/*
 * Copyright (C) 2009 kamailio.org
 *
 * This file is part of Kamailio, a free SIP server.
 *
 * Permission to use, copy, modify, and distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */

/*!
 * \file
 * \brief Kamailio topoh :: Module interface
 * \ingroup topoh
 * Module: \ref topoh
 */

/*! \defgroup topoh Kamailio :: Topology hiding
 *
 * This module hides the SIP routing headers that show topology details.
 * It is not affected by the server being transaction stateless or
 * stateful. The script interpreter gets the SIP messages decoded, so all
 * existing functionality is preserved.
 */

#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <unistd.h>

#include "../../core/sr_module.h"
#include "../../core/events.h"
#include "../../core/dprint.h"
#include "../../core/tcp_options.h"
#include "../../core/ut.h"
#include "../../core/forward.h"
#include "../../core/config.h"
#include "../../core/fmsg.h"
#include "../../core/onsend.h"
#include "../../core/kemi.h"
#include "../../core/str_hash.h"
#include "../../core/parser/msg_parser.h"
#include "../../core/parser/parse_uri.h"
#include "../../core/parser/parse_to.h"
#include "../../core/parser/parse_from.h"

#include "../../modules/sanity/api.h"

#include "th_mask.h"
#include "th_msg.h"
#include "api.h"

MODULE_VERSION


#define TH_MASKMODE_SLIP3XXCONTACT 1
#define TH_HT_SIZE 10

struct th_socket_strings
{
	str ip;
	str via_prefix;
	str uri_prefix;
};

/** module parameters */
str _th_key = str_init("aL9.n8~Hm]Z");
str th_cookie_name = str_init("TH"); /* lost parameter? */
str th_cookie_value = {0, 0};		 /* lost parameter? */
str th_ip = str_init("127.0.0.8");
str th_uparam_name = str_init("line");
str th_uparam_prefix = str_init("sr-");
str th_vparam_name = str_init("branch");
str th_vparam_prefix = str_init("z9hG4bKsr-");

str th_callid_prefix = str_init("!!:");
str th_via_prefix = {0, 0};
str th_uri_prefix = {0, 0};

int th_param_mask_callid = 0;
int th_param_mask_mode = 0;

int th_sanity_checks = 0;
int th_uri_prefix_checks = 0;
int th_mask_addr_myself = 0;
int _th_use_mode = 0;

struct str_hash_table *th_socket_hash_table;

static sanity_api_t _tph_scb;

int th_msg_received(sr_event_param_t *evp);
int th_msg_sent(sr_event_param_t *evp);
int th_execute_event_route(sip_msg_t *msg, sr_event_param_t *evp, int evtype,
		int evidx, str *evname);
int th_build_via_prefix(str *via_prefix, str *ip);
int th_build_uri_prefix(str *uri_prefix, str *ip);
int th_parse_socket_list(socket_info_t *socket);

/** module functions */
static int mod_init(void);

#define TH_EVENTRT_OUTGOING 1
#define TH_EVENTRT_SENDING 2
static int _th_eventrt_mode = TH_EVENTRT_OUTGOING | TH_EVENTRT_SENDING;
static int _th_eventrt_outgoing = -1;
static str _th_eventrt_callback = STR_NULL;
static str _th_eventrt_outgoing_name = str_init("topoh:msg-outgoing");
static int _th_eventrt_sending = -1;
static str _th_eventrt_sending_name = str_init("topoh:msg-sending");

/* clang-format off */
static param_export_t params[] = {
	{"mask_key", PARAM_STR, &_th_key},
	{"mask_ip", PARAM_STR, &th_ip},
	{"mask_callid", PARAM_INT, &th_param_mask_callid},
	{"mask_mode", PARAM_INT, &th_param_mask_mode},
	{"uparam_name", PARAM_STR, &th_uparam_name},
	{"uparam_prefix", PARAM_STR, &th_uparam_prefix},
	{"vparam_name", PARAM_STR, &th_vparam_name},
	{"vparam_prefix", PARAM_STR, &th_vparam_prefix},
	{"callid_prefix", PARAM_STR, &th_callid_prefix},
	{"sanity_checks", PARAM_INT, &th_sanity_checks},
	{"uri_prefix_checks", PARAM_INT, &th_uri_prefix_checks},
	{"event_callback", PARAM_STR, &_th_eventrt_callback},
	{"event_mode", PARAM_INT, &_th_eventrt_mode},
	{"use_mode", PARAM_INT, &_th_use_mode},
	{0, 0, 0}
};

static cmd_export_t cmds[] = {
	{"bind_topoh", (cmd_function)bind_topoh, 0, 0, 0, 0},
	{0, 0, 0, 0, 0, 0}
};

