{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.Qis6k9It/b1/asterisk_22.2.0~dfsg+~cs6.15.60671435-2_i386.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.Qis6k9It/b2/asterisk_22.2.0~dfsg+~cs6.15.60671435-2_i386.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -13,8 +13,8 @@\n 85ec29499721cfb7ca3db4efe98f274c 84180 comm optional asterisk-mp3_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n a306a90b117ed576152ed2a6f905910b 62772 debug optional asterisk-mysql-dbgsym_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n 89f3dbc9b5540846325628eb91b294fc 82992 comm optional asterisk-mysql_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n 84ea05654d871ce015fb2f5be6c704ba 812428 debug optional asterisk-ooh323-dbgsym_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n 0ea6f3be5b97799dfe1305ef456ac3f6 434856 comm optional asterisk-ooh323_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n 2bc124479e5a6a1a19d656cf0ec9095c 1149700 debug optional asterisk-tests-dbgsym_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n 607d16837e8a7bbef7c7242d93be7e69 553024 comm optional asterisk-tests_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n- d9624ebe2a11310cbf7d5a8e61b8304e 2559616 comm optional asterisk_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n+ 0ba8e27959dd35a77b86abe2a63be484 2559656 comm optional asterisk_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb\n"}, {"source1": "asterisk_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb", "source2": "asterisk_22.2.0~dfsg+~cs6.15.60671435-2_i386.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-02-22 07:54:51.000000 debian-binary\n -rw-r--r-- 0 0 0 8304 2025-02-22 07:54:51.000000 control.tar.xz\n--rw-r--r-- 0 0 0 2551120 2025-02-22 07:54:51.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 2551160 2025-02-22 07:54:51.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/asterisk/documentation/core-en_US.xml", "source2": "./usr/share/asterisk/documentation/core-en_US.xml", "unified_diff": null, "details": [{"source1": "./usr/share/asterisk/documentation/core-en_US.xml", "source2": "./usr/share/asterisk/documentation/core-en_US.xml", "comments": ["Ordering differences only"], "unified_diff": "@@ -37572,14 +37572,1798 @@\n \n \n \n \n \n extended\n \n+ \n+ STIR/SHAKEN module for Asterisk\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ STIR/SHAKEN attestation options\n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Globally disable verification\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ File path to a certificate\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ URL to the public certificate\n+ \n+ Must be a valid http, or https, URL.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Attestation level\n+ \n+ \n+ \n+ 20.12.0\n+ 21.7.0\n+ 22.2.0\n+ \n+ Attestation level to use for unknown TNs\n+ \n+ Normally if a callerid TN isn't configured in stir_shaken.conf\n+\t\t\t\t\tno Identity header will be created. If this option is set,\n+\t\t\t\t\thowever, an Identity header will be sent using this\n+\t\t\t\t\tattestation level. Since there's no TN object, you must\n+\t\t\t\t\tensure that a private_key_file and public_cert_url are\n+\t\t\t\t\tconfigured in the attestation or profile objects for\n+\t\t\t\t\tthis to work.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ On load, Retrieve all TN's certificates and validate their dates\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Send a media key (mky) grant in the attestation for DTLS calls.\n+\t\t\t\t\t(not common)\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ STIR/SHAKEN TN options\n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Must be of type 'tn'.\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ File path to a certificate\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ URL to the public certificate\n+ \n+ Must be a valid http, or https, URL.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Attestation level\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ On load, Retrieve all TN's certificates and validate their dates\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Send a media key (mky) grant in the attestation for DTLS calls.\n+\t\t\t\t\t(not common)\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ STIR/SHAKEN verification options\n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Globally disable verification\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ A boolean indicating whether trusted CA certificates should be loaded from the system\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Path to a file containing one or more CA certs in PEM format\n+ \n+ These certs are used to verify the chain of trust for the\n+\t\t\t\t\t\tcertificate retrieved from the X5U Identity header parameter. This\n+\t\t\t\t\t\tfile must have the root CA certificate, the certificate of the\n+\t\t\t\t\t\tissuer of the X5U certificate, and any intermediate certificates\n+\t\t\t\t\t\tbetween them.