Alexandre Lision | 8af73cb | 2013-12-10 14:11:20 -0500 | [diff] [blame] | 1 | /* $Id$ */ |
| 2 | /* |
| 3 | * Copyright (C) 2008-2011 Teluu Inc. (http://www.teluu.com) |
| 4 | * Copyright (C) 2003-2008 Benny Prijono <benny@prijono.org> |
| 5 | * |
| 6 | * This program is free software; you can redistribute it and/or modify |
| 7 | * it under the terms of the GNU General Public License as published by |
| 8 | * the Free Software Foundation; either version 2 of the License, or |
| 9 | * (at your option) any later version. |
| 10 | * |
| 11 | * This program is distributed in the hope that it will be useful, |
| 12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 14 | * GNU General Public License for more details. |
| 15 | * |
| 16 | * You should have received a copy of the GNU General Public License |
| 17 | * along with this program; if not, write to the Free Software |
| 18 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
| 19 | */ |
| 20 | #include <pjnath.h> |
| 21 | #include <pjlib-util.h> |
| 22 | #include <pjlib.h> |
| 23 | |
| 24 | |
| 25 | #define THIS_FILE "client_main.c" |
| 26 | #define LOCAL_PORT 1998 |
| 27 | #define BANDWIDTH 64 /* -1 to disable */ |
| 28 | #define LIFETIME 600 /* -1 to disable */ |
| 29 | #define REQ_TRANSPORT -1 /* 0: udp, 1: tcp, -1: disable */ |
| 30 | #define REQ_PORT_PROPS -1 /* -1 to disable */ |
| 31 | #define REQ_IP 0 /* IP address string */ |
| 32 | |
| 33 | //#define OPTIONS PJ_STUN_NO_AUTHENTICATE |
| 34 | #define OPTIONS 0 |
| 35 | |
| 36 | |
| 37 | struct peer |
| 38 | { |
| 39 | pj_stun_sock *stun_sock; |
| 40 | pj_sockaddr mapped_addr; |
| 41 | }; |
| 42 | |
| 43 | |
| 44 | static struct global |
| 45 | { |
| 46 | pj_caching_pool cp; |
| 47 | pj_pool_t *pool; |
| 48 | pj_stun_config stun_config; |
| 49 | pj_thread_t *thread; |
| 50 | pj_bool_t quit; |
| 51 | |
| 52 | pj_dns_resolver *resolver; |
| 53 | |
| 54 | pj_turn_sock *relay; |
| 55 | pj_sockaddr relay_addr; |
| 56 | |
| 57 | struct peer peer[2]; |
| 58 | } g; |
| 59 | |
| 60 | static struct options |
| 61 | { |
| 62 | pj_bool_t use_tcp; |
| 63 | char *srv_addr; |
| 64 | char *srv_port; |
| 65 | char *realm; |
| 66 | char *user_name; |
| 67 | char *password; |
| 68 | pj_bool_t use_fingerprint; |
| 69 | char *stun_server; |
| 70 | char *nameserver; |
| 71 | } o; |
| 72 | |
| 73 | |
| 74 | static int worker_thread(void *unused); |
| 75 | static void turn_on_rx_data(pj_turn_sock *relay, |
| 76 | void *pkt, |
| 77 | unsigned pkt_len, |
| 78 | const pj_sockaddr_t *peer_addr, |
| 79 | unsigned addr_len); |
| 80 | static void turn_on_state(pj_turn_sock *relay, pj_turn_state_t old_state, |
| 81 | pj_turn_state_t new_state); |
| 82 | static pj_bool_t stun_sock_on_status(pj_stun_sock *stun_sock, |
| 83 | pj_stun_sock_op op, |
| 84 | pj_status_t status); |
| 85 | static pj_bool_t stun_sock_on_rx_data(pj_stun_sock *stun_sock, |
| 86 | void *pkt, |
| 87 | unsigned pkt_len, |
