2020-07-27 10:03:12 +01:00
|
|
|
/*
|
|
|
|
* lws-minimal-secure-streams-server
|
|
|
|
*
|
|
|
|
* Written in 2010-2020 by Andy Green <andy@warmcat.com>
|
|
|
|
*
|
|
|
|
* This file is made available under the Creative Commons CC0 1.0
|
|
|
|
* Universal Public Domain Dedication.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <libwebsockets.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <signal.h>
|
|
|
|
|
|
|
|
extern const lws_ss_info_t ssi_client, ssi_server;
|
|
|
|
|
|
|
|
static struct lws_context *context;
|
2020-08-10 10:38:04 +01:00
|
|
|
int interrupted, bad = 1, multipart;
|
2020-07-27 10:03:12 +01:00
|
|
|
static const char * const default_ss_policy =
|
|
|
|
"{"
|
|
|
|
"\"release\":" "\"01234567\","
|
|
|
|
"\"product\":" "\"myproduct\","
|
|
|
|
"\"schema-version\":" "1,"
|
|
|
|
"\"retry\": [" /* named backoff / retry strategies */
|
|
|
|
"{\"default\": {"
|
|
|
|
"\"backoff\": [" "1000,"
|
|
|
|
"2000,"
|
|
|
|
"3000,"
|
|
|
|
"5000,"
|
|
|
|
"10000"
|
|
|
|
"],"
|
|
|
|
"\"conceal\":" "5,"
|
|
|
|
"\"jitterpc\":" "20,"
|
|
|
|
"\"svalidping\":" "300,"
|
|
|
|
"\"svalidhup\":" "310"
|
|
|
|
"}}"
|
|
|
|
"],"
|
|
|
|
"\"certs\": [" /* named individual certificates in BASE64 DER */
|
|
|
|
/*
|
|
|
|
* Need to be in order from root cert... notice sometimes as
|
|
|
|
* with Let's Encrypt there are multiple possible validation
|
|
|
|
* paths, all the pieces for one validation path must be
|
|
|
|
* given, excluding the server cert itself. Let's Encrypt
|
|
|
|
* intermediate is signed by their ISRG Root CA but also is
|
|
|
|
* cross-signed by an IdenTrust intermediate that's widely
|
|
|
|
* deployed in browsers. We use the ISRG path because that
|
|
|
|
* way we can skip the extra IdenTrust root cert.
|
|
|
|
*/
|
2021-01-12 16:46:43 +00:00
|
|
|
"{\"dst_root_x3\": \""
|
|
|
|
"MIIDSjCCAjKgAwIBAgIQRK+wgNajJ7qJMDmGLvhAazANBgkqhkiG9w0BAQUFADA/"
|
|
|
|
"MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT"
|
|
|
|
"DkRTVCBSb290IENBIFgzMB4XDTAwMDkzMDIxMTIxOVoXDTIxMDkzMDE0MDExNVow"
|
|
|
|
"PzEkMCIGA1UEChMbRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QgQ28uMRcwFQYDVQQD"
|
|
|
|
"Ew5EU1QgUm9vdCBDQSBYMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB"
|
|
|
|