\n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Path to a directory containing one or more hashed CA certs\n+ \n+ \n+ \n+ For this option, the individual certificates must be placed in\n+\t\t\t\t\t\tthe directory specified and hashed using the\n+ openssl rehash\n+ command.\n+ \n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Path to a file containing one or more CRLs in PEM format\n+ \n+ If you with to check if the certificate in the X5U Identity header\n+\t\t\t\t\t\tparameter has been revoked, you'll need the certificate revocation\n+\t\t\t\t\t\tlist generated by the issuer.\n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Path to a directory containing one or more hashed CRLs\n+ \n+ \n+ \n+ For this option, the individual CRLs must be placed in\n+\t\t\t\t\t\tthe directory specified and hashed using the\n+ openssl rehash\n+ command.\n+ \n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Path to a file containing one or more untrusted cert in PEM format used to verify CRLs\n+ \n+ If you with to check if the certificate in the X5U Identity header\n+\t\t\t\t\tparameter has been revoked, you'll need the certificate revocation\n+\t\t\t\t\tlist generated by the issuer. Unfortunately, sometimes the CRLs are signed by a\n+\t\t\t\t\tdifferent CA than the certificate being verified. In this case, you\n+\t\t\t\t\tmay need to provide the untrusted certificate to verify the CRL.\n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Path to a directory containing one or more hashed untrusted certs used to verify CRLs\n+ \n+ \n+ \n+ For this option, the individual certificates must be placed in\n+\t\t\t\t\t\tthe directory specified and hashed using the\n+ openssl rehash\n+ command.\n+ \n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Directory to cache retrieved verification certs\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Maximum time to wait to CURL certificates\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Number of seconds a cache entry may be behind current time\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Maximum size to use for caching public keys\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Number of seconds an iat grant may be behind current time\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Number of seconds a SIP Date header may be behind current time\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ The default failure action when not set on a profile\n+ \n+ \n+ \n+ \n+ If set to\n+ continue\n+ , continue and let\n+\t\t\t\t\t\t\tthe dialplan decide what action to take.\n+ \n+ \n+ \n+ \n+ If set to\n+ reject_request\n+ , reject the incoming\n+\t\t\t\t\t\t\trequest with response codes defined in RFC8224.\n+ \n+ \n+ \n+ \n+ If set to\n+ return_reason\n+ , continue to the\n+\t\t\t\t\t\t\tdialplan but add a\n+ Reason\n+ header to the sender in\n+\t\t\t\t\t\t\tthe next provisional response.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ RFC9410 uses the STIR protocol on Reason headers\n+\t\t\t\t\tinstead of the SIP protocol\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Relaxes check for \"https\" and port 443 or 8443\n+\t\t\t\t\tin incoming Identity header x5u URLs.\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Relaxes check for query parameters, user/password, etc.\n+\t\t\t\t\tin incoming Identity header x5u URLs.\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ An existing ACL from acl.conf to use when checking\n+\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ An IP or subnet to permit when checking\n+\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ An IP or subnet to deny checking\n+\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ STIR/SHAKEN profile configuration options\n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Must be of type 'profile'.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 18.22.0\n+ 20.7.0\n+ 21.2.0\n+ \n+ Actions performed when an endpoint references this profile\n+ \n+ \n+ \n+ Don't do any STIR/SHAKEN processing.\n+ \n+ \n+ Attest on outgoing calls.\n+ \n+ \n+ Verify incoming calls.\n+ \n+ \n+ Attest outgoing calls and verify incoming calls.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.15.0\n+ \n+ Gets the number of STIR/SHAKEN results or a specific STIR/SHAKEN value from a result on the channel.\n+ \n+ \n+ The index of the STIR/SHAKEN result to get. If only 'count' is passed in, gets the number of STIR/SHAKEN results instead.\n+ \n+ \n+ The value to get from the STIR/SHAKEN result. Only used when an index is passed in (instead of 'count'). Allowable values:\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ This function will either return the number of STIR/SHAKEN identities, or return information on the specified identity.