| 88 | const pj_sockaddr_t *src_addr, |
| 89 | unsigned addr_len); |
| 90 | |
| 91 | |
| 92 | static void my_perror(const char *title, pj_status_t status) |
| 93 | { |
| 94 | char errmsg[PJ_ERR_MSG_SIZE]; |
| 95 | pj_strerror(status, errmsg, sizeof(errmsg)); |
| 96 | |
| 97 | PJ_LOG(3,(THIS_FILE, "%s: %s", title, errmsg)); |
| 98 | } |
| 99 | |
| 100 | #define CHECK(expr) status=expr; \ |
| 101 | if (status!=PJ_SUCCESS) { \ |
| 102 | my_perror(#expr, status); \ |
| 103 | return status; \ |
| 104 | } |
| 105 | |
| 106 | static int init() |
| 107 | { |
| 108 | int i; |
| 109 | pj_status_t status; |
| 110 | |
| 111 | CHECK( pj_init() ); |
| 112 | CHECK( pjlib_util_init() ); |
| 113 | CHECK( pjnath_init() ); |
| 114 | |
| 115 | /* Check that server is specified */ |
| 116 | if (!o.srv_addr) { |
| 117 | printf("Error: server must be specified\n"); |
| 118 | return PJ_EINVAL; |
| 119 | } |
| 120 | |
| 121 | pj_caching_pool_init(&g.cp, &pj_pool_factory_default_policy, 0); |
| 122 | |
| 123 | g.pool = pj_pool_create(&g.cp.factory, "main", 1000, 1000, NULL); |
| 124 | |
| 125 | /* Init global STUN config */ |
| 126 | pj_stun_config_init(&g.stun_config, &g.cp.factory, 0, NULL, NULL); |
| 127 | |
| 128 | /* Create global timer heap */ |
| 129 | CHECK( pj_timer_heap_create(g.pool, 1000, &g.stun_config.timer_heap) ); |
| 130 | |
| 131 | /* Create global ioqueue */ |
| 132 | CHECK( pj_ioqueue_create(g.pool, 16, &g.stun_config.ioqueue) ); |
| 133 | |
| 134 | /* |
| 135 | * Create peers |
| 136 | */ |
| 137 | for (i=0; i<(int)PJ_ARRAY_SIZE(g.peer); ++i) { |
| 138 | pj_stun_sock_cb stun_sock_cb; |
| 139 | char name[] = "peer0"; |
| 140 | pj_uint16_t port; |
| 141 | pj_stun_sock_cfg ss_cfg; |
| 142 | pj_str_t server; |
| 143 | |
| 144 | pj_bzero(&stun_sock_cb, sizeof(stun_sock_cb)); |
| 145 | stun_sock_cb.on_rx_data = &stun_sock_on_rx_data; |
| 146 | stun_sock_cb.on_status = &stun_sock_on_status; |
| 147 | |
| 148 | g.peer[i].mapped_addr.addr.sa_family = pj_AF_INET(); |
| 149 | |
| 150 | pj_stun_sock_cfg_default(&ss_cfg); |
| 151 | #if 1 |
| 152 | /* make reading the log easier */ |
| 153 | ss_cfg.ka_interval = 300; |
| 154 | #endif |
| 155 | |
| 156 | name[strlen(name)-1] = '0'+i; |
| 157 | status = pj_stun_sock_create(&g.stun_config, name, pj_AF_INET(), |
| 158 | &stun_sock_cb, &ss_cfg, |
| 159 | &g.peer[i], &g.peer[i].stun_sock); |
| 160 | if (status != PJ_SUCCESS) { |
| 161 | my_perror("pj_stun_sock_create()", status); |
| 162 | return status; |
| 163 | } |
| 164 | |
| 165 | if (o.stun_server) { |
| 166 | server = pj_str(o.stun_server); |
| 167 | port = PJ_STUN_PORT; |
| 168 | } else { |
| 169 | server = pj_str(o.srv_addr); |
| 170 | port = (pj_uint16_t)(o.srv_port?atoi(o.srv_port):PJ_STUN_PORT); |
| 171 | } |
| 172 | status = pj_stun_sock_start(g.peer[i].stun_sock, &server, |
| 173 | port, NULL); |
| 174 | if (status != PJ_SUCCESS) { |
| 175 | my_perror("pj_stun_sock_start()", status); |
| 176 | return status; |
