Changeset 861 for pjproject/trunk/pjsip-apps/src/pjsua/pjsua_app.c
- Timestamp:
- Dec 25, 2006 6:43:59 AM (17 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
pjproject/trunk/pjsip-apps/src/pjsua/pjsua_app.c
r849 r861 139 139 puts (" --use-stun1=host[:port]"); 140 140 puts (" --use-stun2=host[:port] Resolve local IP with the specified STUN servers"); 141 #if defined(PJSIP_HAS_TLS_TRANSPORT) && PJSIP_HAS_TLS_TRANSPORT!=0 141 puts (""); 142 puts ("TLS Options:"); 142 143 puts (" --use-tls Enable TLS transport"); 143 puts (" --tls-ca-file Specify TLS CA file"); 144 puts (" --tls-key-file Specify TLS client key file"); 145 puts (" --tls-password Specify TLS password"); 146 #endif 144 puts (" --tls-ca-file Specify TLS CA file (default=none)"); 145 puts (" --tls-cert-file Specify TLS certificate file (default=none)"); 146 puts (" --tls-privkey-file Specify TLS private key file (default=none)"); 147 puts (" --tls-password Specify TLS password to private key file (default=none)"); 148 puts (" --tls-verify-server Verify server's certificate (default=no)"); 149 puts (" --tls-verify-client Verify client's certificate (default=no)"); 150 puts (" --tls-neg-timeout Specify TLS negotiation timeout (default=no)"); 151 147 152 puts (""); 148 153 puts ("Media Options:"); … … 307 312 OPT_DURATION, OPT_NO_TCP, OPT_NO_UDP, OPT_THREAD_CNT, 308 313 OPT_NOREFERSUB, 309 OPT_USE_TLS, OPT_TLS_CA_FILE, OPT_TLS_KEY_FILE, OPT_TLS_PASSWORD, 314 OPT_USE_TLS, OPT_TLS_CA_FILE, OPT_TLS_CERT_FILE, OPT_TLS_PRIV_FILE, 315 OPT_TLS_PASSWORD, OPT_TLS_VERIFY_SERVER, OPT_TLS_VERIFY_CLIENT, 316 OPT_TLS_NEG_TIMEOUT, 310 317 }; 311 318 struct pj_getopt_option long_options[] = { … … 364 371 { "use-tls", 0, 0, OPT_USE_TLS}, 365 372 { "tls-ca-file",1, 0, OPT_TLS_CA_FILE}, 366 { "tls-key-file",1,0, OPT_TLS_KEY_FILE}, 373 { "tls-cert-file",1,0, OPT_TLS_CERT_FILE}, 374 { "tls-privkey-file",1,0, OPT_TLS_PRIV_FILE}, 367 375 { "tls-password",1,0, OPT_TLS_PASSWORD}, 376 { "tls-verify-server", 0, 0, OPT_TLS_VERIFY_SERVER}, 377 { "tls-verify-client", 0, 0, OPT_TLS_VERIFY_CLIENT}, 378 { "tls-neg-timeout", 1, 0, OPT_TLS_NEG_TIMEOUT}, 368 379 { NULL, 0, 0, 0} 369 380 }; … … 789 800 case OPT_USE_TLS: 790 801 cfg->use_tls = PJ_TRUE; 802 #if !defined(PJSIP_HAS_TLS_TRANSPORT) || PJSIP_HAS_TLS_TRANSPORT==0 803 PJ_LOG(1,(THIS_FILE, "Error: TLS support is not configured")); 804 return -1; 805 #endif 791 806 break; 792 807 793 808 case OPT_TLS_CA_FILE: 794 cfg->udp_cfg.tls_ca_file = pj_str(pj_optarg); 809 cfg->udp_cfg.tls_setting.ca_list_file = pj_str(pj_optarg); 810 #if !defined(PJSIP_HAS_TLS_TRANSPORT) || PJSIP_HAS_TLS_TRANSPORT==0 811 PJ_LOG(1,(THIS_FILE, "Error: TLS support is not configured")); 812 return -1; 813 #endif 795 814 break; 796 815 797 case OPT_TLS_KEY_FILE: 798 cfg->udp_cfg.tls_key_file = pj_str(pj_optarg); 816 case OPT_TLS_CERT_FILE: 817 cfg->udp_cfg.tls_setting.cert_file = pj_str(pj_optarg); 818 #if !defined(PJSIP_HAS_TLS_TRANSPORT) || PJSIP_HAS_TLS_TRANSPORT==0 819 PJ_LOG(1,(THIS_FILE, "Error: TLS support is not configured")); 820 return -1; 821 #endif 799 822 break; 800 823 824 case OPT_TLS_PRIV_FILE: 825 cfg->udp_cfg.tls_setting.privkey_file = pj_str(pj_optarg); 826 break; 827 801 828 case OPT_TLS_PASSWORD: 802 