\n+\t\t\tTo get the number of identities, just pass 'count' as the only parameter to the function. If you want to get information on a\n+\t\t\tspecific STIR/SHAKEN identity, you can get the number of identities and then pass an index as the first parameter and one of\n+\t\t\tthe values you would like to retrieve as the second parameter.\n+ same => n,NoOp(Number of STIR/SHAKEN identities: ${STIR_SHAKEN(count)})\n+\t\t\tsame => n,NoOp(Identity ${STIR_SHAKEN(0, identity)} has attestation level ${STIR_SHAKEN(0, attestation)})\n+ \n+ \n+ \n+ \n+ 12.0.0\n+ \n+ Qualify a chan_pjsip endpoint.\n+ \n+ \n+ \n+ The endpoint you want to qualify.\n+ \n+ \n+ \n+ Qualify a chan_pjsip endpoint.\n+ \n+ \n+ \n+ \n+ \n+ 13.20.0\n+ 15.3.0\n+ \n+ Provide details about an identify section.\n+ \n+ \n+ The object's type. This will always be 'identify'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ The name of the endpoint associated with this information.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 13.12.0\n+ 14.1.0\n+ \n+ Provide details about an Address of Record (AoR) section.\n+ \n+ \n+ The object's type. This will always be 'aor'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ The total number of contacts associated with this AoR.\n+ \n+ \n+ The number of non-permanent contacts associated with this AoR.\n+ \n+ \n+ The name of the endpoint associated with this information.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 12.0.0\n+ \n+ Provide details about an authentication section.\n+ \n+ \n+ The object's type. This will always be 'auth'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ The name of the endpoint associated with this information.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 12.6.0\n+ \n+ Provide details about an authentication section.\n+ \n+ \n+ The object's type. This will always be 'transport'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ The name of the endpoint associated with this information.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 12.0.0\n+ \n+ Provide details about an endpoint section.\n+ \n+ \n+ The object's type. This will always be 'endpoint'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ The aggregate device state for this endpoint.\n+ \n+ \n+ The number of active channels associated with this endpoint.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Provide details about an Address of Record (AoR) section.\n+ \n+ \n+ The object's type. This will always be 'aor'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Provide details about an Address of Record (Auth) section.\n+ \n+ \n+ The object's type. This will always be 'auth'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Provide details about a contact section.\n+ \n+ \n+ The object's type. This will always be 'contact'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ IP address of the last Via header in REGISTER request.\n+\t\t\t\t\tWill only appear in the event if available.\n+ \n+ \n+ Port number of the last Via header in REGISTER request.\n+\t\t\t\t\tWill only appear in the event if available.\n+ \n+ \n+ The elapsed time in decimal seconds after which an OPTIONS\n+\t\t\t\t\tmessage is sent before the contact is considered unavailable.\n+ \n+ \n+ Content of the Call-ID header in REGISTER request.\n+\t\t\t\t\tWill only appear in the event if available.\n+ \n+ \n+ Asterisk Server name.\n+ \n+ \n+ If true delete the contact on Asterisk restart/boot.\n+ \n+ \n+ The Path header received on the REGISTER.\n+ \n+ \n+ The name of the endpoint associated with this information.\n+ \n+ \n+ A boolean indicating whether a qualify should be authenticated.\n+ \n+ \n+ This contact's URI.\n+ \n+ \n+ The interval in seconds at which the contact will be qualified.\n+ \n+ \n+ Content of the User-Agent header in REGISTER request\n+ \n+ \n+ Absolute time that this contact is no longer valid after\n+ \n+ \n+ The contact's outbound proxy.\n+ \n+ \n+ This contact's status.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ The round trip time in microseconds.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 13.0.0\n+ \n+ Provide details about a contact's status.\n+ \n+ \n+ The AoR that owns this contact.\n+ \n+ \n+ This contact's URI.\n+ \n+ \n+ This contact's status.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ The round trip time in microseconds.\n+ \n+ \n+ The name of the endpoint associated with this information.\n+ \n+ \n+ Content of the User-Agent header in REGISTER request\n+ \n+ \n+ Absolute time that this contact is no longer valid after\n+ \n+ \n+ IP address:port of the last Via header in REGISTER request.\n+\t\t\t\t\tWill only appear in the event if available.\n+ \n+ \n+ Content of the Call-ID header in REGISTER request.\n+\t\t\t\t\tWill only appear in the event if available.\n+ \n+ \n+ The sorcery ID of the contact.\n+ \n+ \n+ A boolean indicating whether a qualify should be authenticated.\n+ \n+ \n+ The contact's outbound proxy.\n+ \n+ \n+ The Path header received on the REGISTER.\n+ \n+ \n+ The interval in seconds at which the contact will be qualified.