"AN+v6ZdQCINXtMxiZfaQguzH0yxrMMpb7NnDfcdAwRgUi+DoM3ZJKuM/IUmTrE4O"
|
|
|
|
"rz5Iy2Xu/NMhD2XSKtkyj4zl93ewEnu1lcCJo6m67XMuegwGMoOifooUMM0RoOEq"
|
|
|
|
"OLl5CjH9UL2AZd+3UWODyOKIYepLYYHsUmu5ouJLGiifSKOeDNoJjj4XLh7dIN9b"
|
|
|
|
"xiqKqy69cK3FCxolkHRyxXtqqzTWMIn/5WgTe1QLyNau7Fqckh49ZLOMxt+/yUFw"
|
|
|
|
"7BZy1SbsOFU5Q9D8/RhcQPGX69Wam40dutolucbY38EVAjqr2m7xPi71XAicPNaD"
|
|
|
|
"aeQQmxkqtilX4+U9m5/wAl0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNV"
|
|
|
|
"HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMSnsaR7LHH62+FLkHX/xBVghYkQMA0GCSqG"
|
|
|
|
"SIb3DQEBBQUAA4IBAQCjGiybFwBcqR7uKGY3Or+Dxz9LwwmglSBd49lZRNI+DT69"
|
|
|
|
"ikugdB/OEIKcdBodfpga3csTS7MgROSR6cz8faXbauX+5v3gTt23ADq1cEmv8uXr"
|
|
|
|
"AvHRAosZy5Q6XkjEGB5YGV8eAlrwDPGxrancWYaLbumR9YbK+rlmM6pZW87ipxZz"
|
|
|
|
"R8srzJmwN0jP41ZL9c8PDHIyh8bwRLtTcm1D9SZImlJnt1ir/md2cXjbDaJWFBM5"
|
|
|
|
"JDGFoqgCWjBH4d1QB7wCCZAA62RjYJsWvIjJEubSfZGL+T0yjWW06XyxV3bqxbYo"
|
|
|
|
"Ob8VZRzI9neWagqNdwvYkQsEjgfbKbYK7p2CNTUQ"
|
2020-07-27 10:03:12 +01:00
|
|
|
"\"},"
|
|
|
|
/*
|
|
|
|
* a selfsigned cert for localhost for 100 years
|
|
|
|
*/
|
|
|
|
"{\"self_localhost\": \""
|
|
|
|
"MIIF5jCCA86gAwIBAgIJANq50IuwPFKgMA0GCSqGSIb3DQEBCwUAMIGGMQswCQYD"
|
|
|
|
"VQQGEwJHQjEQMA4GA1UECAwHRXJld2hvbjETMBEGA1UEBwwKQWxsIGFyb3VuZDEb"
|
|
|
|
"MBkGA1UECgwSbGlid2Vic29ja2V0cy10ZXN0MRIwEAYDVQQDDAlsb2NhbGhvc3Qx"
|
|
|
|
"HzAdBgkqhkiG9w0BCQEWEG5vbmVAaW52YWxpZC5vcmcwIBcNMTgwMzIwMDQxNjA3"
|
|
|
|
"WhgPMjExODAyMjQwNDE2MDdaMIGGMQswCQYDVQQGEwJHQjEQMA4GA1UECAwHRXJl"
|
|
|
|
"d2hvbjETMBEGA1UEBwwKQWxsIGFyb3VuZDEbMBkGA1UECgwSbGlid2Vic29ja2V0"
|
|
|
|
"cy10ZXN0MRIwEAYDVQQDDAlsb2NhbGhvc3QxHzAdBgkqhkiG9w0BCQEWEG5vbmVA"
|
|
|
|
"aW52YWxpZC5vcmcwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCjYtuW"
|
|
|
|
"aICCY0tJPubxpIgIL+WWmz/fmK8IQr11Wtee6/IUyUlo5I602mq1qcLhT/kmpoR8"
|
|
|
|
"Di3DAmHKnSWdPWtn1BtXLErLlUiHgZDrZWInmEBjKM1DZf+CvNGZ+EzPgBv5nTek"
|
|
|
|
"LWcfI5ZZtoGuIP1Dl/IkNDw8zFz4cpiMe/BFGemyxdHhLrKHSm8Eo+nT734tItnH"
|
|
|
|
"KT/m6DSU0xlZ13d6ehLRm7/+Nx47M3XMTRH5qKP/7TTE2s0U6+M0tsGI2zpRi+m6"
|
|
|
|
"jzhNyMBTJ1u58qAe3ZW5/+YAiuZYAB6n5bhUp4oFuB5wYbcBywVR8ujInpF8buWQ"
|
|
|
|
"Ujy5N8pSNp7szdYsnLJpvAd0sibrNPjC0FQCNrpNjgJmIK3+mKk4kXX7ZTwefoAz"
|
|
|
|
"TK4l2pHNuC53QVc/EF++GBLAxmvCDq9ZpMIYi7OmzkkAKKC9Ue6Ef217LFQCFIBK"
|
|
|
|