/** module exports */
struct module_exports exports = {
	"topoh",		 /* module name */
	DEFAULT_DLFLAGS, /* dlopen flags */
	cmds,			 /* exported functions */
	params,			 /* exported parameters */
	0,				 /* exported rpc functions */
	0,				 /* exported pseudo-variables */
	0,				 /* response handling function */
	mod_init,		 /* module init function */
	0,				 /* per-child init function */
	0				 /* module destroy function */
};
/* clang-format on */

/**
 * init module function
 */
static int mod_init(void)
{
	sip_uri_t puri;
	char buri[MAX_URI_SIZE];

	if(_th_use_mode == 1) {
		/* use in library mode, not for processing sip messages */
		th_mask_init();
		return 0;
	}

	_th_eventrt_outgoing = route_lookup(&event_rt, _th_eventrt_outgoing_name.s);
	if(_th_eventrt_outgoing < 0
			|| event_rt.rlist[_th_eventrt_outgoing] == NULL) {
		_th_eventrt_outgoing = -1;
	}
	_th_eventrt_sending = route_lookup(&event_rt, _th_eventrt_sending_name.s);
	if(_th_eventrt_sending < 0 || event_rt.rlist[_th_eventrt_sending] == NULL) {
		_th_eventrt_sending = -1;
	}

	if(faked_msg_init() < 0) {
		LM_ERR("failed to init fmsg\n");
		return -1;
	}

	if(th_sanity_checks != 0) {
		if(sanity_load_api(&_tph_scb) < 0) {
			LM_ERR("cannot bind to sanity module\n");
			goto error;
		}
	}

	if(th_ip.len != 0) {
		if(th_ip.len + 32 >= MAX_URI_SIZE) {
			LM_ERR("mask address is too long\n");
			goto error;
		}
		memcpy(buri, "sip:", 4);
		memcpy(buri + 4, th_ip.s, th_ip.len);
		buri[th_ip.len + 8] = '\0';

		if(parse_uri(buri, th_ip.len + 4, &puri) < 0) {
			LM_ERR("mask uri is invalid\n");
			goto error;
		}
		if(check_self(&puri.host, puri.port_no, 0) == 1) {
			th_mask_addr_myself = 1;
			LM_INFO("mask address matches myself [%.*s]\n", th_ip.len, th_ip.s);
		}

		if(th_build_via_prefix(&th_via_prefix, &th_ip)) {
			goto error;
		}
		if(th_build_uri_prefix(&th_uri_prefix, &th_ip)) {
			goto error;
		}
	} else {
		th_socket_hash_table = pkg_malloc(sizeof(struct str_hash_table));
		if(th_socket_hash_table == NULL) {
			PKG_MEM_ERROR_FMT("th_socket_hash_table\n");
			goto error;
		}
		if(str_hash_alloc(th_socket_hash_table, TH_HT_SIZE))
			goto error;

		str_hash_init(th_socket_hash_table);
		if(th_parse_socket_list(*get_sock_info_list(PROTO_UDP)) != 0
				|| th_parse_socket_list(*get_sock_info_list(PROTO_TCP)) != 0
				|| th_parse_socket_list(*get_sock_info_list(PROTO_TLS)) != 0
				|| th_parse_socket_list(*get_sock_info_list(PROTO_SCTP)) != 0)
			goto error;
	}

	th_mask_init();
	sr_event_register_cb(SREV_NET_DATA_IN, th_msg_received);
	sr_event_register_cb(SREV_NET_DATA_OUT, th_msg_sent);
#ifdef USE_TCP
	tcp_set_clone_rcvbuf(1);
#endif
	return 0;
error:
	if(th_socket_hash_table != NULL && th_socket_hash_table->table)
		pkg_free(th_socket_hash_table->table);

	if(th_socket_hash_table != NULL)
		pkg_free(th_socket_hash_table);
	return -1;
}

/**
 *
 */
int th_build_via_prefix(str *via_prefix, str *ip)
{
	/* 'SIP/2.0/UDP ' + ip + ';' + param + '=' + prefix (+ '\0') */
	via_prefix->len =
			12 + ip->len + 1 + th_vparam_name.len + 1 + th_vparam_prefix.len;
	via_prefix->s = (char *)pkg_malloc(via_prefix->len + 1);
	if(via_prefix->s == NULL) {
		PKG_MEM_ERROR_FMT("via prefix\n");
		return 1;
	}

