Andy Green
a542eb0a3b
openbsd: disable HIGH_RELIABLITY socket option
...
https://github.com/warmcat/libwebsockets/issues/3204
2024-09-25 06:29:30 +01:00
Andy Green
9e0bc9e259
openssl: allow custom SSL_CTX with GLOBAL_INIT unset
2024-09-23 13:11:40 +01:00
Andy Green
2a5c8913a8
centos7: remove obsolete workaround
...
Need for this seems to have gone away
https://github.com/warmcat/libwebsockets/issues/2729
2024-09-23 11:01:17 +01:00
ribes96
457a186f5b
cgi: setenv: remove equals from arg
...
https://github.com/warmcat/libwebsockets/issues/3222
2024-09-23 10:36:50 +01:00
Andy Green
c0267eceec
tls: openssl: ensure actual error first
2024-09-23 07:00:29 +01:00
Andy Green
53c2adab1a
udp: stop crash on failed udp connects at cx destroy
2024-09-23 07:00:25 +01:00
leleliu008
f69835e09c
Subject: [PATCH] AI_V4MAPPED macro is missing on some platforms, e.g. OpenBSD, NetBSD, etc.
2024-08-29 14:49:37 +01:00
lailoken
c980be7cf7
windows: fix mishandling slow connects
...
https://github.com/warmcat/libwebsockets/issues/3208
2024-08-20 13:58:56 +01:00
zzblydia
fdde9119f7
client hs: fix segmentation fault
...
https://github.com/warmcat/libwebsockets/pull/3171
2024-06-24 09:08:31 +01:00
Andy Green
4abdfa810a
client-http: use enum for failures correctly
...
https://github.com/warmcat/libwebsockets/issues/3159
2024-05-31 17:09:59 +01:00
iwashiira
090ec8ef6b
lepc: added bound check for collect_tgt
2024-05-30 05:46:25 +01:00
Andy Green
d1d622d3b9
upng: fuzz: handle 0 width
2024-05-16 08:44:14 +01:00
Andy Green
1e0953ffb8
dlo-lhp: take care margin and padding atr may be NULL
...
iwashiira on github https://github.com/warmcat/libwebsockets/issues/3140
found the html / css calculation could end up with NULL margin sizes.
2024-05-12 05:55:18 +01:00
Andy Green
bcde9a5b49
lhp: assert if NULL css stack coming to lws_csp_px
...
iwashiira on github https://github.com/warmcat/libwebsockets/issues/3140
found the html / css calculation could end up with NULL margin sizes.
This causes an assert if we get this unacceptable situation as far as
lws_csp_px()
2024-05-12 05:55:18 +01:00
Zac He
e0f401c0ac
Restore erroneous modified assertion
2024-05-12 05:55:18 +01:00
iwashiira
8e84473e3c
jpeg: extend mcu_buf_len so that pDst does not cause OOB
2024-05-12 05:17:50 +01:00
Dmitry Potapov
3b0eb45518
http: server: _lws_vhost_init_server_af only needed once
...
If we already have vh_listen_sockfd ready, call _lws_vhost_init_server_af
only once, regardless of IPv6 support.
2024-05-12 05:11:54 +01:00
Dmitry Potapov
4eab8f5a19
http: windows: adapt dup() to use windows api
2024-05-12 05:10:22 +01:00
iwashiira
7218743472
upng: check ims limits
2024-05-09 14:43:33 +01:00
Seo Suchan
9ba1504d01
mbedtls: fix compile on mbedtls 3.6+
...
they moved mbedtls_x509_get_name into interal zone.
Signed-off-by: Seo Suchan <tjtncks@gmail.com>
2024-05-07 13:49:23 +01:00
Zac He
e820283203
service: lock pt while using wsi fdtable pos
2024-04-14 05:08:13 +01:00
payne.ye
ec76f8178d
smp: extend client to work with tsi
...
and take care of zombie sul previously left on connect failure path
2024-04-12 06:15:12 +01:00
titofra
5ab6e04c79
lws_xxx_all_protocol: also compare by protocol names
2024-04-12 06:04:40 +01:00
p-luke
e4be3317ee
netlink: when binding the per-context socket, let the kernel choose the unicast address.
...
When using multiple client contextes in a single application, rops_pt_init_destroy_netlink() fails binding the second socket and on - only the first one succeeds. The failure is made obvious by this log:
W: rops_pt_init_destroy_netlink: netlink bind failed
So, let's fix this by doing what netlink(7) man page suggests:
If the application sets nl_pid before calling bind(2), then it is up to the
application to make sure that nl_pid is unique. If the application sets it
to 0, the kernel takes care of assigning it. The kernel assigns the process
ID to the first netlink socket the process opens and assigns a unique nl_pid
to every netlink socket that the process subsequently creates.
