return 1;
e_return:
- ast_log(LOG_ERROR, "error parsing AT result on rfcomm socket");
+ ast_log(LOG_ERROR, "error parsing AT result on rfcomm socket\n");
return res;
}
if (strchr("0123456789*#", tmp) && tmp != '\0') {
user_options.exit = tmp;
} else {
- ast_log(LOG_NOTICE, "Argument for option 'x' must be a valid DTMF digit.");
+ ast_log(LOG_NOTICE, "Argument for option 'x' must be a valid DTMF digit.\n");
}
}
if (strchr("0123456789*#", tmp) && tmp != '\0') {
user_options.cycle = tmp;
} else {
- ast_log(LOG_NOTICE, "Argument for option 'c' must be a valid DTMF digit.");
+ ast_log(LOG_NOTICE, "Argument for option 'c' must be a valid DTMF digit.\n");
}
}
if (strchr("0123456789*#", tmp) && tmp != '\0') {
user_options.exit = tmp;
} else {
- ast_log(LOG_NOTICE, "Argument for option 'x' must be a valid DTMF digit.");
+ ast_log(LOG_NOTICE, "Argument for option 'x' must be a valid DTMF digit.\n");
}
}
if (strchr("0123456789*#", tmp) && tmp != '\0') {
user_options.cycle = tmp;
} else {
- ast_log(LOG_NOTICE, "Argument for option 'c' must be a valid DTMF digit.");
+ ast_log(LOG_NOTICE, "Argument for option 'c' must be a valid DTMF digit.\n");
}
}
execl(path_BIN "ices2", "ices", filename, SENTINEL);
execlp("ices2", "ices", filename, SENTINEL);
- ast_debug(1, "Couldn't find ices version 2, attempting to use ices version 1.");
+ ast_debug(1, "Couldn't find ices version 2, attempting to use ices version 1.\n");
execl(path_LOCAL "ices", "ices", filename, SENTINEL);
execl(path_BIN "ices", "ices", filename, SENTINEL);
h->hangup = 1; /* hangup */
} else {
/* XXX depending on what we are.. */
- ast_log(LOG_NOTICE, "SMS_SUBMIT or SMS_DELIVERY");
+ ast_log(LOG_NOTICE, "SMS_SUBMIT or SMS_DELIVERY\n");
sms_nextoutgoing (h);
}
break;
h->iphasep -= 80;
if (h->ibitn++ == 9) { /* end of byte */
if (!bit) { /* bad stop bit */
- ast_log(LOG_NOTICE, "bad stop bit");
+ ast_log(LOG_NOTICE, "bad stop bit\n");
h->ierr = 0xFF; /* unknown error */
} else {
if (h->ibytep < sizeof(h->imsg)) {
h->ibytec += h->ibytev;
h->ibytep++;
} else if (h->ibytep == sizeof(h->imsg)) {
- ast_log(LOG_NOTICE, "msg too large");
+ ast_log(LOG_NOTICE, "msg too large\n");
h->ierr = 2; /* bad message length */
}
if (h->ibytep > 1 && h->ibytep == 3 + h->imsg[1] && !h->ierr) {
if (!h->ibytec) {
sms_messagerx(h);
} else {
- ast_log(LOG_NOTICE, "bad checksum");
+ ast_log(LOG_NOTICE, "bad checksum\n");
h->ierr = 1; /* bad checksum */
}
}
int res;
if (ast_strlen_zero(data)) {
- ast_log(LOG_WARNING, "VMSayName requires argument mailbox@context");
+ ast_log(LOG_WARNING, "VMSayName requires argument mailbox@context\n");
return -1;
}
if(!payload_eg711u || !payload_pcmu) {
iks_delete(payload_pcmu);
iks_delete(payload_eg711u);
- ast_log(LOG_WARNING,"Failed to allocate iks node");
+ ast_log(LOG_WARNING,"Failed to allocate iks node\n");
return -1;
}
iks_insert_attrib(payload_pcmu, "id", "0");
if(!payload_eg711a || !payload_pcma) {
iks_delete(payload_eg711a);
iks_delete(payload_pcma);
- ast_log(LOG_WARNING,"Failed to allocate iks node");
+ ast_log(LOG_WARNING,"Failed to allocate iks node\n");
return -1;
}
iks_insert_attrib(payload_pcma, "id", "8");
if (!strcasecmp("ilbc", format)) {
iks *payload_ilbc = iks_new("payload-type");
if(!payload_ilbc) {
- ast_log(LOG_WARNING,"Failed to allocate iks node");