	/* build via prefix */
	memcpy(via_prefix->s, "SIP/2.0/UDP ", 12);
	memcpy(via_prefix->s + 12, ip->s, ip->len);
	via_prefix->s[12 + ip->len] = ';';
	memcpy(via_prefix->s + 12 + ip->len + 1, th_vparam_name.s,
			th_vparam_name.len);
	via_prefix->s[12 + ip->len + 1 + th_vparam_name.len] = '=';
	memcpy(via_prefix->s + 12 + ip->len + 1 + th_vparam_name.len + 1,
			th_vparam_prefix.s, th_vparam_prefix.len);
	via_prefix->s[via_prefix->len] = '\0';
	LM_DBG("VIA prefix: [%s]\n", via_prefix->s);

	return 0;
}

/**
 *
 */
int th_build_uri_prefix(str *uri_prefix, str *ip)
{
	/* 'sip:' + ip + ';' + param + '=' + prefix (+ '\0') */
	uri_prefix->len =
			4 + ip->len + 1 + th_uparam_name.len + 1 + th_uparam_prefix.len;
	uri_prefix->s = (char *)pkg_malloc(uri_prefix->len + 1);
	if(uri_prefix->s == NULL) {
		PKG_MEM_ERROR_FMT("uri prefix\n");
		return 1;
	}

	/* build uri prefix */
	memcpy(uri_prefix->s, "sip:", 4);
	memcpy(uri_prefix->s + 4, ip->s, ip->len);
	uri_prefix->s[4 + ip->len] = ';';
	memcpy(uri_prefix->s + 4 + ip->len + 1, th_uparam_name.s,
			th_uparam_name.len);
	uri_prefix->s[4 + ip->len + 1 + th_uparam_name.len] = '=';
	memcpy(uri_prefix->s + 4 + ip->len + 1 + th_uparam_name.len + 1,
			th_uparam_prefix.s, th_uparam_prefix.len);
	uri_prefix->s[uri_prefix->len] = '\0';
	LM_DBG("URI prefix: [%s]\n", uri_prefix->s);

	return 0;
}

/**
 *
 */
int th_build_socket_strings(socket_info_t *socket)
{
	struct th_socket_strings *socket_strings = NULL;
	struct str_hash_entry *table_entry = NULL;
	str *socket_ip = NULL;

	if(str_hash_get(
			   th_socket_hash_table, socket->sockname.s, socket->sockname.len)
			!= 0)
		return 0;

	socket_strings = pkg_mallocxz(sizeof(struct th_socket_strings));
	if(socket_strings == NULL) {
		PKG_MEM_ERROR_FMT("socket_strings\n");
		goto error;
	}
	table_entry = pkg_mallocxz(sizeof(struct str_hash_entry));
	if(table_entry == NULL) {
		PKG_MEM_ERROR_FMT("table_entry\n");
		goto error;
	}
	if(pkg_str_dup(&table_entry->key, &socket->sockname)) {
		PKG_MEM_ERROR_FMT("table_entry.key.s\n");
		goto error;
	}
	table_entry->u.p = socket_strings;

	if(socket->useinfo.address_str.len > 0) {
		LM_DBG("Using socket %s advertised ip %s\n", socket->sockname.s,
				socket->useinfo.address_str.s);
		socket_ip = &socket->useinfo.address_str;
	} else {
		LM_DBG("using socket %s ip %s\n", socket->sockname.s,
				socket->address_str.s);
		socket_ip = &socket->address_str;
	}
	if(pkg_str_dup(&socket_strings->ip, socket_ip)) {
		PKG_MEM_ERROR_FMT("socket_strings.ip\n");
		goto error;
	}
	th_build_via_prefix(&socket_strings->via_prefix, socket_ip);
	th_build_uri_prefix(&socket_strings->uri_prefix, socket_ip);
	str_hash_add(th_socket_hash_table, table_entry);

	return 0;

error:
	if(socket_strings != NULL) {
		if(socket_strings->ip.s != NULL) {
			pkg_free(socket_strings->ip.s);
		}
		pkg_free(socket_strings);
	}
	if(table_entry != NULL) {
		if(table_entry->key.s != NULL) {
			pkg_free(table_entry->key.s);
		}
		pkg_free(table_entry);
	}
	return -1;
}

