|
|
|
@ -448,6 +448,7 @@ static void options(int *argc, char ***argv) {
|
|
|
|
|
AUTO_CLEANUP_GBUF(mqtt_publish_scope);
|
|
|
|
|
#endif
|
|
|
|
|
AUTO_CLEANUP_GBUF(mos);
|
|
|
|
|
AUTO_CLEANUP_GBUF(dcc);
|
|
|
|
|
|
|
|
|
|
rwlock_lock_w(&rtpe_config.config_lock);
|
|
|
|
|
|
|
|
|
@ -533,6 +534,7 @@ static void options(int *argc, char ***argv) {
|
|
|
|
|
{ "debug-srtp",0,0, G_OPTION_ARG_NONE, &debug_srtp, "Log raw encryption details for SRTP", NULL },
|
|
|
|
|
{ "reject-invalid-sdp",0,0, G_OPTION_ARG_NONE, &rtpe_config.reject_invalid_sdp,"Refuse to process SDP bodies with broken syntax", NULL },
|
|
|
|
|
{ "dtls-rsa-key-size",0, 0, G_OPTION_ARG_INT,&rtpe_config.dtls_rsa_key_size,"Size of RSA key for DTLS", "INT" },
|
|
|
|
|
{ "dtls-cert-cipher",0, 0,G_OPTION_ARG_STRING, &dcc, "Cipher to use for the DTLS certificate","RSA" },
|
|
|
|
|
{ "dtls-mtu",0, 0, G_OPTION_ARG_INT,&rtpe_config.dtls_mtu,"DTLS MTU", "INT" },
|
|
|
|
|
{ "dtls-ciphers",0, 0, G_OPTION_ARG_STRING, &rtpe_config.dtls_ciphers,"List of ciphers for DTLS", "STRING" },
|
|
|
|
|
{ "dtls-signature",0, 0,G_OPTION_ARG_STRING, &dtls_sig, "Signature algorithm for DTLS", "SHA-256|SHA-1" },
|
|
|
|
@ -853,6 +855,19 @@ static void options(int *argc, char ***argv) {
|
|
|
|
|
die("Invalid --mos option ('%s')", mos);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (dcc) {
|
|
|
|
|
if (!strcasecmp(dcc, "rsa"))
|
|
|
|
|
rtpe_config.dtls_cert_cipher = DCC_RSA;
|
|
|
|
|
else if (!strcasecmp(dcc, "prime256v1"))
|
|
|
|
|
rtpe_config.dtls_cert_cipher = DCC_EC_PRIME256v1;
|
|
|
|
|
else if (!strcasecmp(dcc, "ec_prime256v1"))
|
|
|
|
|
rtpe_config.dtls_cert_cipher = DCC_EC_PRIME256v1;
|
|
|
|
|
else if (!strcasecmp(dcc, "ec-prime256v1"))
|
|
|
|
|
rtpe_config.dtls_cert_cipher = DCC_EC_PRIME256v1;
|
|
|
|
|
else
|
|
|
|
|
die("Invalid --dtls-cert-cipher option ('%s')", dcc);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rwlock_unlock_w(&rtpe_config.config_lock);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|