... | ... |
@@ -186,7 +186,7 @@ route[FORWARD] |
186 | 186 |
# even for UDP2TCP |
187 | 187 |
if (!t_relay()) { |
188 | 188 |
sl_reply_error(); |
189 |
- }; |
|
189 |
+ } |
|
190 | 190 |
drop; |
191 | 191 |
} |
192 | 192 |
|
... | ... |
@@ -201,12 +201,12 @@ route[INIT] |
201 | 201 |
if (!mf_process_maxfwd_header("10")) { |
202 | 202 |
sl_send_reply("483","Too Many Hops"); |
203 | 203 |
drop; |
204 |
- }; |
|
204 |
+ } |
|
205 | 205 |
|
206 | 206 |
if (msg:len >= max_len ) { |
207 | 207 |
sl_send_reply("513", "Message too big"); |
208 | 208 |
drop; |
209 |
- }; |
|
209 |
+ } |
|
210 | 210 |
|
211 | 211 |
# you could add some NAT detection here for example |
212 | 212 |
|
... | ... |
@@ -319,7 +319,7 @@ route[REGISTRAR] |
319 | 319 |
sl_send_reply("401", "Unauthorized"); |
320 | 320 |
} |
321 | 321 |
drop; |
322 |
- }; |
|
322 |
+ } |
|
323 | 323 |
|
324 | 324 |
# check if the authenticated user is the same as the target user |
325 | 325 |
if (!lookup_user("$tu.uid", "@to.uri")) { |
... | ... |
@@ -344,9 +344,12 @@ route[REGISTRAR] |
344 | 344 |
#} |
345 | 345 |
|
346 | 346 |
# everyhting is fine so lets store the binding |
347 |
- save_contacts("location"); |
|
347 |
+ if (!save_contacts("location")) { |
|
348 |
+ sl_reply("400", "Invalid REGISTER Request"); |
|
349 |
+ drop; |
|
350 |
+ } |
|
348 | 351 |
drop; |
349 |
- }; |
|
352 |
+ } |
|
350 | 353 |
} |
351 | 354 |
|
352 | 355 |
route[AUTHENTICATION] |
... | ... |
@@ -445,7 +448,7 @@ route[INBOUND] |
445 | 448 |
sl_send_reply("480", "User temporarily not available"); |
446 | 449 |
drop; |
447 | 450 |
} |
448 |
- }; |
|
451 |
+ } |
|
449 | 452 |
} |
450 | 453 |
|
451 | 454 |
route[PSTN] |