<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to feature-requests</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/</link><description>Recent changes to feature-requests</description><atom:link href="https://sourceforge.net/p/sofia-sip/feature-requests/feed.rss" rel="self"/><language>en</language><lastBuildDate>Tue, 04 Dec 2012 14:52:15 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/sofia-sip/feature-requests/feed.rss" rel="self" type="application/rss+xml"/><item><title>Assured Services </title><link>https://sourceforge.net/p/sofia-sip/feature-requests/27/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Assured Services is an integral part of our Call Management system, we want to move to FreeSWITCH which uses this stack, but the lack of Assured Services SIP (AS-SIP) is a road block for us.  Is there any plans to add in AS-SIP?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jacob Miles</dc:creator><pubDate>Tue, 04 Dec 2012 14:52:15 -0000</pubDate><guid>https://sourceforge.netc09263c2eee27896af108c704833b1826ab3a8d5</guid></item><item><title>Use default certificate paths from OpenSSL</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/26/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;It should be possible to make OpenSSL use default paths to search CA certificates for verification.&lt;br /&gt;
A branch with a quick and dirty implementation is available here:&lt;br /&gt;
&lt;a href="https://gitorious.org/~mzabaluev/sofia-sip/mzabaluev-sofia-sip/commits/system-ca-path" rel="nofollow"&gt;https://gitorious.org/~mzabaluev/sofia-sip/mzabaluev-sofia-sip/commits/system-ca-path&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A backwards-compatible change would have to add a tag to enable this behavior, retaining the previous path use by default.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mikhail Zabaluev</dc:creator><pubDate>Mon, 23 May 2011 11:29:45 -0000</pubDate><guid>https://sourceforge.net44a415d9875c62b66ec839fbbc213660a8d487ba</guid></item><item><title>Log sofia-sip modules through su_log()</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/25/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Currently sofia-sip only permits to log through a custom logger function only the messages issued by the su module, for the other messages there is the X_PORT/X_DEBUG/X_DUMP mechanism which uses environment variables to set for each module a distinct log file and level.&lt;/p&gt;
&lt;p&gt;Exporting in the public headers a su_log_t struct for each module (nua_log, tport_log, nth_log etc.) should make possible to define a logger for each one of the modules.&lt;/p&gt;
&lt;p&gt;This way should be possible to integrate the sofia logging facility (not only those related to the su module) into one's application log system.&lt;/p&gt;
&lt;p&gt;I'm still trying to undestand how to do that, but Pekka noted in the list that there could be some difficulties involving the exporting of arrays in the windows and symbian platforms.&lt;/p&gt;
&lt;p&gt;Anyway I think it would be a nice feature, I'll try to provide a patch eventually.&lt;/p&gt;
&lt;p&gt;Best regards.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stefano Sabatini</dc:creator><pubDate>Mon, 26 Jan 2009 13:31:11 -0000</pubDate><guid>https://sourceforge.net78dec369a17f0e9f76ef3e4a602c81bc48df8143</guid></item><item><title>Doxygenation in the headers.</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/24/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;documentation for public functions/structures should stay in the headers, while currently the doxygenation is scattered amongst .h and .c files (often duplicated).&lt;/p&gt;
&lt;p&gt;It would be nice to clean this, having the doxygenation for sofia public symbols just in the headers.&lt;/p&gt;
&lt;p&gt;Thanks, regards.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stefano Sabatini</dc:creator><pubDate>Mon, 26 Jan 2009 09:56:46 -0000</pubDate><guid>https://sourceforge.net4f8d4832813a3d7f629fd936b9c39d0d7cb57d0c</guid></item><item><title>apply 'APPL_METHOD' on "CANCEL"</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/23/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Current sofia stack responds automatically with 200OK to CANCEL, and then 487 after that. I propose to make it more flexible so that application programmer could control the behavior or insert new TAG parameters.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">kandy yang</dc:creator><pubDate>Wed, 29 Oct 2008 01:47:06 -0000</pubDate><guid>https://sourceforge.net288cd42b4fda395d35d5adadf4649f86e308927d</guid></item><item><title>Dialog should stick to one remote transport address</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/22/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;In some cases there are several request destination addresses available for a target URL, such as when an SRV lookup returns entries of the same priority. Requests in a dialog should stick to one transport address chosen for the initial request. This prevents confusion on the server side, where the alternative proxies often know nothing about each other's dialogs.&lt;/p&gt;
&lt;p&gt;This also applies to resubmissions of INVITE requests after an authentication challenge. If authentication responses are fanned around multiple proxies which know nothing of each other's challenges, the number of steps needed to make the authentication succeed is not deterministic.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mikhail Zabaluev</dc:creator><pubDate>Tue, 28 Oct 2008 16:30:39 -0000</pubDate><guid>https://sourceforge.net4fb457b45142293bcd984b164a886e5502134988</guid></item><item><title>Remove trailing whitespaces from the code</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/21/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;trailing whitespaces take useless storage space/bandwith, and make more difficult to provide clean patches since it's easy to change the number of them, also they're ugly to see ;-).&lt;/p&gt;
&lt;p&gt;So it would be nice to avoid them, then maybe to set an hook a-la SVN to reject commits/patches containing them.&lt;/p&gt;
&lt;p&gt;A script could easily eliminate all of them from the code (I can provide it or the patch if you like it).&lt;/p&gt;
&lt;p&gt;Regards.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stefano Sabatini</dc:creator><pubDate>Tue, 29 Jul 2008 16:19:47 -0000</pubDate><guid>https://sourceforge.netb6243d644e1c07ab3cffff86577739dad99ff145</guid></item><item><title>Additional Authentication</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/20/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Add an interface (callback or other) that will enable to override the MD5 authentication (algorithm="MyAlgorithm"). The feature should allow the programmer to receive the challenge (nonce), and all the relevant headers/tags of the 401/407, calculate the response and return it with the ability to add/modify additional headers/tags. &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">zeev boim</dc:creator><pubDate>Sat, 22 Mar 2008 13:02:04 -0000</pubDate><guid>https://sourceforge.net0ba5e0a4b82002672f33676f2a032994e315adf6</guid></item><item><title>Add variants of NUA request methods that accept a tag array</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/19/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;To allow more flexible programmability, and particularly to enable scripting language bindings for Sofia-SIP NUA API, it would be useful to have variants of NUA request methods such as nua_invite() that accept the tag list as a pointer to an array, similar to the tagi_t[] parameter in event callbacks.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mikhail Zabaluev</dc:creator><pubDate>Tue, 11 Dec 2007 13:41:42 -0000</pubDate><guid>https://sourceforge.net2fd4023121b0523a6f321654c8d979033974d2a3</guid></item><item><title>Remote contact handling in nua</title><link>https://sourceforge.net/p/sofia-sip/feature-requests/18/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;NUA does not save remote target in the dialog. If the target refresh request or response (INVITE, UPDATE, SUBSCRIBE, NOTIFY, ...) has bad contact or it is missing, the next request in dialog is not necessarily sent to correct destination.&lt;/p&gt;
&lt;p&gt;The remote target should be saved and the application should be able to prevent stack from replacing good contact with bad one.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Pekka Pessi</dc:creator><pubDate>Wed, 10 Oct 2007 18:25:10 -0000</pubDate><guid>https://sourceforge.net35af8735548c53cb9e89812868895a89c582f1ae</guid></item></channel></rss>