/**
 *
 */
int th_parse_socket_list(socket_info_t *socket)
{
	while(socket != NULL) {
		if(th_build_socket_strings(socket) != 0)
			return -1;
		socket = socket->next;
	}

	return 0;
}

/**
 *
 */
int th_get_socket_strings(
		socket_info_t *socket, str **ip, str **via_prefix, str **uri_prefix)
{
	struct th_socket_strings *socket_strings;
	struct str_hash_entry *table_entry;

	if(th_ip.len > 0) {
		*ip = &th_ip;
		*via_prefix = &th_via_prefix;
		*uri_prefix = &th_uri_prefix;
	} else {
		table_entry = str_hash_get(
				th_socket_hash_table, socket->sockname.s, socket->sockname.len);
		if(table_entry == 0) {
			LM_DBG("No entry for socket %s", socket->sockname.s);
			return -1;
		} else {
			socket_strings = table_entry->u.p;
		}

		*ip = &socket_strings->ip;
		*via_prefix = &socket_strings->via_prefix;
		*uri_prefix = &socket_strings->uri_prefix;
	}

	return 0;
}

/**
 *
 */
int th_prepare_msg(sip_msg_t *msg)
{
	if(parse_msg(msg->buf, msg->len, msg) != 0) {
		LM_DBG("outbuf buffer parsing failed!");
		return 1;
	}

	if(msg->first_line.type == SIP_REQUEST) {
		if(!IS_SIP(msg)) {
			LM_DBG("non sip request message\n");
			return 1;
		}
	} else if(msg->first_line.type == SIP_REPLY) {
		if(!IS_SIP_REPLY(msg)) {
			LM_DBG("non sip reply message\n");
			return 1;
		}
	} else {
		LM_DBG("unknown sip message type %d\n", msg->first_line.type);
		return 1;
	}

	if(parse_headers(msg, HDR_EOH_F, 0) == -1) {
		LM_DBG("parsing headers failed [[%.*s]]\n", msg->len, msg->buf);
		return 2;
	}

	/* force 2nd via parsing here - it helps checking it later */
	if(parse_headers(msg, HDR_VIA2_F, 0) == -1 || (msg->via2 == 0)
			|| (msg->via2->error != PARSE_OK)) {
		LM_DBG("no second via in this message \n");
	}

	if(parse_from_header(msg) < 0) {
		LM_ERR("cannot parse FROM header\n");
		return 3;
	}

	if(parse_to_header(msg) < 0 || msg->to == NULL) {
		LM_ERR("cannot parse TO header\n");
		return 3;
	}

	if(get_to(msg) == NULL) {
		LM_ERR("cannot get TO header\n");
		return 3;
	}

	if(msg->via1 == NULL || msg->callid == NULL) {
		LM_ERR("mandatory headers missing - via1: %p callid: %p\n", msg->via1,
				msg->callid);
		return 4;
	}

	return 0;
}

/**
 *
 */
int th_msg_received(sr_event_param_t *evp)
{
	sip_msg_t msg;
	str *obuf;
	char *nbuf = NULL;
	int direction;
	int dialog;
	str *ip;
	str *via_prefix;
	str *uri_prefix;

	if(th_get_socket_strings(
			   evp->rcv->bind_address, &ip, &via_prefix, &uri_prefix)) {
		LM_ERR("Socket address handling failed\n");
		return -1;
	}

	obuf = (str *)evp->data;
	memset(&msg, 0, sizeof(sip_msg_t));
	msg.buf = obuf->s;
	msg.len = obuf->len;