| 177 | } |
| 178 | } |
| 179 | |
| 180 | /* Start the worker thread */ |
| 181 | CHECK( pj_thread_create(g.pool, "stun", &worker_thread, NULL, 0, 0, &g.thread) ); |
| 182 | |
| 183 | |
| 184 | return PJ_SUCCESS; |
| 185 | } |
| 186 | |
| 187 | |
| 188 | static int client_shutdown() |
| 189 | { |
| 190 | unsigned i; |
| 191 | |
| 192 | if (g.thread) { |
| 193 | g.quit = 1; |
| 194 | pj_thread_join(g.thread); |
| 195 | pj_thread_destroy(g.thread); |
| 196 | g.thread = NULL; |
| 197 | } |
| 198 | if (g.relay) { |
| 199 | pj_turn_sock_destroy(g.relay); |
| 200 | g.relay = NULL; |
| 201 | } |
| 202 | for (i=0; i<PJ_ARRAY_SIZE(g.peer); ++i) { |
| 203 | if (g.peer[i].stun_sock) { |
| 204 | pj_stun_sock_destroy(g.peer[i].stun_sock); |
| 205 | g.peer[i].stun_sock = NULL; |
| 206 | } |
| 207 | } |
| 208 | if (g.stun_config.timer_heap) { |
| 209 | pj_timer_heap_destroy(g.stun_config.timer_heap); |
| 210 | g.stun_config.timer_heap = NULL; |
| 211 | } |
| 212 | if (g.stun_config.ioqueue) { |
| 213 | pj_ioqueue_destroy(g.stun_config.ioqueue); |
| 214 | g.stun_config.ioqueue = NULL; |
| 215 | } |
| 216 | if (g.pool) { |
| 217 | pj_pool_release(g.pool); |
| 218 | g.pool = NULL; |
| 219 | } |
| 220 | pj_pool_factory_dump(&g.cp.factory, PJ_TRUE); |
| 221 | pj_caching_pool_destroy(&g.cp); |
| 222 | |
| 223 | return PJ_SUCCESS; |
| 224 | } |
| 225 | |
| 226 | |
| 227 | static int worker_thread(void *unused) |
| 228 | { |
| 229 | PJ_UNUSED_ARG(unused); |
| 230 | |
| 231 | while (!g.quit) { |
| 232 | const pj_time_val delay = {0, 10}; |
| 233 | |
| 234 | /* Poll ioqueue for the TURN client */ |
| 235 | pj_ioqueue_poll(g.stun_config.ioqueue, &delay); |
| 236 | |
| 237 | /* Poll the timer heap */ |
| 238 | pj_timer_heap_poll(g.stun_config.timer_heap, NULL); |
| 239 | |
| 240 | } |
| 241 | |
| 242 | return 0; |
| 243 | } |
| 244 | |
| 245 | static pj_status_t create_relay(void) |
| 246 | { |
| 247 | pj_turn_sock_cb rel_cb; |
| 248 | pj_stun_auth_cred cred; |
| 249 | pj_str_t srv; |
| 250 | pj_status_t status; |
| 251 | |
| 252 | if (g.relay) { |
| 253 | PJ_LOG(1,(THIS_FILE, "Relay already created")); |
| 254 | return -1; |
| 255 | } |
| 256 | |
| 257 | /* Create DNS resolver if configured */ |
| 258 | if (o.nameserver) { |
| 259 | pj_str_t ns = pj_str(o.nameserver); |
| 260 | |
| 261 | status = pj_dns_resolver_create(&g.cp.factory, "resolver", 0, |
| 262 | g.stun_config.timer_heap, |
| 263 | g.stun_config.ioqueue, &g.resolver); |
| 264 | if (status != PJ_SUCCESS) { |
| 265 | PJ_LOG(1,(THIS_FILE, "Error creating resolver (err=%d)", status)); |
| 266 | return status; |
| 267 | } |
| 268 | |
| 269 | status = pj_dns_resolver_set_ns(g.resolver, 1, &ns, NULL); |
| 270 | if (status != PJ_SUCCESS) { |
| 271 | PJ_LOG(1,(THIS_FILE, "Error configuring nameserver (err=%d)", status)); |
| 272 | return status; |
| 273 | } |
| 274 | } |
| 275 | |
| 276 | pj_bzero(&rel_cb, sizeof(rel_cb)); |
| 277 | rel_cb.on_rx_data = &turn_on_rx_data; |
