0x9f91100): events IN
  633. tport.c:2864 tport_recv_event() tport_recv_event(0x9f91100)
  634. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f91100): tls_read() returned 4
  635. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f91100) msg 0xb5600500 from (tls/c2.c2.c2.c2:31731) has 4 bytes, veclen = 1
  636. tport.c:2296 tport_set_secondary_timer() tport(0x9f91100): reset timer
  637. nta.c:1296 agent_timer() nta: timer set next to 31479 ms
  638. tport.c:2773 tport_wakeup() tport_wakeup(0x9f65a48): events IN
  639. tport.c:2864 tport_recv_event() tport_recv_event(0x9f65a48)
  640. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f65a48): tls_read() returned 787
  641. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f65a48) msg 0xb5600758 from (tls/c1.c1.c1.c1:49339) has 787 bytes, veclen = 1
  642. recv 787 bytes from tls/[c1.c1.c1.c1]:49339 at 11:04:22.569412:
  643.    ------------------------------------------------------------------------
  644.    BYE sip:104@s.s.s.s:5061;transport=tls SIP/2.0
  645.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-11774f66fb6de85f-1---d8754z-;rport
  646.    Max-Forwards: 70
  647.    Contact: <sip:103@c1.c1.c1.c1:49339;transport=TLS>
  648.    To: "104"<sip:104@my,domain.com>;tag=6y2a8vg1p24Zp
  649.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  650.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  651.    CSeq: 3 BYE
  652.    Proxy-Authorization: Digest username="103",realm="my,domain.com",nonce="27fbcef8-365d-11e4-a762-f79c1e799a68",uri="sip:104@s.s.s.s:5061;transport=tls",response="d1a6ae31ad82f6fe961c646e3e60c595",cnonce="3289004a8924fdccc008cdc3049746c6",nc=00000002,qop=auth,algorithm=MD5
  653.    User-Agent: eyeBeam release 1102u stamp 52345
  654.    Reason: SIP;description="User Hung Up"
  655.    Content-Length: 0
  656.    
  657.    ------------------------------------------------------------------------
  658. tport.c:3023 tport_deliver() tport_deliver(0x9f65a48): msg 0xb5600758 (787 bytes) from tls/c1.c1.c1.c1:49339/sips next=(nil)
  659. nta.c:2880 agent_recv_request() nta: received BYE sip:104@s.s.s.s:5061;transport=tls SIP/2.0 (CSeq 3)
  660. nta.c:3060 agent_recv_request() nta: BYE (3) going to existing leg
  661. nua_server.c:102 nua_stack_process_request() nua: nua_stack_process_request: entering
  662. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_bye 100 Trying
  663. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  664. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  665. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  666. nua.c:879 nua_respond() nua: nua_respond: entering
  667. nua_stack.c:529 nua_signal() nua(0xa162c88): sent signal r_respond
  668. nua.c:342 nua_handle_bind() nua: nua_handle_bind: entering
  669. nua.c:921 nua_handle_destroy() nua: nua_handle_destroy: entering
  670. nua_stack.c:529 nua_signal() nua(0xa162c88): sent signal r_destroy
  671. nua.c:645 nua_bye() nua: nua_bye: entering
  672. nua_stack.c:529 nua_signal() nua(0xa139fc8): sent signal r_bye
  673. nua_stack.c:573 nua_stack_signal() nua(0xa162c88): recv signal r_respond 200 OK
  674. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  675. soa.c:403 soa_set_params() soa_set_params(static::0xa1a6540, ...) called
  676. tport.c:3257 tport_tsend() tport_tsend(0x9f65a48) tpn = TLS/c1.c1.c1.c1:49339
  677. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb56194d0 117 (117)
  678. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb561318b 55 (55)
  679. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb5613155 54 (54)
  680. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb56131c2 68 (68)
  681. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb5619545 245 (245)
  682. tport.c:3594 tport_vsend() tport_vsend(0x9f65a48): 539 bytes of 539 to tls/c1.c1.c1.c1:49339
  683. tport.c:3492 tport_send_msg() tport_vsend returned 539
  684. send 539 bytes to tls/[c1.c1.c1.c1]:49339 at 11:04:22.572514:
  685.    ------------------------------------------------------------------------
  686.    SIP/2.0 200 OK
  687.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-11774f66fb6de85f-1---d8754z-;rport=49339
  688.    From: "pautina"<sip:103@my,domain.com>;tag=d8195202
  689.    To: "104"<sip:104@my,domain.com>;tag=6y2a8vg1p24Zp
  690.    Call-ID: ZWY1ZmNiMmNkYjdiZWE1YTc2NjY3OTgwYTY1NjNiMjc.
  691.    CSeq: 3 BYE
  692.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  693.    Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  694.    Supported: timer, path, replaces
  695.    Content-Length: 0
  696.    