\n+ \n+ \n+ The elapsed time in decimal seconds after which an OPTIONS\n+\t\t\t\t\tmessage is sent before the contact is considered unavailable.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 12.0.0\n+ \n+ Provide details about a contact's status.\n+ \n+ \n+ The object's type. This will always be 'endpoint'.\n+ \n+ \n+ The name of this object.\n+ \n+ \n+ The transport configurations associated with this endpoint.\n+ \n+ \n+ The aor configurations associated with this endpoint.\n+ \n+ \n+ The inbound authentication configurations associated with this endpoint.\n+ \n+ \n+ The outbound authentication configurations associated with this endpoint.\n+ \n+ \n+ The aggregate device state for this endpoint.\n+ \n+ \n+ The number of active channels associated with this endpoint.\n+ \n+ \n+ \n+ \n+ \n+ \n+ 12.0.0\n+ \n+ Lists PJSIP endpoints.\n+ \n+ \n+ \n+ Provides a listing of all endpoints. For each endpoint an\n+ EndpointList\n+ event\n+\t\t\tis raised that contains relevant attributes and status information. Once all\n+\t\t\tendpoints have been listed an\n+ EndpointListComplete\n+ event is issued.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 12.0.0\n+ \n+ Provide final information about an endpoint list.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 12.0.0\n+ \n+ Detail listing of an endpoint and its objects.\n+ \n+ \n+ \n+ The endpoint to list.\n+ \n+ \n+ \n+ \n+ Provides a detailed listing of options for a given endpoint. Events are issued\n+\t\t\tshowing the configuration and status of the endpoint and associated objects. These\n+\t\t\tevents include\n+ EndpointDetail\n+ ,\n+ AorDetail\n+ ,\n+ AuthDetail\n+ ,\n+ TransportDetail\n+ , and\n+ IdentifyDetail\n+ . Some events may be listed multiple times if multiple objects are\n+\t\t\tassociated (for instance AoRs). Once all detail events have been raised a final\n+ EndpointDetailComplete\n+ event is issued.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 12.0.0\n+ \n+ Provide final information about endpoint details.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Lists PJSIP AORs.\n+ \n+ \n+ \n+ Provides a listing of all AORs. For each AOR an\n+ AorList\n+ event\n+\t\t\tis raised that contains relevant attributes and status information. Once all\n+\t\t\taors have been listed an\n+ AorListComplete\n+ event is issued.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Provide final information about an aor list.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Lists PJSIP Auths.\n+ \n+ \n+ \n+ Provides a listing of all Auths. For each Auth an\n+ AuthList\n+ event\n+\t\t\tis raised that contains relevant attributes and status information. Once all\n+\t\t\tauths have been listed an\n+ AuthListComplete\n+ event is issued.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Provide final information about an auth list.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Lists PJSIP Contacts.\n+ \n+ \n+ \n+ Provides a listing of all Contacts. For each Contact a\n+ ContactList\n+ event is raised that contains relevant attributes and status information.\n+\t\t\tOnce all contacts have been listed a\n+ ContactListComplete\n+ event\n+\t\t\tis issued.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ 16.0.0\n+ \n+ Provide final information about a contact list.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n \n SIP Resource using PJProject\n \n \n \n 12.0.0\n \n@@ -41546,1298 +43330,14 @@\n only.\n \n \n \n \n \n \n- \n- \n- 12.0.0\n- \n- Qualify a chan_pjsip endpoint.\n- \n- \n- \n- The endpoint you want to qualify.\n- \n- \n- \n- Qualify a chan_pjsip endpoint.\n- \n- \n- \n- \n- \n- 13.20.0\n- 15.3.0\n- \n- Provide details about an identify section.\n- \n- \n- The object's type. This will always be 'identify'.\n- \n- \n- The name of this object.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- The name of the endpoint associated with this information.\n- \n- \n- \n- \n- \n- \n- \n- 13.12.0\n- 14.1.0\n- \n- Provide details about an Address of Record (AoR) section.\n- \n- \n- The object's type. This will always be 'aor'.\n- \n- \n- The name of this object.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- The total number of contacts associated with this AoR.\n- \n- \n- The number of non-permanent contacts associated with this AoR.\n- \n- \n- The name of the endpoint associated with this information.\n- \n- \n- \n- \n- \n- \n- \n- 12.0.0\n- \n- Provide details about an authentication section.\n- \n- \n- The object's type. This will always be 'auth'.\n- \n- \n- The name of this object.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- The name of the endpoint associated with this information.\n- \n- \n- \n- \n- \n- \n- \n- 12.6.0\n- \n- Provide details about an authentication section.\n- \n- \n- The object's type. This will always be 'transport'.\n- \n- \n- The name of this object.