cfg->udp_cfg.tls_password = pj_str(pj_optarg); 829 cfg->udp_cfg.tls_setting.password = pj_str(pj_optarg); 830 #if !defined(PJSIP_HAS_TLS_TRANSPORT) || PJSIP_HAS_TLS_TRANSPORT==0 831 PJ_LOG(1,(THIS_FILE, "Error: TLS support is not configured")); 832 return -1; 833 #endif 834 break; 835 836 case OPT_TLS_VERIFY_SERVER: 837 cfg->udp_cfg.tls_setting.verify_server = PJ_TRUE; 838 break; 839 840 case OPT_TLS_VERIFY_CLIENT: 841 cfg->udp_cfg.tls_setting.verify_client = PJ_TRUE; 842 break; 843 844 case OPT_TLS_NEG_TIMEOUT: 845 cfg->udp_cfg.tls_setting.timeout.sec = atoi(pj_optarg); 803 846 break; 804 847 … … 1034 1077 if (config->use_tls) 1035 1078 pj_strcat2(&cfg, "--use-tls\n"); 1036 if (config->udp_cfg.tls_ ca_file.slen) {1079 if (config->udp_cfg.tls_setting.ca_list_file.slen) { 1037 1080 pj_ansi_sprintf(line, "--tls-ca-file %.*s\n", 1038 (int)config->udp_cfg.tls_ ca_file.slen,1039 config->udp_cfg.tls_ ca_file.ptr);1081 (int)config->udp_cfg.tls_setting.ca_list_file.slen, 1082 config->udp_cfg.tls_setting.ca_list_file.ptr); 1040 1083 pj_strcat2(&cfg, line); 1041 1084 } 1042 if (config->udp_cfg.tls_ key_file.slen) {1043 pj_ansi_sprintf(line, "--tls- key-file %.*s\n",1044 (int)config->udp_cfg.tls_ key_file.slen,1045 config->udp_cfg.tls_ key_file.ptr);1085 if (config->udp_cfg.tls_setting.cert_file.slen) { 1086 pj_ansi_sprintf(line, "--tls-cert-file %.*s\n", 1087 (int)config->udp_cfg.tls_setting.cert_file.slen, 1088 config->udp_cfg.tls_setting.cert_file.ptr); 1046 1089 pj_strcat2(&cfg, line); 1047 1090 } 1048 if (config->udp_cfg.tls_password.slen) { 1091 if (config->udp_cfg.tls_setting.privkey_file.slen) { 1092 pj_ansi_sprintf(line, "--tls-privkey-file %.*s\n", 1093 (int)config->udp_cfg.tls_setting.privkey_file.slen, 1094 config->udp_cfg.tls_setting.privkey_file.ptr); 1095 pj_strcat2(&cfg, line); 1096 } 1097 1098 if (config->udp_cfg.tls_setting.password.slen) { 1049 1099 pj_ansi_sprintf(line, "--tls-password %.*s\n", 1050 (int)config->udp_cfg.tls_password.slen, 1051 config->udp_cfg.tls_password.ptr); 1100 (int)config->udp_cfg.tls_setting.password.slen, 1101 config->udp_cfg.tls_setting.password.ptr); 1102 pj_strcat2(&cfg, line); 1103 } 1104 1105 if (config->udp_cfg.tls_setting.verify_server) 1106 pj_strcat2(&cfg, "--tls-verify-server\n"); 1107 1108 if (config->udp_cfg.tls_setting.verify_client) 1109 pj_strcat2(&cfg, "--tls-verify-client\n"); 1110 1111 if (config->udp_cfg.tls_setting.timeout.sec) { 1112 pj_ansi_sprintf(line, "--tls-neg-timeout %d\n", 1113 config->udp_cfg.tls_setting.timeout.sec); 1052 1114 pj_strcat2(&cfg, line); 1053 1115 } … … 2830 2892 /* Add TLS transport when application wants one */ 2831 2893 if (app_config.use_tls) { 2894 2895 pjsua_acc_id acc_id; 2896 2897 /* Set TLS port as TCP port+1 */ 2898 app_config.udp_cfg.port++; 2832 2899 status = pjsua_transport_create(PJSIP_TRANSPORT_TLS, 2833 2900 &app_config.udp_cfg, 2834 2901 &transport_id); 2902 app_config.udp_cfg.port--; 2835 2903 if (status != PJ_SUCCESS) 2836 2904 goto on_error; 2905 2906 /* Add local account */ 2907 pjsua_acc_add_local(transport_id, PJ_FALSE, &acc_id); 2908 pjsua_acc_set_online_status(acc_id, PJ_TRUE); 2837 2909 } 2838 2910 #endif
Note: See TracChangeset
for help on using the changeset viewer.