  697.    ------------------------------------------------------------------------
  698. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  699. nta.c:6789 incoming_reply() nta: sent 200 OK for BYE (3)
  700. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  701. nua_dialog.c:397 nua_dialog_usage_remove_at() nua(0xa162c88): removing session usage
  702. nua_session.c:4137 signal_call_state_change() nua(0xa162c88): call state changed: ready -> terminated
  703. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_state 200 Session Terminated
  704. nua_stack.c:271 nua_stack_event() nua(0xa162c88): event i_terminated 200 Session Terminated
  705. soa.c:356 soa_destroy() soa_destroy(static::0xa1a6540) called
  706. nta.c:4468 nta_leg_destroy() nta_leg_destroy(0xa36be80)
  707. nta.c:5742 incoming_free() nta: incoming_free(0xb5607e60)
  708. nua_stack.c:569 nua_stack_signal() nua(0xa162c88): recv signal r_destroy
  709. nta.c:4468 nta_leg_destroy() nta_leg_destroy((nil))
  710. nua_stack.c:569 nua_stack_signal() nua(0xa139fc8): recv signal r_bye
  711. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  712. soa.c:403 soa_set_params() soa_set_params(static::0xa0e91c0, ...) called
  713. soa.c:1784 soa_terminate() soa_terminate(static::0xa0e91c0) called
  714. soa.c:1302 soa_init_offer_answer() soa_init_offer_answer(static::0xa0e91c0) called
  715. nta.c:2665 nta_tpn_by_url() nta: selecting scheme sip
  716. tport.c:4588 tport_by_name() tport(0x9fa0fd8): found 0x9f91100 by name TLS/c2.c2.c2.c2:31731
  717. tport.c:3257 tport_tsend() tport_tsend(0x9f91100) tpn = TLS/c2.c2.c2.c2:31731
  718. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa35e8a8 0xb560b8c0 721 (721)
  719. tport.c:3594 tport_vsend() tport_vsend(0x9f91100): 721 bytes of 721 to tls/c2.c2.c2.c2:31731
  720. tport.c:3492 tport_send_msg() tport_vsend returned 721
  721. send 721 bytes to tls/[c2.c2.c2.c2]:31731 at 11:04:22.572761:
  722.    ------------------------------------------------------------------------
  723.    BYE sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff SIP/2.0
  724.    Via: SIP/2.0/TLS s.s.s.s;branch=z9hG4bKXvj4XyZ2FZmeN
  725.    Max-Forwards: 70
  726.    From: "Vaas2" <sip:103@my,domain.com>;tag=77U39Q14KBUjj
  727.    To: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>;tag=526db868
  728.    Call-ID: ff821301-b0ff-1232-d990-b798974bb4ea
  729.    CSeq: 64700660 BYE
  730.    Contact: <sip:mod_sofia@s.s.s.s:5061;transport=tls>
  731.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  732.    Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  733.    Supported: timer, path, replaces
  734.    Reason: SIP;description="User Hung Up"
  735.    Content-Length: 0
  736.    
  737.    ------------------------------------------------------------------------
  738. tport.c:2296 tport_set_secondary_timer() tport(0x9f91100): reset timer
  739. nta.c:8302 outgoing_send() nta: sent BYE (64700660) to TLS/c2.c2.c2.c2:31731
  740. tport.c:4160 tport_pend() tport_pend(0x9f91100): pending 0xb5602b10 for tls/c2.c2.c2.c2:31731 (already 0)
  741. tport.c:2773 tport_wakeup() tport_wakeup(0x9f91100): events IN
  742. tport.c:2864 tport_recv_event() tport_recv_event(0x9f91100)
  743. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f91100): tls_read() returned 441
  744. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f91100) msg 0xb5600500 from (tls/c2.c2.c2.c2:31731) has 441 bytes, veclen = 1
  745. recv 441 bytes from tls/[c2.c2.c2.c2]:31731 at 11:04:22.852786:
  746.    ------------------------------------------------------------------------
  747.    SIP/2.0 200 OK
  748.    Via: SIP/2.0/TLS s.s.s.s;branch=z9hG4bKXvj4XyZ2FZmeN
  749.    Contact: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>
  750.    To: <sip:104@c2.c2.c2.c2:31731;transport=TLS;rinstance=3deb17e113dbebff>;tag=526db868
  751.    From: "Vaas2"<sip:103@my,domain.com>;tag=77U39Q14KBUjj
  752.    Call-ID: ff821301-b0ff-1232-d990-b798974bb4ea
  753.    CSeq: 64700660 BYE
  754.    User-Agent: eyeBeam release 1102u stamp 52345
  755.    Content-Length: 0
  756.    