	if(th_prepare_msg(&msg) != 0) {
		goto done;
	}

	if(th_skip_msg(&msg)) {
		goto done;
	}

	direction = 0;
	th_cookie_value.s = "xx";
	th_cookie_value.len = 2;
	if(msg.first_line.type == SIP_REQUEST) {
		if(th_sanity_checks != 0) {
			if(_tph_scb.check_defaults(&msg) < 1) {
				LM_ERR("sanity checks failed\n");
				goto done;
			}
		}
		dialog = (get_to(&msg)->tag_value.len > 0) ? 1 : 0;
		if(dialog) {
			direction = th_route_direction(&msg);
			if(direction < 0) {
				LM_ERR("not able to detect direction\n");
				goto done;
			}
			th_cookie_value.s = (direction == 0) ? "dc" : "uc";
		} else {
			th_cookie_value.s = "di";
		}
		if(dialog) {
			/* dialog request */
			th_unmask_ruri(&msg, uri_prefix);
			th_unmask_route(&msg, uri_prefix);
			th_unmask_refer_to(&msg, uri_prefix);
			if(direction == 1) {
				th_unmask_callid(&msg);
			}
		}
	} else {
		/* reply */
		if(msg.via2 == 0) {
			/* one Via in received reply -- it is for local generated request
			 * - nothing to unhide unless is CANCEL/ACK */
			if(!((get_cseq(&msg)->method_id) & (METHOD_CANCEL)))
				goto done;
		}

		th_unmask_via(&msg, ip, &th_cookie_value);
		th_flip_record_route(&msg, uri_prefix, ip, 0);
		if(th_cookie_value.s[0] == 'u') {
			th_cookie_value.s = "dc";
		} else {
			th_cookie_value.s = "uc";
			th_unmask_callid(&msg);
		}
		th_cookie_value.len = 2;
	}

	LM_DBG("adding cookie: %.*s\n", th_cookie_value.len, th_cookie_value.s);

	th_add_cookie(&msg);
	nbuf = th_msg_update(&msg, (unsigned int *)&obuf->len);

	if(obuf->len >= BUF_SIZE) {
		LM_ERR("new buffer overflow (%d)\n", obuf->len);
		pkg_free(nbuf);
		return -1;
	}
	memcpy(obuf->s, nbuf, obuf->len);
	obuf->s[obuf->len] = '\0';

done:
	if(nbuf != NULL)
		pkg_free(nbuf);
	free_sip_msg(&msg);
	return 0;
}

/**
 *
 */
int th_msg_sent(sr_event_param_t *evp)
{
	sip_msg_t msg;
	str *obuf;
	int direction;
	int dialog;
	int local;
	str nbuf = STR_NULL;
	str *ip;
	str *via_prefix;
	str *uri_prefix;

	if(th_get_socket_strings(
			   evp->dst->send_sock, &ip, &via_prefix, &uri_prefix)) {
		LM_ERR("Socket address handling failed\n");
		return -1;
	}

	obuf = (str *)evp->data;

	if(th_execute_event_route(NULL, evp, TH_EVENTRT_OUTGOING,
			   _th_eventrt_outgoing, &_th_eventrt_outgoing_name)
			== 1) {
		return 0;
	}

	memset(&msg, 0, sizeof(sip_msg_t));
	msg.buf = obuf->s;
	msg.len = obuf->len;

	if(th_prepare_msg(&msg) != 0) {
		goto done;
	}

	if(th_skip_msg(&msg)) {
		goto done;
	}

	th_cookie_value.s = th_get_cookie(&msg, &th_cookie_value.len);
	LM_DBG("the COOKIE is [%.*s]\n", th_cookie_value.len, th_cookie_value.s);
	if(th_cookie_value.s[0] != 'x') {
		th_del_cookie(&msg);
	}

	if(th_execute_event_route(&msg, evp, TH_EVENTRT_SENDING,
			   _th_eventrt_sending, &_th_eventrt_sending_name)
			== 1) {
		goto done;
	}

	if(msg.first_line.type == SIP_REQUEST) {
		direction =
				(th_cookie_value.s[0] == 'u') ? 1 : 0; /* upstream/downstram */
		dialog = (get_to(&msg)->tag_value.len > 0) ? 1 : 0;