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- The name of the endpoint associated with this information.\n- \n- \n- \n- \n- \n- \n- \n- 12.0.0\n- \n- Provide details about an endpoint section.\n- \n- \n- The object's type. This will always be 'endpoint'.\n- \n- \n- The name of this object.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- The aggregate device state for this endpoint.\n- \n- \n- The number of active channels associated with this endpoint.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Provide details about an Address of Record (AoR) section.\n- \n- \n- The object's type. This will always be 'aor'.\n- \n- \n- The name of this object.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Provide details about an Address of Record (Auth) section.\n- \n- \n- The object's type. This will always be 'auth'.\n- \n- \n- The name of this object.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Provide details about a contact section.\n- \n- \n- The object's type. This will always be 'contact'.\n- \n- \n- The name of this object.\n- \n- \n- IP address of the last Via header in REGISTER request.\n-\t\t\t\t\tWill only appear in the event if available.\n- \n- \n- Port number of the last Via header in REGISTER request.\n-\t\t\t\t\tWill only appear in the event if available.\n- \n- \n- The elapsed time in decimal seconds after which an OPTIONS\n-\t\t\t\t\tmessage is sent before the contact is considered unavailable.\n- \n- \n- Content of the Call-ID header in REGISTER request.\n-\t\t\t\t\tWill only appear in the event if available.\n- \n- \n- Asterisk Server name.\n- \n- \n- If true delete the contact on Asterisk restart/boot.\n- \n- \n- The Path header received on the REGISTER.\n- \n- \n- The name of the endpoint associated with this information.\n- \n- \n- A boolean indicating whether a qualify should be authenticated.\n- \n- \n- This contact's URI.\n- \n- \n- The interval in seconds at which the contact will be qualified.\n- \n- \n- Content of the User-Agent header in REGISTER request\n- \n- \n- Absolute time that this contact is no longer valid after\n- \n- \n- The contact's outbound proxy.\n- \n- \n- This contact's status.\n- \n- \n- \n- \n- \n- \n- \n- \n- The round trip time in microseconds.\n- \n- \n- \n- \n- \n- \n- \n- 13.0.0\n- \n- Provide details about a contact's status.\n- \n- \n- The AoR that owns this contact.\n- \n- \n- This contact's URI.\n- \n- \n- This contact's status.\n- \n- \n- \n- \n- \n- \n- \n- \n- The round trip time in microseconds.\n- \n- \n- The name of the endpoint associated with this information.\n- \n- \n- Content of the User-Agent header in REGISTER request\n- \n- \n- Absolute time that this contact is no longer valid after\n- \n- \n- IP address:port of the last Via header in REGISTER request.\n-\t\t\t\t\tWill only appear in the event if available.\n- \n- \n- Content of the Call-ID header in REGISTER request.\n-\t\t\t\t\tWill only appear in the event if available.\n- \n- \n- The sorcery ID of the contact.\n- \n- \n- A boolean indicating whether a qualify should be authenticated.\n- \n- \n- The contact's outbound proxy.\n- \n- \n- The Path header received on the REGISTER.\n- \n- \n- The interval in seconds at which the contact will be qualified.\n- \n- \n- The elapsed time in decimal seconds after which an OPTIONS\n-\t\t\t\t\tmessage is sent before the contact is considered unavailable.\n- \n- \n- \n- \n- \n- \n- \n- 12.0.0\n- \n- Provide details about a contact's status.\n- \n- \n- The object's type. This will always be 'endpoint'.\n- \n- \n- The name of this object.\n- \n- \n- The transport configurations associated with this endpoint.\n- \n- \n- The aor configurations associated with this endpoint.\n- \n- \n- The inbound authentication configurations associated with this endpoint.\n- \n- \n- The outbound authentication configurations associated with this endpoint.\n- \n- \n- The aggregate device state for this endpoint.\n- \n- \n- The number of active channels associated with this endpoint.\n- \n- \n- \n- \n- \n- \n- 12.0.0\n- \n- Lists PJSIP endpoints.\n- \n- \n- \n- Provides a listing of all endpoints. For each endpoint an\n- EndpointList\n- event\n-\t\t\tis raised that contains relevant attributes and status information. Once all\n-\t\t\tendpoints have been listed an\n- EndpointListComplete\n- event is issued.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 12.0.0\n- \n- Provide final information about an endpoint list.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 12.0.0\n- \n- Detail listing of an endpoint and its objects.\n- \n- \n- \n- The endpoint to list.\n- \n- \n- \n- \n- Provides a detailed listing of options for a given endpoint. Events are issued\n-\t\t\tshowing the configuration and status of the endpoint and associated objects. These\n-\t\t\tevents include\n- EndpointDetail\n- ,\n- AorDetail\n- ,\n- AuthDetail\n- ,\n- TransportDetail\n- , and\n- IdentifyDetail\n- . Some events may be listed multiple times if multiple objects are\n-\t\t\tassociated (for instance AoRs). Once all detail events have been raised a final\n- EndpointDetailComplete\n- event is issued.