  757.    ------------------------------------------------------------------------
  758. tport.c:3023 tport_deliver() tport_deliver(0x9f91100): msg 0xb5600500 (441 bytes) from tls/c2.c2.c2.c2:31731/sips next=(nil)
  759. nta.c:3297 agent_recv_response() nta: received 200 OK for BYE (64700660)
  760. nta.c:3364 agent_recv_response() nta: 200 OK is going to a transaction
  761. nta.c:9562 outgoing_estimate_delay() nta_outgoing: RTT is 280.094 ms
  762. tport.c:4222 tport_release() tport_release(0x9f91100): 0xb5602b10 by 0xb56194d0 with 0xb5600500
  763. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event r_bye 200 OK
  764. nua_session.c:4137 signal_call_state_change() nua(0xa139fc8): call state changed: terminating -> terminated
  765. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event i_state 200 to BYE
  766. nua_stack.c:271 nua_stack_event() nua(0xa139fc8): event i_terminated 200 to BYE
  767. nua_dialog.c:397 nua_dialog_usage_remove_at() nua(0xa139fc8): removing session usage
  768. soa.c:356 soa_destroy() soa_destroy(static::0xa0e91c0) called
  769. nta.c:4468 nta_leg_destroy() nta_leg_destroy(0x9ff4360)
  770. nua_session.c:351 nua_session_usage_destroy() nua: terminated session 0xa139fc8
  771. nta.c:8720 outgoing_free() nta: outgoing_free(0xb56194d0)
  772. tport.c:2296 tport_set_secondary_timer() tport(0x9f91100): reset timer
  773. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  774. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  775. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  776. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  777. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  778. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  779. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  780. nua.c:342 nua_handle_bind() nua: nua_handle_bind: entering
  781. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  782. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  783. nua.c:921 nua_handle_destroy() nua: nua_handle_destroy: entering
  784. nua_stack.c:529 nua_signal() nua(0xa139fc8): sent signal r_destroy
  785. nua_stack.c:569 nua_stack_signal() nua(0xa139fc8): recv signal r_destroy
  786. nta.c:4468 nta_leg_destroy() nta_leg_destroy((nil))
  787. tport.c:2773 tport_wakeup() tport_wakeup(0x9f65a48): events IN
  788. tport.c:2864 tport_recv_event() tport_recv_event(0x9f65a48)
  789. tport_type_tls.c:434 tport_tls_recv() tport_tls_recv(0x9f65a48): tls_read() returned 820
  790. tport.c:3205 tport_recv_iovec() tport_recv_iovec(0x9f65a48) msg 0xb560dc10 from (tls/c1.c1.c1.c1:49339) has 820 bytes, veclen = 1
  791. recv 820 bytes from tls/[c1.c1.c1.c1]:49339 at 11:04:28.982453:
  792.    ------------------------------------------------------------------------
  793.    REGISTER sip:my,domain.com SIP/2.0
  794.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-790d3d2fa8650d11-1---d8754z-;rport
  795.    Max-Forwards: 70
  796.    Contact: <sip:103@c1.c1.c1.c1:49339;transport=TLS;rinstance=989b7f242db92940>
  797.    To: "pautina"<sip:103@my,domain.com>
  798.    From: "pautina"<sip:103@my,domain.com>;tag=726a8567
  799.    Call-ID: OTNmNDI2MDIwZmZlOGFkNTdlY2UyZDVmZmJiNmIxNGY.
  800.    CSeq: 6 REGISTER
  801.    Expires: 3600
  802.    Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO
  803.    User-Agent: eyeBeam release 1102u stamp 52345
  804.    Authorization: Digest username="103",realm="my,domain.com",nonce="1e4b2250-364e-11e4-a75e-f79c1e799a68",uri="sip:my,domain.com",response="7b39748d7de1f16e6e44c41f64a3d854",cnonce="05cf3ca6d2e832d209362dfc7cf2274b",nc=00000005,qop=auth,algorithm=MD5
  805.    Content-Length: 0
  806.    