| 278 | rel_cb.on_state = &turn_on_state; |
| 279 | CHECK( pj_turn_sock_create(&g.stun_config, pj_AF_INET(), |
| 280 | (o.use_tcp? PJ_TURN_TP_TCP : PJ_TURN_TP_UDP), |
| 281 | &rel_cb, 0, |
| 282 | NULL, &g.relay) ); |
| 283 | |
| 284 | if (o.user_name) { |
| 285 | pj_bzero(&cred, sizeof(cred)); |
| 286 | cred.type = PJ_STUN_AUTH_CRED_STATIC; |
| 287 | cred.data.static_cred.realm = pj_str(o.realm); |
| 288 | cred.data.static_cred.username = pj_str(o.user_name); |
| 289 | cred.data.static_cred.data_type = PJ_STUN_PASSWD_PLAIN; |
| 290 | cred.data.static_cred.data = pj_str(o.password); |
| 291 | //cred.data.static_cred.nonce = pj_str(o.nonce); |
| 292 | } else { |
| 293 | PJ_LOG(2,(THIS_FILE, "Warning: no credential is set")); |
| 294 | } |
| 295 | |
| 296 | srv = pj_str(o.srv_addr); |
| 297 | CHECK(pj_turn_sock_alloc(g.relay, /* the relay */ |
| 298 | &srv, /* srv addr */ |
| 299 | (o.srv_port?atoi(o.srv_port):PJ_STUN_PORT),/* def port */ |
| 300 | g.resolver, /* resolver */ |
| 301 | (o.user_name?&cred:NULL), /* credential */ |
| 302 | NULL) /* alloc param */ |
| 303 | ); |
| 304 | |
| 305 | return PJ_SUCCESS; |
| 306 | } |
| 307 | |
| 308 | static void destroy_relay(void) |
| 309 | { |
| 310 | if (g.relay) { |
| 311 | pj_turn_sock_destroy(g.relay); |
| 312 | } |
| 313 | } |
| 314 | |
| 315 | |
| 316 | static void turn_on_rx_data(pj_turn_sock *relay, |
| 317 | void *pkt, |
| 318 | unsigned pkt_len, |
| 319 | const pj_sockaddr_t *peer_addr, |
| 320 | unsigned addr_len) |
| 321 | { |
| 322 | char addrinfo[80]; |
| 323 | |
| 324 | pj_sockaddr_print(peer_addr, addrinfo, sizeof(addrinfo), 3); |
| 325 | |
| 326 | PJ_LOG(3,(THIS_FILE, "Client received %d bytes data from %s: %.*s", |
| 327 | pkt_len, addrinfo, pkt_len, pkt)); |
| 328 | } |
| 329 | |
| 330 | |
| 331 | static void turn_on_state(pj_turn_sock *relay, pj_turn_state_t old_state, |
| 332 | pj_turn_state_t new_state) |
| 333 | { |
| 334 | PJ_LOG(3,(THIS_FILE, "State %s --> %s", pj_turn_state_name(old_state), |
| 335 | pj_turn_state_name(new_state))); |
| 336 | |
| 337 | if (new_state == PJ_TURN_STATE_READY) { |
| 338 | pj_turn_session_info info; |
| 339 | pj_turn_sock_get_info(relay, &info); |
| 340 | pj_memcpy(&g.relay_addr, &info.relay_addr, sizeof(pj_sockaddr)); |
| 341 | } else if (new_state > PJ_TURN_STATE_READY && g.relay) { |
| 342 | PJ_LOG(3,(THIS_FILE, "Relay shutting down..")); |
| 343 | g.relay = NULL; |
| 344 | } |
| 345 | } |
| 346 | |
| 347 | static pj_bool_t stun_sock_on_status(pj_stun_sock *stun_sock, |
| 348 | pj_stun_sock_op op, |
| 349 | pj_status_t status) |
| 350 | { |
| 351 | struct peer *peer = (struct peer*) pj_stun_sock_get_user_data(stun_sock); |
| 352 | |
| 353 | if (status == PJ_SUCCESS) { |
| 354 | PJ_LOG(4,(THIS_FILE, "peer%d: %s success", peer-g.peer, |
| 355 | pj_stun_sock_op_name(op))); |
| 356 | } else { |
| 357 | char errmsg[PJ_ERR_MSG_SIZE]; |
| 358 | pj_strerror(status, errmsg, sizeof(errmsg)); |