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 12.0.0\n- \n- Provide final information about endpoint details.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Lists PJSIP AORs.\n- \n- \n- \n- Provides a listing of all AORs. For each AOR an\n- AorList\n- event\n-\t\t\tis raised that contains relevant attributes and status information. Once all\n-\t\t\taors have been listed an\n- AorListComplete\n- event is issued.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Provide final information about an aor list.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Lists PJSIP Auths.\n- \n- \n- \n- Provides a listing of all Auths. For each Auth an\n- AuthList\n- event\n-\t\t\tis raised that contains relevant attributes and status information. Once all\n-\t\t\tauths have been listed an\n- AuthListComplete\n- event is issued.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Provide final information about an auth list.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Lists PJSIP Contacts.\n- \n- \n- \n- Provides a listing of all Contacts. For each Contact a\n- ContactList\n- event is raised that contains relevant attributes and status information.\n-\t\t\tOnce all contacts have been listed a\n- ContactListComplete\n- event\n-\t\t\tis issued.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.0.0\n- \n- Provide final information about a contact list.\n- \n- \n- \n- \n- \n- \n- \n- \n \n Core Geolocation Support\n \n \n \n 16.29.0\n 18.15.0\n@@ -43248,514 +43748,14 @@\n \n There was an issue specific to the parameter specified\n \t\t\t(value not valid or parameter name not found, etc.)\n \n \n \n \n- \n- STIR/SHAKEN module for Asterisk\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- STIR/SHAKEN attestation options\n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Globally disable verification\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- File path to a certificate\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- URL to the public certificate\n- \n- Must be a valid http, or https, URL.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Attestation level\n- \n- \n- \n- 20.12.0\n- 21.7.0\n- 22.2.0\n- \n- Attestation level to use for unknown TNs\n- \n- Normally if a callerid TN isn't configured in stir_shaken.conf\n-\t\t\t\t\tno Identity header will be created. If this option is set,\n-\t\t\t\t\thowever, an Identity header will be sent using this\n-\t\t\t\t\tattestation level. Since there's no TN object, you must\n-\t\t\t\t\tensure that a private_key_file and public_cert_url are\n-\t\t\t\t\tconfigured in the attestation or profile objects for\n-\t\t\t\t\tthis to work.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- On load, Retrieve all TN's certificates and validate their dates\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Send a media key (mky) grant in the attestation for DTLS calls.\n-\t\t\t\t\t(not common)\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- STIR/SHAKEN TN options\n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Must be of type 'tn'.\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- File path to a certificate\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- URL to the public certificate\n- \n- Must be a valid http, or https, URL.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Attestation level\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- On load, Retrieve all TN's certificates and validate their dates\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Send a media key (mky) grant in the attestation for DTLS calls.\n-\t\t\t\t\t(not common)\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- STIR/SHAKEN verification options\n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Globally disable verification\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- A boolean indicating whether trusted CA certificates should be loaded from the system\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Path to a file containing one or more CA certs in PEM format\n- \n- These certs are used to verify the chain of trust for the\n-\t\t\t\t\t\tcertificate retrieved from the X5U Identity header parameter. This\n-\t\t\t\t\t\tfile must have the root CA certificate, the certificate of the\n-\t\t\t\t\t\tissuer of the X5U certificate, and any intermediate certificates\n-\t\t\t\t\t\tbetween them.\n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Path to a directory containing one or more hashed CA certs\n- \n- \n- \n- For this option, the individual certificates must be placed in\n-\t\t\t\t\t\tthe directory specified and hashed using the\n- openssl rehash\n- command.