"Izv9cgi9fwPMLhrKleoVRNsecBsCP569WgJXhUnwf2lon4fEZr3+vRuc9shfqnV0"
|
|
|
|
"nPN1IMSnzXCast7I2fiuRXdIz96KjlGQpP4XfNVA+RGL7aMnWOFIaVrKWLzAtgzo"
|
|
|
|
"GMTvP/AuehKXncBJhYtW0ltTioVx+5yTYSAZWl+IssmXjefxJqYi2/7QWmv1QC9p"
|
|
|
|
"sNcjTMaBQLN03T1Qelbs7Y27sxdEnNUth4kI+wIDAQABo1MwUTAdBgNVHQ4EFgQU"
|
|
|
|
"9mYU23tW2zsomkKTAXarjr2vjuswHwYDVR0jBBgwFoAU9mYU23tW2zsomkKTAXar"
|
|
|
|
"jr2vjuswDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEANjIBMrow"
|
|
|
|
"YNCbhAJdP7dhlhT2RUFRdeRUJD0IxrH/hkvb6myHHnK8nOYezFPjUlmRKUgNEDuA"
|
|
|
|
"xbnXZzPdCRNV9V2mShbXvCyiDY7WCQE2Bn44z26O0uWVk+7DNNLH9BnkwUtOnM9P"
|
|
|
|
"wtmD9phWexm4q2GnTsiL6Ul6cy0QlTJWKVLEUQQ6yda582e23J1AXqtqFcpfoE34"
|
|
|
|
"H3afEiGy882b+ZBiwkeV+oq6XVF8sFyr9zYrv9CvWTYlkpTQfLTZSsgPdEHYVcjv"
|
|
|
|
"xQ2D+XyDR0aRLRlvxUa9dHGFHLICG34Juq5Ai6lM1EsoD8HSsJpMcmrH7MWw2cKk"
|
|
|
|
"ujC3rMdFTtte83wF1uuF4FjUC72+SmcQN7A386BC/nk2TTsJawTDzqwOu/VdZv2g"
|
|
|
|
"1WpTHlumlClZeP+G/jkSyDwqNnTu1aodDmUa4xZodfhP1HWPwUKFcq8oQr148QYA"
|
|
|
|
"AOlbUOJQU7QwRWd1VbnwhDtQWXC92A2w1n/xkZSR1BM/NUSDhkBSUU1WjMbWg6Gg"
|
|
|
|
"mnIZLRerQCu1Oozr87rOQqQakPkyt8BUSNK3K42j2qcfhAONdRl8Hq8Qs5pupy+s"
|
|
|
|
"8sdCGDlwR3JNCMv6u48OK87F4mcIxhkSefFJUFII25pCGN5WtE4p5l+9cnO1GrIX"
|
|
|
|
"e2Hl/7M0c/lbZ4FvXgARlex2rkgS0Ka06HE="
|
|
|
|
"\"},"
|
|
|
|
/*
|
|
|
|
* the private key for above
|
|
|
|
*/
|
|
|
|
"{\"self_localhost_key\": \""
|
|
|
|
"MIIJQwIBADANBgkqhkiG9w0BAQEFAASCCS0wggkpAgEAAoICAQCjYtuWaICCY0tJ"
|
|
|
|
"PubxpIgIL+WWmz/fmK8IQr11Wtee6/IUyUlo5I602mq1qcLhT/kmpoR8Di3DAmHK"
|
|
|
|
"nSWdPWtn1BtXLErLlUiHgZDrZWInmEBjKM1DZf+CvNGZ+EzPgBv5nTekLWcfI5ZZ"
|
|
|
|
"toGuIP1Dl/IkNDw8zFz4cpiMe/BFGemyxdHhLrKHSm8Eo+nT734tItnHKT/m6DSU"
|
|
|
|
"0xlZ13d6ehLRm7/+Nx47M3XMTRH5qKP/7TTE2s0U6+M0tsGI2zpRi+m6jzhNyMBT"
|
|
|
|
"J1u58qAe3ZW5/+YAiuZYAB6n5bhUp4oFuB5wYbcBywVR8ujInpF8buWQUjy5N8pS"
|
|
|
|
"Np7szdYsnLJpvAd0sibrNPjC0FQCNrpNjgJmIK3+mKk4kXX7ZTwefoAzTK4l2pHN"
|
|
|
|
"uC53QVc/EF++GBLAxmvCDq9ZpMIYi7OmzkkAKKC9Ue6Ef217LFQCFIBKIzv9cgi9"
|
|
|
|
"fwPMLhrKleoVRNsecBsCP569WgJXhUnwf2lon4fEZr3+vRuc9shfqnV0nPN1IMSn"
|
|
|
|
"zXCast7I2fiuRXdIz96KjlGQpP4XfNVA+RGL7aMnWOFIaVrKWLzAtgzoGMTvP/Au"
|
|
|
|
"ehKXncBJhYtW0ltTioVx+5yTYSAZWl+IssmXjefxJqYi2/7QWmv1QC9psNcjTMaB"
|
|
|
|
"QLN03T1Qelbs7Y27sxdEnNUth4kI+wIDAQABAoICAFWe8MQZb37k2gdAV3Y6aq8f"
|