| 359 | PJ_LOG(1,(THIS_FILE, "peer%d: %s error: %s", peer-g.peer, |
| 360 | pj_stun_sock_op_name(op), errmsg)); |
| 361 | return PJ_FALSE; |
| 362 | } |
| 363 | |
| 364 | if (op==PJ_STUN_SOCK_BINDING_OP || op==PJ_STUN_SOCK_KEEP_ALIVE_OP) { |
| 365 | pj_stun_sock_info info; |
| 366 | int cmp; |
| 367 | |
| 368 | pj_stun_sock_get_info(stun_sock, &info); |
| 369 | cmp = pj_sockaddr_cmp(&info.mapped_addr, &peer->mapped_addr); |
| 370 | |
| 371 | if (cmp) { |
| 372 | char straddr[PJ_INET6_ADDRSTRLEN+10]; |
| 373 | |
| 374 | pj_sockaddr_cp(&peer->mapped_addr, &info.mapped_addr); |
| 375 | pj_sockaddr_print(&peer->mapped_addr, straddr, sizeof(straddr), 3); |
| 376 | PJ_LOG(3,(THIS_FILE, "peer%d: STUN mapped address is %s", |
| 377 | peer-g.peer, straddr)); |
| 378 | } |
| 379 | } |
| 380 | |
| 381 | return PJ_TRUE; |
| 382 | } |
| 383 | |
| 384 | static pj_bool_t stun_sock_on_rx_data(pj_stun_sock *stun_sock, |
| 385 | void *pkt, |
| 386 | unsigned pkt_len, |
| 387 | const pj_sockaddr_t *src_addr, |
| 388 | unsigned addr_len) |
| 389 | { |
| 390 | struct peer *peer = (struct peer*) pj_stun_sock_get_user_data(stun_sock); |
| 391 | char straddr[PJ_INET6_ADDRSTRLEN+10]; |
| 392 | |
| 393 | ((char*)pkt)[pkt_len] = '\0'; |
| 394 | |
| 395 | pj_sockaddr_print(src_addr, straddr, sizeof(straddr), 3); |
| 396 | PJ_LOG(3,(THIS_FILE, "peer%d: received %d bytes data from %s: %s", |
| 397 | peer-g.peer, pkt_len, straddr, (char*)pkt)); |
| 398 | |
| 399 | return PJ_TRUE; |
| 400 | } |
| 401 | |
| 402 | |
| 403 | static void menu(void) |
| 404 | { |
| 405 | pj_turn_session_info info; |
| 406 | char client_state[20], relay_addr[80], peer0_addr[80], peer1_addr[80]; |
| 407 | |
| 408 | if (g.relay) { |
| 409 | pj_turn_sock_get_info(g.relay, &info); |
| 410 | strcpy(client_state, pj_turn_state_name(info.state)); |
| 411 | if (info.state >= PJ_TURN_STATE_READY) |
| 412 | pj_sockaddr_print(&info.relay_addr, relay_addr, sizeof(relay_addr), 3); |
| 413 | else |
| 414 | strcpy(relay_addr, "0.0.0.0:0"); |
| 415 | } else { |
| 416 | strcpy(client_state, "NULL"); |
| 417 | strcpy(relay_addr, "0.0.0.0:0"); |
| 418 | } |
| 419 | |
| 420 | pj_sockaddr_print(&g.peer[0].mapped_addr, peer0_addr, sizeof(peer0_addr), 3); |
| 421 | pj_sockaddr_print(&g.peer[1].mapped_addr, peer1_addr, sizeof(peer1_addr), 3); |
| 422 | |
| 423 | |
| 424 | puts("\n"); |
| 425 | puts("+=====================================================================+"); |
| 426 | puts("| CLIENT | PEER-0 |"); |
| 427 | puts("| | |"); |
| 428 | printf("| State : %-12s | Address: %-21s |\n", |
| 429 | client_state, peer0_addr); |
| 430 | printf("| Relay addr: %-21s | |\n", |
| 431 | relay_addr); |
| 432 | puts("| | 0 Send data to relay address |"); |
| 433 | puts("| a Allocate relay | |"); |
| 434 | puts("| p,pp Set permission for peer 0/1 +--------------------------------+"); |
| 435 | puts("| s,ss Send data to peer 0/1 | PEER-1 |"); |
| 436 | puts("| b,bb BindChannel to peer 0/1 | |"); |