+ ast_log(LOG_WARNING,"Failed to allocate iks node\n");
return -1;
}
iks_insert_attrib(payload_ilbc, "id", "97");
if (!strcasecmp("g723", format)) {
iks *payload_g723 = iks_new("payload-type");
if(!payload_g723) {
- ast_log(LOG_WARNING,"Failed to allocate iks node");
+ ast_log(LOG_WARNING,"Failed to allocate iks node\n");
return -1;
}
iks_insert_attrib(payload_g723, "id", "4");
if (!strcasecmp("speex", format)) {
iks *payload_speex = iks_new("payload-type");
if(!payload_speex) {
- ast_log(LOG_WARNING,"Failed to allocate iks node");
+ ast_log(LOG_WARNING,"Failed to allocate iks node\n");
return -1;
}
iks_insert_attrib(payload_speex, "id", "110");
if (!strcasecmp("gsm", format)) {
iks *payload_gsm = iks_new("payload-type");
if(!payload_gsm) {
- ast_log(LOG_WARNING,"Failed to allocate iks node");
+ ast_log(LOG_WARNING,"Failed to allocate iks node\n");
return -1;
}
iks_insert_attrib(payload_gsm, "id", "103");
gtalk_get_local_ip(&us);
if (!strcmp(ast_sockaddr_stringify_addr(&us), "127.0.0.1")) {
- ast_log(LOG_WARNING, "Found a loopback IP on the system, check your network configuration or set the bindaddr attribute.");
+ ast_log(LOG_WARNING, "Found a loopback IP on the system, check your network configuration or set the bindaddr attribute.\n");
}
/* Setup our gtalk candidates */
unsigned int transferid = (unsigned int)ast_random();
if (IAX_CALLENCRYPTED(iaxs[callno0]) || IAX_CALLENCRYPTED(iaxs[callno1])) {
- ast_debug(1, "transfers are not supported for encrypted calls at this time");
+ ast_debug(1, "transfers are not supported for encrypted calls at this time\n");
ast_set_flag64(iaxs[callno0], IAX_NOTRANSFER);
ast_set_flag64(iaxs[callno1], IAX_NOTRANSFER);
return 0;
user = user_unref(user);
}
if (ast_test_flag64(p, IAX_FORCE_ENCRYPT) && !p->encmethods) {
- ast_log(LOG_NOTICE, "Call Terminated, Incoming call is unencrypted while force encrypt is enabled.");
+ ast_log(LOG_NOTICE, "Call Terminated, Incoming call is unencrypted while force encrypt is enabled.\n");
return res;
}
if (!ast_test_flag(&p->state, IAX_STATE_AUTHENTICATED))
if (ies->encmethods) {
ast_set_flag64(p, IAX_ENCRYPTED | IAX_KEYPOPULATED);
} else if (ast_test_flag64(iaxs[callno], IAX_FORCE_ENCRYPT)) {
- ast_log(LOG_NOTICE, "Call initiated without encryption while forceencryption=yes option is set");
+ ast_log(LOG_NOTICE, "Call initiated without encryption while forceencryption=yes option is set\n");
return -1; /* if force encryption is yes, and no encryption methods, then return -1 to hangup */
}
if (!res) {
ast_debug(1, "Sending DTMF using inband/hybrid\n");
res = -1; /* Let asterisk play inband indications */
} else if (p->dtmfmode & MGCP_DTMF_RFC2833) {
- ast_debug(1, "Sending DTMF using RFC2833");
+ ast_debug(1, "Sending DTMF using RFC2833\n");
ast_rtp_instance_dtmf_begin(sub->rtp, digit);
} else {
ast_log(LOG_ERROR, "Don't know about DTMF_MODE %d\n", p->dtmfmode);
case TCPTLS_ALERT_DATA:
ao2_lock(me);
if (!(packet = AST_LIST_REMOVE_HEAD(&me->packet_q, entry))) {
- ast_log(LOG_WARNING, "TCPTLS thread alert_pipe indicated packet should be sent, but frame_q is empty");
+ ast_log(LOG_WARNING, "TCPTLS thread alert_pipe indicated packet should be sent, but frame_q is empty\n");
}
ao2_unlock(me);
p->options->replaces = ast_var_value(current);
} else if (!strcasecmp(ast_var_name(current), "SIP_MAX_FORWARDS")) {