|
|
|
"qokKQqbCNLd3giGFwYkezHXoJfg6Di7oZxNcKyw35LFEghkgtQqErQqo35VPIoH+"
|
|
|
|
"vXUpWOjnCmM4muFA9/cX6mYMc8TmJsg0ewLdBCOZVw+wPABlaqz+0UOiSMMftpk9"
|
|
|
|
"fz9JwGd8ERyBsT+tk3Qi6D0vPZVsC1KqxxL/cwIFd3Hf2ZBtJXe0KBn1pktWht5A"
|
|
|
|
"Kqx9mld2Ovl7NjgiC1Fx9r+fZw/iOabFFwQA4dr+R8mEMK/7bd4VXfQ1o/QGGbMT"
|
|
|
|
"G+ulFrsiDyP+rBIAaGC0i7gDjLAIBQeDhP409ZhswIEc/GBtODU372a2CQK/u4Q/"
|
|
|
|
"HBQvuBtKFNkGUooLgCCbFxzgNUGc83GB/6IwbEM7R5uXqsFiE71LpmroDyjKTlQ8"
|
|
|
|
"YZkpIcLNVLw0usoGYHFm2rvCyEVlfsE3Ub8cFyTFk50SeOcF2QL2xzKmmbZEpXgl"
|
|
|
|
"xBHR0hjgon0IKJDGfor4bHO7Nt+1Ece8u2oTEKvpz5aIn44OeC5mApRGy83/0bvs"
|
|
|
|
"esnWjDE/bGpoT8qFuy+0urDEPNId44XcJm1IRIlG56ErxC3l0s11wrIpTmXXckqw"
|
|
|
|
"zFR9s2z7f0zjeyxqZg4NTPI7wkM3M8BXlvp2GTBIeoxrWB4V3YArwu8QF80QBgVz"
|
|
|
|
"mgHl24nTg00UH1OjZsABAoIBAQDOxftSDbSqGytcWqPYP3SZHAWDA0O4ACEM+eCw"
|
|
|
|
"au9ASutl0IDlNDMJ8nC2ph25BMe5hHDWp2cGQJog7pZ/3qQogQho2gUniKDifN77"
|
|
|
|
"40QdykllTzTVROqmP8+efreIvqlzHmuqaGfGs5oTkZaWj5su+B+bT+9rIwZcwfs5"
|
|
|
|
"YRINhQRx17qa++xh5mfE25c+M9fiIBTiNSo4lTxWMBShnK8xrGaMEmN7W0qTMbFH"
|
|
|
|
"PgQz5FcxRjCCqwHilwNBeLDTp/ZECEB7y34khVh531mBE2mNzSVIQcGZP1I/DvXj"
|
|
|
|
"W7UUNdgFwii/GW+6M0uUDy23UVQpbFzcV8o1C2nZc4Fb4zwBAoIBAQDKSJkFwwuR"
|
|
|
|
"naVJS6WxOKjX8MCu9/cKPnwBv2mmI2jgGxHTw5sr3ahmF5eTb8Zo19BowytN+tr6"
|
|
|
|
"2ZFoIBA9Ubc9esEAU8l3fggdfM82cuR9sGcfQVoCh8tMg6BP8IBLOmbSUhN3PG2m"
|
|
|
|
"39I802u0fFNVQCJKhx1m1MFFLOu7lVcDS9JN+oYVPb6MDfBLm5jOiPuYkFZ4gH79"
|
|
|
|
"J7gXI0/YKhaJ7yXthYVkdrSF6Eooer4RZgma62Dd1VNzSq3JBo6rYjF7Lvd+RwDC"
|
|
|
|
"R1thHrmf/IXplxpNVkoMVxtzbrrbgnC25QmvRYc0rlS/kvM4yQhMH3eA7IycDZMp"
|
|
|
|
"Y+0xm7I7jTT7AoIBAGKzKIMDXdCxBWKhNYJ8z7hiItNl1IZZMW2TPUiY0rl6yaCh"
|
|
|
|
"BVXjM9W0r07QPnHZsUiByqb743adkbTUjmxdJzjaVtxN7ZXwZvOVrY7I7fPWYnCE"
|
|
|
|
"fXCr4+IVpZI/ZHZWpGX6CGSgT6EOjCZ5IUufIvEpqVSmtF8MqfXO9o9uIYLokrWQ"
|
|
|
|
"x1dBl5UnuTLDqw8bChq7O5y6yfuWaOWvL7nxI8NvSsfj4y635gIa/0dFeBYZEfHI"
|
|
|
|
"UlGdNVomwXwYEzgE/c19ruIowX7HU/NgxMWTMZhpazlxgesXybel+YNcfDQ4e3RM"
|
|
|
|
"OMz3ZFiaMaJsGGNf4++d9TmMgk4Ns6oDs6Tb9AECggEBAJYzd+SOYo26iBu3nw3L"
|
|
|
|
"65uEeh6xou8pXH0Tu4gQrPQTRZZ/nT3iNgOwqu1gRuxcq7TOjt41UdqIKO8vN7/A"
|
|
|
|
"aJavCpaKoIMowy/aGCbvAvjNPpU3unU8jdl/t08EXs79S5IKPcgAx87sTTi7KDN5"
|
|
|
|
"SYt4tr2uPEe53NTXuSatilG5QCyExIELOuzWAMKzg7CAiIlNS9foWeLyVkBgCQ6S"
|
|
|
|