  807.    ------------------------------------------------------------------------
  808. tport.c:3023 tport_deliver() tport_deliver(0x9f65a48): msg 0xb560dc10 (820 bytes) from tls/c1.c1.c1.c1:49339/sips next=(nil)
  809. nta.c:2880 agent_recv_request() nta: received REGISTER sip:my,domain.com SIP/2.0 (CSeq 6)
  810. nta.c:3085 agent_recv_request() nta: REGISTER (6) going to a default leg
  811. nua_server.c:102 nua_stack_process_request() nua: nua_stack_process_request: entering
  812. nua_stack.c:899 nh_create() nua: nh_create: entering
  813. nua_common.c:108 nh_create_handle() nua: nh_create_handle: entering
  814. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  815. soa.c:280 soa_clone() soa_clone(static::0x9f9e3f8, 0x9f9da40, 0xb560cf88) called
  816. soa.c:403 soa_set_params() soa_set_params(static::0xb5606320, ...) called
  817. nua_dialog.c:338 nua_dialog_usage_add() nua(0xb560cf88): adding registrar usage
  818. tport.c:4160 tport_pend() tport_pend(0x9f65a48): pending (nil) for tls/c1.c1.c1.c1:49339 (already 0)
  819. nua_stack.c:271 nua_stack_event() nua(0xb560cf88): event i_register 100 Trying
  820. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  821. nua_stack.c:359 nua_application_event() nua: nua_application_event: entering
  822. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  823. nua.c:879 nua_respond() nua: nua_respond: entering
  824. nua_stack.c:529 nua_signal() nua(0xb560cf88): sent signal r_respond
  825. nua.c:921 nua_handle_destroy() nua: nua_handle_destroy: entering
  826. nua_stack.c:529 nua_signal() nua(0xb560cf88): sent signal r_destroy
  827. nua.c:366 nua_handle_magic() nua: nua_handle_magic: entering
  828. nua.c:921 nua_handle_destroy() nua: nua_handle_destroy: entering
  829. nua_stack.c:573 nua_stack_signal() nua(0xb560cf88): recv signal r_respond 200 OK
  830. nua_params.c:480 nua_stack_set_params() nua: nua_stack_set_params: entering
  831. soa.c:403 soa_set_params() soa_set_params(static::0xb5606320, ...) called
  832. tport.c:3257 tport_tsend() tport_tsend(0x9f65a48) tpn = TLS/c1.c1.c1.c1:49339
  833. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb56027f8 117 (117)
  834. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb5603098 55 (55)
  835. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb560286d 59 (59)
  836. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb56030cf 73 (73)
  837. tport_type_tls.c:534 tport_tls_send() tport_tls_writevec: vec 0xa3406b8 0xb56028a8 376 (376)
  838. tport.c:3594 tport_vsend() tport_vsend(0x9f65a48): 680 bytes of 680 to tls/c1.c1.c1.c1:49339
  839. tport.c:3492 tport_send_msg() tport_vsend returned 680
  840. send 680 bytes to tls/[c1.c1.c1.c1]:49339 at 11:04:28.984490:
  841.    ------------------------------------------------------------------------
  842.    SIP/2.0 200 OK
  843.    Via: SIP/2.0/TLS c1.c1.c1.c1:14575;branch=z9hG4bK-d8754z-790d3d2fa8650d11-1---d8754z-;rport=49339
  844.    From: "pautina"<sip:103@my,domain.com>;tag=726a8567
  845.    To: "pautina" <sip:103@my,domain.com>;tag=8gNvBKj8gmH5D
  846.    Call-ID: OTNmNDI2MDIwZmZlOGFkNTdlY2UyZDVmZmJiNmIxNGY.
  847.    CSeq: 6 REGISTER
  848.    Contact: <sip:103@c1.c1.c1.c1:49339;transport=TLS;rinstance=989b7f242db92940>;expires=3600
  849.    Date: Sun, 07 Sep 2014 07:04:28 GMT
  850.    User-Agent: FreeSWITCH-mod_sofia/1.5.14b+git~20140828T171655Z~89b4b0c4ea~32bit
  851.    Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  852.    Supported: timer, path, replaces
  853.    Content-Length: 0
  854.    
  855.    ------------------------------------------------------------------------
  856. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  857. nta.c:6789 incoming_reply() nta: sent 200 OK for REGISTER (6)
  858. nta.c:5742 incoming_free() nta: incoming_free(0xb560c808)
  859. nua_stack.c:569 nua_stack_signal() nua(0xb560cf88): recv signal r_destroy
  860. nua_dialog.c:397 nua_dialog_usage_remove_at() nua(0xb560cf88): removing registrar usage
  861. tport.c:4222 tport_release() tport_release(0x9f65a48): (nil) by 0xb560cf88 with (nil)
  862. tport.c:2296 tport_set_secondary_timer() tport(0x9f65a48): reset timer
  863. nta.c:4468 nta_leg_destroy() nta_leg_destroy((nil))
  864. soa.c:356 soa_destroy() soa_destroy(static::0xb5606320) called
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top