if (sscanf(ast_var_value(current), "%30d", &(p->maxforwards)) != 1) {
- ast_log(LOG_WARNING, "The SIP_MAX_FORWARDS channel variable is not a valid integer.");
+ ast_log(LOG_WARNING, "The SIP_MAX_FORWARDS channel variable is not a valid integer.\n");
}
}
}
return 0;
}
if (ast_test_flag(ast, AST_FLAG_ANSWERED_ELSEWHERE) || ast->hangupcause == AST_CAUSE_ANSWERED_ELSEWHERE) {
- ast_debug(1, "This call was answered elsewhere");
+ ast_debug(1, "This call was answered elsewhere\n");
if (ast->hangupcause == AST_CAUSE_ANSWERED_ELSEWHERE) {
ast_debug(1, "####### It's the cause code, buddy. The cause code!!!\n");
}
ast_str_append(&p->notify->content, 0, "\r\n");
ast_str_append(&p->notify->content, 0, "%s", var->value);
} else if (!strcasecmp(var->name, "Content-Length")) {
- ast_log(LOG_WARNING, "it is not necessary to specify Content-Length, ignoring");
+ ast_log(LOG_WARNING, "it is not necessary to specify Content-Length, ignoring\n");
} else {
header->next = ast_variable_new(var->name, var->value, "");
header = header->next;
ast_str_append(&p->notify->content, 0, "\r\n");
ast_str_append(&p->notify->content, 0, "%s", buf);
} else if (!strcasecmp(var->name, "Content-Length")) {
- ast_log(LOG_WARNING, "it is not necessary to specify Content-Length in sip_notify.conf, ignoring");
+ ast_log(LOG_WARNING, "it is not necessary to specify Content-Length in sip_notify.conf, ignoring\n");
} else {
header->next = ast_variable_new(var->name, buf, "");
header = header->next;
int tmp, i = 0;
char addrmac[19];
int res = 0;
- if (unistimdebug)
- ast_verb(0, "Mac Address received : ");
for (tmp = 15; tmp < 15 + SIZE_HEADER; tmp++) {
sprintf(&addrmac[i], "%.2x", (unsigned char) buf[tmp]);
i += 2;
}
- if (unistimdebug)
- ast_verb(0, "%s\n", addrmac);
+ if (unistimdebug) {
+ ast_verb(0, "Mac Address received : %s\n", addrmac);
+ }
strcpy(pte->macaddr, addrmac);
res = unistim_register(pte);
if (!res) {
else if (!strcasecmp(v->name, "contrast")) {
d->contrast = atoi(v->value);
if ((d->contrast < 0) || (d->contrast > 15)) {
- ast_log(LOG_WARNING, "constrast must be beetween 0 and 15");
+ ast_log(LOG_WARNING, "contrast must be beetween 0 and 15\n");
d->contrast = 8;
}
} else if (!strcasecmp(v->name, "nat"))
case SDL_ACTIVEEVENT:
#if 0 /* do not react, we don't want to die because the window is minimized */
if (ev[i].active.gain == 0 && ev[i].active.state & SDL_APPACTIVE) {
- ast_log(LOG_WARNING, "/* somebody has killed us ? */");
+ ast_log(LOG_WARNING, "/* somebody has killed us ? */\n");
ast_cli_command(gui->outfd, "stop now");
}
#endif
if (gui->kp_size == 0) {
gui->kp = ast_calloc(10, sizeof(e));
if (gui->kp == NULL) {
- ast_log(LOG_WARNING, "cannot allocate kp");
+ ast_log(LOG_WARNING, "cannot allocate kp\n");
return 0;
}
gui->kp_size = 10;
if (gui->kp_size == gui->kp_used) { /* must allocate */
struct keypad_entry *a = ast_realloc(gui->kp, sizeof(e)*(gui->kp_size+10));
if (a == NULL) {
- ast_log(LOG_WARNING, "cannot reallocate kp");
+ ast_log(LOG_WARNING, "cannot reallocate kp\n");
return 0;
}
gui->kp = a;
eff_w, eff_h, out->pix_fmt,
SWS_BICUBIC, NULL, NULL, NULL);
if (convert_ctx == NULL) {
- ast_log(LOG_ERROR, "FFMPEG::convert_cmodel : swscale context initialization failed");
+ ast_log(LOG_ERROR, "FFMPEG::convert_cmodel : swscale context initialization failed\n");