"me/L8ta+mUDy37K6vC34jh9vK9yrwF6X44ItRoOJafCaVfGI+175q/eWcqTX4q+I"
|
|
|
|
"G4tKls4sL4mgOJLq+ra50aYMxbcuommctPMXU6CrrYyQpPTHMNVDQy2ttFdsq9iK"
|
|
|
|
"TncCggEBAMmt/8yvPflS+xv3kg/ZBvR9JB1In2n3rUCYYD47ReKFqJ03Vmq5C9nY"
|
|
|
|
"56s9w7OUO8perBXlJYmKZQhO4293lvxZD2Iq4NcZbVSCMoHAUzhzY3brdgtSIxa2"
|
|
|
|
"gGveGAezZ38qKIU26dkz7deECY4vrsRkwhpTW0LGVCpjcQoaKvymAoCmAs8V2oMr"
|
|
|
|
"Ziw1YQ9uOUoWwOqm1wZqmVcOXvPIS2gWAs3fQlWjH9hkcQTMsUaXQDOD0aqkSY3E"
|
|
|
|
"NqOvbCV1/oUpRi3076khCoAXI1bKSn/AvR3KDP14B5toHI/F5OTSEiGhhHesgRrs"
|
|
|
|
"fBrpEY1IATtPq1taBZZogRqI3rOkkPk="
|
|
|
|
"\"}"
|
|
|
|
"],"
|
|
|
|
"\"trust_stores\": [" /* named cert chains */
|
|
|
|
"{"
|
2021-01-12 16:46:43 +00:00
|
|
|
"\"name\": \"le_via_dst\","
|
2020-07-27 10:03:12 +01:00
|
|
|
"\"stack\": ["
|
2021-01-12 16:46:43 +00:00
|
|
|
"\"dst_root_x3\""
|
2020-07-27 10:03:12 +01:00
|
|
|
"]"
|
|
|
|
"}"
|
|
|
|
"],"
|
|
|
|
"\"s\": ["
|
|
|
|
/*
|
|
|
|
* Client streamtypes
|
|
|
|
*/
|
|
|
|
|
|
|
|
"{\"mintest\": {"
|
|
|
|
"\"endpoint\":" "\"warmcat.com\","
|
|
|
|
"\"port\":" "443,"
|
|
|
|
"\"protocol\":" "\"h2\","
|
|
|
|
"\"http_method\":" "\"GET\","
|
|
|
|
"\"http_url\":" "\"index.html\","
|
|
|
|
"\"tls\":" "true,"
|
|
|
|
"\"retry\":" "\"default\","
|
2021-01-12 16:46:43 +00:00
|
|
|
"\"tls_trust_store\":" "\"le_via_dst\""
|
2020-07-27 10:03:12 +01:00
|
|
|
"}},"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This streamtype represents an h2 server listening on :7681,
|
|
|
|
* using a 100-y self-signed tls cert
|
|
|
|
*/
|
|
|
|
|
|
|
|
"{\"myserver\": {"
|
|
|
|
/* if given, "endpoint" is network if to bind to */
|
|
|
|
"\"server\":" "true,"
|
|
|
|
"\"port\":" "7681,"
|
|
|
|
"\"protocol\":" "\"h1\","
|
|
|
|
"\"metadata\": [{"
|
|
|
|
"\"mime\": \"Content-Type:\","
|
|
|
|
"\"method\": \"\","
|
|
|
|
"\"path\": \"\""
|
|
|
|
"}],"
|
|
|
|
"\"tls\":" "true,"
|
|
|
|
/*
|
|
|
|
* A ws server is an http server, if you give a
|
|
|
|
* ws_subprotocol here it's understood we also serve
|
|
|
|
* that ove ws or wss according to tls
|
|
|
|
*/
|
|
|
|
"\"ws_subprotocol\":" "\"mywsprotocol\","
|
|
|
|
"\"server_cert\":" "\"self_localhost\","
|
|
|
|
"\"server_key\":" "\"self_localhost_key\""
|
|
|
|
"}},"
|
|
|
|
|
|
|
|
"]"
|
|
|
|
"}"
|
|
|
|
;
|
|
|
|
|