| 437 | printf("| x Delete allocation | Address: %-21s |\n", |
| 438 | peer1_addr); |
| 439 | puts("+------------------------------------+ |"); |
| 440 | puts("| q Quit d Dump | 1 Send data to relay adderss |"); |
| 441 | puts("+------------------------------------+--------------------------------+"); |
| 442 | printf(">>> "); |
| 443 | fflush(stdout); |
| 444 | } |
| 445 | |
| 446 | |
| 447 | static void console_main(void) |
| 448 | { |
| 449 | while (!g.quit) { |
| 450 | char input[32]; |
| 451 | struct peer *peer; |
| 452 | pj_status_t status; |
| 453 | |
| 454 | menu(); |
| 455 | |
| 456 | if (fgets(input, sizeof(input), stdin) == NULL) |
| 457 | break; |
| 458 | |
| 459 | switch (input[0]) { |
| 460 | case 'a': |
| 461 | create_relay(); |
| 462 | break; |
| 463 | case 'd': |
| 464 | pj_pool_factory_dump(&g.cp.factory, PJ_TRUE); |
| 465 | break; |
| 466 | case 's': |
| 467 | if (g.relay == NULL) { |
| 468 | puts("Error: no relay"); |
| 469 | continue; |
| 470 | } |
| 471 | if (input[1]!='s') |
| 472 | peer = &g.peer[0]; |
| 473 | else |
| 474 | peer = &g.peer[1]; |
| 475 | |
| 476 | strcpy(input, "Hello from client"); |
| 477 | status = pj_turn_sock_sendto(g.relay, (const pj_uint8_t*)input, |
| 478 | strlen(input)+1, |
| 479 | &peer->mapped_addr, |
| 480 | pj_sockaddr_get_len(&peer->mapped_addr)); |
| 481 | if (status != PJ_SUCCESS) |
| 482 | my_perror("turn_udp_sendto() failed", status); |
| 483 | break; |
| 484 | case 'b': |
| 485 | if (g.relay == NULL) { |
| 486 | puts("Error: no relay"); |
| 487 | continue; |
| 488 | } |
| 489 | if (input[1]!='b') |
| 490 | peer = &g.peer[0]; |
| 491 | else |
| 492 | peer = &g.peer[1]; |
| 493 | |
| 494 | status = pj_turn_sock_bind_channel(g.relay, &peer->mapped_addr, |
| 495 | pj_sockaddr_get_len(&peer->mapped_addr)); |
| 496 | if (status != PJ_SUCCESS) |
| 497 | my_perror("turn_udp_bind_channel() failed", status); |
| 498 | break; |
| 499 | case 'p': |
| 500 | if (g.relay == NULL) { |
| 501 | puts("Error: no relay"); |
| 502 | continue; |
| 503 | } |
| 504 | if (input[1]!='p') |
| 505 | peer = &g.peer[0]; |
| 506 | else |
| 507 | peer = &g.peer[1]; |
| 508 | |
| 509 | status = pj_turn_sock_set_perm(g.relay, 1, &peer->mapped_addr, 1); |
| 510 | if (status != PJ_SUCCESS) |
| 511 | my_perror("pj_turn_sock_set_perm() failed", status); |
| 512 | break; |
| 513 | case 'x': |
| 514 | if (g.relay == NULL) { |
| 515 | puts("Error: no relay"); |
| 516 | continue; |
| 517 | } |
| 518 | destroy_relay(); |
| 519 | break; |
| 520 | case '0': |
| 521 | case '1': |
| 522 | if (g.relay == NULL) { |
| 523 | puts("No relay"); |
| 524 | break; |
| 525 | } |
| 526 | peer = &g.peer[input[0]-'0']; |
| 527 | sprintf(input, "Hello from peer%d", input[0]-'0'); |
| 528 | pj_stun_sock_sendto(peer->stun_sock, NULL, input, strlen(input)+1, 0, |
| 529 | &g.relay_addr, pj_sockaddr_get_len(&g.relay_addr)); |
| 530 | break; |
| 531 | case 'q': |
