void sip_report_invalid_peer(const struct sip_pvt *p);
void sip_report_failed_acl(const struct sip_pvt *p, const char *aclname);
void sip_report_inval_password(const struct sip_pvt *p, const char *responsechallenge, const char *responsehash);
-void sip_report_auth_success(const struct sip_pvt *p, uint32_t *using_password);
+void sip_report_auth_success(const struct sip_pvt *p, uint32_t using_password);
void sip_report_session_limit(const struct sip_pvt *p);
void sip_report_failed_challenge_response(const struct sip_pvt *p, const char *response, const char *expected_response);
void sip_report_chal_sent(const struct sip_pvt *p);
ast_security_event_report(AST_SEC_EVT(&inval_password));
}
-void sip_report_auth_success(const struct sip_pvt *p, uint32_t *using_password)
+void sip_report_auth_success(const struct sip_pvt *p, uint32_t using_password)
{
char session_id[32];
}
int sip_report_security_event(const char *peer, struct ast_sockaddr *addr, const struct sip_pvt *p,
- const struct sip_request *req, const int res) {
+ const struct sip_request *req, const int res)
+{
struct sip_peer *peer_report;
enum check_auth_result res_report = res;
case AUTH_SUCCESSFUL:
if (peer_report) {
if (ast_strlen_zero(peer_report->secret) && ast_strlen_zero(peer_report->md5secret)) {
- sip_report_auth_success(p, (uint32_t *) 0);
+ sip_report_auth_success(p, 0);
} else {
- sip_report_auth_success(p, (uint32_t *) 1);
+ sip_report_auth_success(p, 1);
}
}
break;
* \brief Using password - if a password was used or not
* \note required, 0 = no, 1 = yes
*/
- uint32_t *using_password;
+ uint32_t using_password;
};
/*!
.transport = transport,
},
.common.session_id = call_id,
- .using_password = auth ? (uint32_t *)1 : (uint32_t *)0,
+ .using_password = auth ? 1 : 0,
};
security_event_populate(rdata, call_id, sizeof(call_id), &local, &remote);