|
|
|
static int
|
|
|
|
smd_cb(void *opaque, lws_smd_class_t c, lws_usec_t ts, void *buf, size_t len)
|
|
|
|
{
|
|
|
|
if ((c & LWSSMDCL_SYSTEM_STATE) &&
|
|
|
|
!lws_json_simple_strcmp(buf, len, "\"state\":", "OPERATIONAL")) {
|
|
|
|
|
|
|
|
/* create the secure streams */
|
|
|
|
|
|
|
|
lwsl_notice("%s: creating server stream\n", __func__);
|
|
|
|
|
|
|
|
if (lws_ss_create(context, 0, &ssi_server, NULL, NULL,
|
|
|
|
NULL, NULL)) {
|
|
|
|
lwsl_err("%s: failed to create secure stream\n",
|
|
|
|
__func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
#if 0
|
|
|
|
lwsl_notice("%s: creating client stream\n", __func__);
|
|
|
|
|
|
|
|
if (lws_ss_create(context, 0, &ssi_client, NULL, NULL,
|
|
|
|
NULL, NULL)) {
|
|
|
|
lwsl_err("%s: failed to create secure stream\n",
|
|
|
|
__func__);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
sigint_handler(int sig)
|
|
|
|
{
|
|
|
|
interrupted = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, const char **argv)
|
|
|
|
{
|
|
|
|
struct lws_context_creation_info info;
|
|
|
|
int n = 0;
|
|
|
|
|
|
|
|
signal(SIGINT, sigint_handler);
|
|
|
|
|
|
|
|
memset(&info, 0, sizeof info); /* otherwise uninitialized garbage */
|
|
|
|
lws_cmdline_option_handle_builtin(argc, argv, &info);
|
2020-08-10 10:38:04 +01:00
|
|
|
|
|
|
|
if (lws_cmdline_option(argc, argv, "-m"))
|
|
|
|
multipart = 1;
|
|
|
|
|
2020-07-27 10:03:12 +01:00
|
|
|
lwsl_user("LWS Secure Streams Server\n");
|
|
|
|
|
|
|
|
info.options = LWS_SERVER_OPTION_EXPLICIT_VHOSTS |
|
|
|
|
LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
|
|
|
|
info.fd_limit_per_thread = 1 + 6 + 1;
|
|
|
|
info.pss_policies_json = default_ss_policy;
|
|
|
|
info.port = CONTEXT_PORT_NO_LISTEN;
|
|
|
|
info.early_smd_cb = smd_cb;
|
|
|
|
info.early_smd_class_filter = LWSSMDCL_SYSTEM_STATE;
|
|
|
|
|
|
|
|
context = lws_create_context(&info);
|
|
|
|
if (!context) {
|
|
|
|
lwsl_err("lws init failed\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* the event loop */
|
|
|
|
|
|
|
|
while (n >= 0 && !interrupted)
|
|
|
|
n = lws_service(context, 0);
|
|
|
|
|
|
|
|
bad = 0;
|
|
|
|
|
|
|
|
lws_context_destroy(context);
|
|
|
|
lwsl_user("Completed: %s\n", bad ? "failed" : "OK");
|
|
|
|
|
|
|
|
return bad;
|
|
|
|
}
|