		if(msg.via2 == 0) {
			local = 1;
			if(direction == 0 && th_cookie_value.s[1] == 'l') {
				/* downstream local request (e.g., dlg bye) */
				local = 2;
			}
		} else {
			/* more than one Via, but no received th cookie */
			local = (th_cookie_value.s[0] != 'd' && th_cookie_value.s[0] != 'u')
							? 1
							: 0;
		}
		/* local generated requests */
		if(local) {
			/* ACK and CANCEL go downstream */
			if(get_cseq(&msg)->method_id == METHOD_ACK
					|| get_cseq(&msg)->method_id == METHOD_CANCEL
					|| local == 2) {
				th_mask_callid(&msg);
				goto ready;
			} else {
				/* should be for upstream */
				goto done;
			}
		}
		th_mask_via(&msg, via_prefix);
		th_mask_contact(&msg, uri_prefix);
		th_mask_record_route(&msg, uri_prefix);
		if(dialog) {
			/* dialog request */
			if(direction == 0) {
				/* downstream */
				th_mask_callid(&msg);
			}
		} else {
			/* initial request */
			th_update_hdr_replaces(&msg);
			th_mask_callid(&msg);
		}
	} else {
		/* reply */
		if(th_cookie_value.s[th_cookie_value.len - 1] == 'x') {
			/* ?!?! - we should have a cookie in any reply case */
			goto done;
		}
		if(th_cookie_value.s[th_cookie_value.len - 1] == 'v') {
			/* reply generated locally - direction was set by request */
			if(th_cookie_value.s[0] == 'u') {
				th_mask_callid(&msg);
			}
		} else {
			th_flip_record_route(&msg, uri_prefix, ip, 1);
			if(!(th_param_mask_mode & TH_MASKMODE_SLIP3XXCONTACT)
					|| msg.first_line.u.reply.statuscode < 300
					|| msg.first_line.u.reply.statuscode > 399) {
				th_mask_contact(&msg, uri_prefix);
			}
			if(th_cookie_value.s[0] == 'd') {
				th_mask_callid(&msg);
			}
		}
	}

ready:
	nbuf.s = th_msg_update(&msg, (unsigned int *)&nbuf.len);
	if(nbuf.s != NULL) {
		LM_DBG("new outbound buffer generated\n");
		pkg_free(obuf->s);
		obuf->s = nbuf.s;
		obuf->len = nbuf.len;
	} else {
		LM_ERR("failed to generate new outbound buffer\n");
	}

done:
	free_sip_msg(&msg);
	return 0;
}

/**
 *
 */
int th_execute_event_route(sip_msg_t *msg, sr_event_param_t *evp, int evtype,
		int evidx, str *evname)
{
	struct sip_msg *fmsg;
	struct run_act_ctx ctx;
	int rtb;
	sr_kemi_eng_t *keng = NULL;
	struct onsend_info onsnd_info = {0};

	if(!(_th_eventrt_mode & evtype)) {
		return 0;
	}

	if(evidx < 0) {
		if(_th_eventrt_callback.s != NULL || _th_eventrt_callback.len > 0) {
			keng = sr_kemi_eng_get();
			if(keng == NULL) {
				LM_DBG("event callback (%s) set, but no cfg engine\n",
						_th_eventrt_callback.s);
				goto done;
			}
		}
	}

	if(evidx < 0 && keng == NULL) {
		return 0;
	}

	LM_DBG("executing event_route[topoh:...] (%d)\n", _th_eventrt_outgoing);
	fmsg = faked_msg_next();

	onsnd_info.to = &evp->dst->to;
	onsnd_info.send_sock = evp->dst->send_sock;
	if(msg != NULL) {
		onsnd_info.buf = msg->buf;
		onsnd_info.len = msg->len;
		onsnd_info.msg = msg;
	} else {
		onsnd_info.buf = fmsg->buf;
		onsnd_info.len = fmsg->len;
		onsnd_info.msg = fmsg;
	}
	p_onsend = &onsnd_info;

	rtb = get_route_type();
	set_route_type(REQUEST_ROUTE);
	init_run_actions_ctx(&ctx);
	if(evidx >= 0) {
		run_top_route(event_rt.rlist[evidx], (msg) ? msg : fmsg, &ctx);
	} else {
		if(keng != NULL) {
			if(sr_kemi_ctx_route(keng, &ctx, (msg) ? msg : fmsg, EVENT_ROUTE,
					   &_th_eventrt_callback, evname)
					< 0) {
				LM_ERR("error running event route kemi callback\n");
				p_onsend = NULL;
				return -1;
			}
		}
	}
	set_route_type(rtb);
	if(ctx.run_flags & DROP_R_F) {
		LM_DBG("exit due to 'drop' in event route\n");
		p_onsend = NULL;
		return 1;
	}

done:
	p_onsend = NULL;
	return 0;
}

/**
 *
 */
int bind_topoh(topoh_api_t *api)
{
	if(!api) {
		ERR("Invalid parameter value\n");
		return -1;
	}

	memset(api, 0, sizeof(topoh_api_t));
	api->mask_callid = th_mask_callid_str;
	api->unmask_callid = th_unmask_callid_str;

	return 0;
}