| 532 | g.quit = PJ_TRUE; |
| 533 | break; |
| 534 | } |
| 535 | } |
| 536 | } |
| 537 | |
| 538 | |
| 539 | static void usage(void) |
| 540 | { |
| 541 | puts("Usage: pjturn_client TURN-SERVER [OPTIONS]"); |
| 542 | puts(""); |
| 543 | puts("where TURN-SERVER is \"host[:port]\""); |
| 544 | puts(""); |
| 545 | puts("and OPTIONS:"); |
| 546 | puts(" --tcp, -T Use TCP to connect to TURN server"); |
| 547 | puts(" --realm, -r REALM Set realm of the credential to REALM"); |
| 548 | puts(" --username, -u UID Set username of the credential to UID"); |
| 549 | puts(" --password, -p PASSWD Set password of the credential to PASSWD"); |
| 550 | puts(" --fingerprint, -F Use fingerprint for outgoing requests"); |
| 551 | puts(" --stun-srv, -S NAME Use this STUN srv instead of TURN for Binding discovery"); |
| 552 | puts(" --nameserver, -N IP Activate DNS SRV, use this DNS server"); |
| 553 | puts(" --help, -h"); |
| 554 | } |
| 555 | |
| 556 | int main(int argc, char *argv[]) |
| 557 | { |
| 558 | struct pj_getopt_option long_options[] = { |
| 559 | { "realm", 1, 0, 'r'}, |
| 560 | { "username", 1, 0, 'u'}, |
| 561 | { "password", 1, 0, 'p'}, |
| 562 | { "fingerprint",0, 0, 'F'}, |
| 563 | { "tcp", 0, 0, 'T'}, |
| 564 | { "help", 0, 0, 'h'}, |
| 565 | { "stun-srv", 1, 0, 'S'}, |
| 566 | { "nameserver", 1, 0, 'N'} |
| 567 | }; |
| 568 | int c, opt_id; |
| 569 | char *pos; |
| 570 | pj_status_t status; |
| 571 | |
| 572 | while((c=pj_getopt_long(argc,argv, "r:u:p:S:N:hFT", long_options, &opt_id))!=-1) { |
| 573 | switch (c) { |
| 574 | case 'r': |
| 575 | o.realm = pj_optarg; |
| 576 | break; |
| 577 | case 'u': |
| 578 | o.user_name = pj_optarg; |
| 579 | break; |
| 580 | case 'p': |
| 581 | o.password = pj_optarg; |
| 582 | break; |
| 583 | case 'h': |
| 584 | usage(); |
| 585 | return 0; |
| 586 | case 'F': |
| 587 | o.use_fingerprint = PJ_TRUE; |
| 588 | break; |
| 589 | case 'T': |
| 590 | o.use_tcp = PJ_TRUE; |
| 591 | break; |
| 592 | case 'S': |
| 593 | o.stun_server = pj_optarg; |
| 594 | break; |
| 595 | case 'N': |
| 596 | o.nameserver = pj_optarg; |
| 597 | break; |
| 598 | default: |
| 599 | printf("Argument \"%s\" is not valid. Use -h to see help", |
| 600 | argv[pj_optind]); |
| 601 | return 1; |
| 602 | } |
| 603 | } |
| 604 | |
| 605 | if (pj_optind == argc) { |
| 606 | puts("Error: TARGET is needed"); |
| 607 | usage(); |
| 608 | return 1; |
| 609 | } |
| 610 | |
| 611 | if ((pos=pj_ansi_strchr(argv[pj_optind], ':')) != NULL) { |
| 612 | o.srv_addr = argv[pj_optind]; |
| 613 | *pos = '\0'; |
| 614 | o.srv_port = pos+1; |
| 615 | } else { |
| 616 | o.srv_addr = argv[pj_optind]; |
| 617 | } |
| 618 | |
| 619 | if ((status=init()) != 0) |
| 620 | goto on_return; |
| 621 | |
| 622 | //if ((status=create_relay()) != 0) |
| 623 | // goto on_return; |
| 624 | |
| 625 | console_main(); |
| 626 | |
| 627 | on_return: |
| 628 | client_shutdown(); |
| 629 | return status ? 1 : 0; |
| 630 | } |
| 631 | |