2024-03-20 07:29:11 +00:00
makejian
0d76f0950a
mbedtls_wrapper: Modify 'd2i_X509' with standard declaration in openssl
...
https://github.com/warmcat/libwebsockets/pull/3095
Signed-off-by: makejian <makejian@xiaomi.com>
2024-03-18 12:50:30 +00:00
c-jimenez
c57c239368
basic-auth: allow NUL in password
...
https://github.com/warmcat/libwebsockets/issues/3092
2024-03-11 07:54:39 +00:00
Liu DongMiao
992f40c7a1
raw-skt: don't read more than rx_buffer_size
...
When other roles like ws reading data, they follow `rx_buffer_size`, then fallback to context's `pt_serv_buf_size`.
However, `raw-skt` don't follow `rx_buffer_size`, always use 0, then fallback to `pt_serv_buf_size`.
This PR make `raw-skt` don't read more than `rx_buffer_size` data.
2024-03-07 09:49:46 +00:00
Liu Dongmiao
e38e85e71f
wolfssl: fix build
2024-03-07 09:49:41 +00:00
Liu DongMiao
29c0b56582
raw: connect callback can be triggered twice
2024-03-07 09:49:21 +00:00
Lio DongMiao
299b091ad4
context: fall back if no build-time mbedtls version
2024-03-07 09:49:11 +00:00
Liu Dongmiao
fe9a2b86ab
ws: allow reserved bits and opcode
...
should close #3076
2024-03-01 08:15:08 +00:00
Vladislavs Burakovs
a724300d26
wol: fix socket return for windows
2024-03-01 08:11:11 +00:00
Andy Green
b71a6621b0
h2: file upload: avoid feeling too much POST
...
https://github.com/warmcat/libwebsockets/issues/3070
2024-02-17 12:34:14 +00:00
AD001\z0048zxj
4f3ce6458b
openssl: support SSLKEYLOGFILE server secret logging
2024-02-16 15:45:45 +00:00
Andy Green
378ad62adf
digest: only if we have tls lib to do hashing
2024-02-16 15:45:45 +00:00
Andy Green
1239a2b121
http-digest: coverity: dead code
2024-01-17 08:54:51 +00:00
Andy Green
837db622eb
clean: avoid maybe-uninitialized
...
https://github.com/warmcat/libwebsockets/issues/3049
2024-01-16 07:15:30 +00:00
Dustin Lundquist
9393dd3934
ev: remove any watchers on close
2024-01-15 09:29:29 +00:00
Andy Green
c57733cb00
systemd-sockact: set port to 0 on unix domain
2024-01-15 09:18:48 +00:00
Andy Green
638558a4db
openssl: only use pc libs if no find_package
2024-01-15 09:18:48 +00:00
Andy Green
49bfef2ecd
wol: portability
...
https://github.com/warmcat/libwebsockets/issues/3048
2024-01-13 08:53:55 +00:00
markmaker
43df4901ee
vhost: server: Ignore a vhost port mismatch when using CONTEXT_PORT_NO_LISTEN_SERVER
...
https://github.com/warmcat/libwebsockets/issues/3044
2024-01-08 14:40:46 +00:00
DomB
f88792df37
lecp: fix format_scan function for numeric longer than 2 digits and negative numbers
2024-01-08 08:25:59 +00:00
Ogre Transporter
50ba61082d
windows: clean quirks
...
https://github.com/warmcat/libwebsockets/issues/3039
2024-01-05 05:50:57 +00:00
Andy Green
3207da067e
vhost: allow fd adoption
2024-01-04 11:35:01 +00:00
Fabrice Fontaine
f18fc2316f
lib/tls/CMakeLists.txt: fix wolfssl build with pkg-config
2023-12-27 06:36:59 +00:00
stropee
22808f049c
http: fix auth digest
2023-12-27 06:34:09 +00:00
Andy Green
7efab5f905
h1: reset pipelined parsing
2023-12-27 06:34:03 +00:00
Andy Green
93ae4cb628
ipv6: avoid spinning on interface set
...
https://github.com/warmcat/libwebsockets/issues/3028
2023-12-14 05:58:15 +00:00
Andy Green
52a6ab357e
context info: add default_loglevel
...
Allow this kind of pattern for context creation info preparation
struct lws_context_creation_info info;
lws_context_info_defaults(&info, policy);
info.default_loglevel = LLL_USER | LLL_ERR | LLL_WARN;
lws_cmdline_option_handle_builtin(argc, argv, &info);
Calling lws_context_info_defaults() zeros down and prepares boilerplate in
the info struct, setting the default_loglevel asserts your application
default for the loglevel and then lws_cmdline_option_handle_builtin() will
set either that default loglevel, or override it from the commandline with
-d 1039 etc
2023-12-14 05:53:21 +00:00