diff --git a/branches/2.0/doubango/tinySIP/src/transports/tsip_transport.c b/branches/2.0/doubango/tinySIP/src/transports/tsip_transport.c index c363d981..e010bc29 100644 --- a/branches/2.0/doubango/tinySIP/src/transports/tsip_transport.c +++ b/branches/2.0/doubango/tinySIP/src/transports/tsip_transport.c @@ -129,12 +129,12 @@ int tsip_transport_addvia(const tsip_transport_t* self, const char *branch, tsip tsip_transport_stream_peer_t* peer = tsip_transport_find_stream_peer_by_local_fd(TSIP_TRANSPORT(ws_transport), msg->local_fd); if(peer){ // hack the first Via as many servers fail to parse "WS" or "WSS" as valid transpors - if(tsk_striequals(msg->firstVia->transport, "WS") || tsk_striequals(msg->firstVia->transport, "WSS")){ - TSIP_HEADER_ADD_PARAM(TSIP_HEADER(msg->firstVia), "ws-hacked", msg->firstVia->transport); + //if(tsk_striequals(msg->firstVia->transport, "WS") || tsk_striequals(msg->firstVia->transport, "WSS")){ + TSIP_HEADER_ADD_PARAM(TSIP_HEADER(msg->firstVia), "ws-hacked", TNET_SOCKET_TYPE_IS_WSS(msg->src_net_type) ? "WSS" : "WS"); tsk_strupdate(&msg->firstVia->transport, "TCP"); tsk_strupdate(&msg->firstVia->host, peer->remote_ip); msg->firstVia->port = peer->remote_port; - } + //} TSK_OBJECT_SAFE_FREE(peer); // replace first Via with ours diff --git a/branches/2.0/doubango/tinySIP/src/transports/tsip_transport_layer.c b/branches/2.0/doubango/tinySIP/src/transports/tsip_transport_layer.c index 39445c3a..0a061616 100644 --- a/branches/2.0/doubango/tinySIP/src/transports/tsip_transport_layer.c +++ b/branches/2.0/doubango/tinySIP/src/transports/tsip_transport_layer.c @@ -501,8 +501,6 @@ parse_buffer: goto bail; } - TSK_DEBUG_INFO("%s", (const char*)peer->ws_rcv_buffer); - // If we are there this mean that we have all SIP headers. // ==> Parse the SIP message without the content. tsk_ragel_state_init(&state, peer->ws_rcv_buffer, (tsk_size_t)pay_len);