\n- \n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Path to a file containing one or more CRLs in PEM format\n- \n- If you with to check if the certificate in the X5U Identity header\n-\t\t\t\t\t\tparameter has been revoked, you'll need the certificate revocation\n-\t\t\t\t\t\tlist generated by the issuer.\n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Path to a directory containing one or more hashed CRLs\n- \n- \n- \n- For this option, the individual CRLs must be placed in\n-\t\t\t\t\t\tthe directory specified and hashed using the\n- openssl rehash\n- command.\n- \n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Path to a file containing one or more untrusted cert in PEM format used to verify CRLs\n- \n- If you with to check if the certificate in the X5U Identity header\n-\t\t\t\t\tparameter has been revoked, you'll need the certificate revocation\n-\t\t\t\t\tlist generated by the issuer. Unfortunately, sometimes the CRLs are signed by a\n-\t\t\t\t\tdifferent CA than the certificate being verified. In this case, you\n-\t\t\t\t\tmay need to provide the untrusted certificate to verify the CRL.\n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Path to a directory containing one or more hashed untrusted certs used to verify CRLs\n- \n- \n- \n- For this option, the individual certificates must be placed in\n-\t\t\t\t\t\tthe directory specified and hashed using the\n- openssl rehash\n- command.\n- \n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Directory to cache retrieved verification certs\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Maximum time to wait to CURL certificates\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Number of seconds a cache entry may be behind current time\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Maximum size to use for caching public keys\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Number of seconds an iat grant may be behind current time\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Number of seconds a SIP Date header may be behind current time\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- The default failure action when not set on a profile\n- \n- \n- \n- \n- If set to\n- continue\n- , continue and let\n-\t\t\t\t\t\t\tthe dialplan decide what action to take.\n- \n- \n- \n- \n- If set to\n- reject_request\n- , reject the incoming\n-\t\t\t\t\t\t\trequest with response codes defined in RFC8224.\n- \n- \n- \n- \n- If set to\n- return_reason\n- , continue to the\n-\t\t\t\t\t\t\tdialplan but add a\n- Reason\n- header to the sender in\n-\t\t\t\t\t\t\tthe next provisional response.\n- \n- \n- \n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- RFC9410 uses the STIR protocol on Reason headers\n-\t\t\t\t\tinstead of the SIP protocol\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Relaxes check for \"https\" and port 443 or 8443\n-\t\t\t\t\tin incoming Identity header x5u URLs.\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Relaxes check for query parameters, user/password, etc.\n-\t\t\t\t\tin incoming Identity header x5u URLs.\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- An existing ACL from acl.conf to use when checking\n-\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- An IP or subnet to permit when checking\n-\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- An IP or subnet to deny checking\n-\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- STIR/SHAKEN profile configuration options\n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Must be of type 'profile'.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 18.22.0\n- 20.7.0\n- 21.2.0\n- \n- Actions performed when an endpoint references this profile\n- \n- \n- \n- Don't do any STIR/SHAKEN processing.\n- \n- \n- Attest on outgoing calls.\n- \n- \n- Verify incoming calls.\n- \n- \n- Attest outgoing calls and verify incoming calls.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- 16.15.0\n- \n- Gets the number of STIR/SHAKEN results or a specific STIR/SHAKEN value from a result on the channel.\n- \n- \n- The index of the STIR/SHAKEN result to get. If only 'count' is passed in, gets the number of STIR/SHAKEN results instead.\n- \n- \n- The value to get from the STIR/SHAKEN result. Only used when an index is passed in (instead of 'count'). Allowable values:\n- \n- \n- \n- \n- \n- \n- \n- \n- This function will either return the number of STIR/SHAKEN identities, or return information on the specified identity.\n-\t\t\tTo get the number of identities, just pass 'count' as the only parameter to the function. If you want to get information on a\n-\t\t\tspecific STIR/SHAKEN identity, you can get the number of identities and then pass an index as the first parameter and one of\n-\t\t\tthe values you would like to retrieve as the second parameter.\n- same => n,NoOp(Number of STIR/SHAKEN identities: ${STIR_SHAKEN(count)})\n-\t\t\tsame => n,NoOp(Identity ${STIR_SHAKEN(0, identity)} has attestation level ${STIR_SHAKEN(0, attestation)})\n- \n- \n \n bluetooth\n no\n extended\n \n \n no\n"}]}]}]}]}]}