return;
}
if (0)
long bytes_read;
if (desc->writing) {
- ast_log(LOG_WARNING, "Reading is not suport on OGG/Vorbis on write files.");
+ ast_log(LOG_WARNING, "Reading is not suport on OGG/Vorbis on write files.\n");
return NULL;
}
ret = ast_channel_trace_disable(chan);
else {
ret = -1;
- ast_log(LOG_WARNING, "Invalid value for CHANNEL(trace).");
+ ast_log(LOG_WARNING, "Invalid value for CHANNEL(trace).\n");
}
ast_channel_unlock(chan);
}
char *bufptr = buf, *dataptr = data;
if (len < 3){ /* at least two for quotes and one for binary zero */
- ast_log(LOG_ERROR, "Not enough buffer");
+ ast_log(LOG_ERROR, "Not enough buffer\n");
return -1;
}
char *bufptr = buf, *dataptr = data;
if (len < 3) { /* at least two for quotes and one for binary zero */
- ast_log(LOG_ERROR, "Not enough buffer");
+ ast_log(LOG_ERROR, "Not enough buffer\n");
return -1;
}
}
if (ast_test_flag(to, AST_CDR_FLAG_LOCKED)) {
- ast_log(LOG_WARNING, "Merging into locked CDR... no choice.");
+ ast_log(LOG_WARNING, "Merging into locked CDR... no choice.\n");
to = zcdr; /* safety-- if all there are is locked CDR's, then.... ?? */
lto = NULL;
}
}
if (eval && !(tmpdata = ast_str_thread_get(&switch_data, 512))) {
- ast_log(LOG_WARNING, "Can't evaluate overrideswitch?!");
+ ast_log(LOG_WARNING, "Can't evaluate overrideswitch?!\n");
break;
} else if (eval) {
/* Substitute variables now */
/* Substitute variables now */
if (sw->eval) {
if (!(tmpdata = ast_str_thread_get(&switch_data, 512))) {
- ast_log(LOG_WARNING, "Can't evaluate switch?!");
+ ast_log(LOG_WARNING, "Can't evaluate switch?!\n");
continue;
}
pbx_substitute_variables_helper(chan, sw->data, ast_str_buffer(tmpdata), ast_str_size(tmpdata));
tcptls_session->f = fopencookie(tcptls_session->ssl, "w+", cookie_funcs);
#else
/* could add other methods here */
- ast_debug(2, "no tcptls_session->f methods attempted!");
+ ast_debug(2, "no tcptls_session->f methods attempted!\n");
#endif
if ((tcptls_session->client && !ast_test_flag(&tcptls_session->parent->tls_cfg->flags, AST_SSL_DONT_VERIFY_SERVER))
|| (!tcptls_session->client && ast_test_flag(&tcptls_session->parent->tls_cfg->flags, AST_SSL_VERIFY_CLIENT))) {
/* Get doc root node and check if it starts with '<docs>' */
root_node = ast_xml_get_root(tmpdoc);
if (!root_node) {
- ast_log(LOG_ERROR, "Error getting documentation root node");
+ ast_log(LOG_ERROR, "Error getting documentation root node\n");
ast_xml_close(tmpdoc);
continue;
}
} else if (!strcasecmp("extension", a->argv[3])) {
res = orig_exten(a->fd, a->argv[2], a->argv[4]);
} else {
- ast_log(LOG_WARNING, "else");
res = CLI_SHOWUSAGE;
}
var = ast_variable_new(argv[RES_CONFIG_SQLITE_CONFIG_VAR_NAME], argv[RES_CONFIG_SQLITE_CONFIG_VAR_VAL], "");
if (!var) {
- ast_log(LOG_WARNING, "Unable to allocate variable");
+ ast_log(LOG_WARNING, "Unable to allocate variable\n");
return 1;
}
/* For existing streams, replace if its an SSRC stream, or bail if its a wildcard */
if ((match = find_policy(srtp, &policy->sp, OBJ_POINTER))) {
if (policy->sp.ssrc.type != ssrc_specific) {
- ast_log(AST_LOG_WARNING, "Cannot replace an existing wildcard policy");
+ ast_log(AST_LOG_WARNING, "Cannot replace an existing wildcard policy\n");
ao2_t_ref(match, -1, "Unreffing already existing policy");
return -1;
} else {