1
0
Fork 0
mirror of https://github.com/warmcat/libwebsockets.git synced 2025-03-09 00:00:04 +01:00
Commit graph

3778 commits

Author SHA1 Message Date
Andy Green
a542eb0a3b openbsd: disable HIGH_RELIABLITY socket option
https://github.com/warmcat/libwebsockets/issues/3204
2024-09-25 06:29:30 +01:00
Andy Green
9e0bc9e259 openssl: allow custom SSL_CTX with GLOBAL_INIT unset 2024-09-23 13:11:40 +01:00
Andy Green
2a5c8913a8 centos7: remove obsolete workaround
Need for this seems to have gone away

https://github.com/warmcat/libwebsockets/issues/2729
2024-09-23 11:01:17 +01:00
ribes96
457a186f5b cgi: setenv: remove equals from arg
https://github.com/warmcat/libwebsockets/issues/3222
2024-09-23 10:36:50 +01:00
Andy Green
c0267eceec tls: openssl: ensure actual error first 2024-09-23 07:00:29 +01:00
Andy Green
53c2adab1a udp: stop crash on failed udp connects at cx destroy 2024-09-23 07:00:25 +01:00
leleliu008
f69835e09c Subject: [PATCH] AI_V4MAPPED macro is missing on some platforms, e.g. OpenBSD, NetBSD, etc. 2024-08-29 14:49:37 +01:00
lailoken
c980be7cf7 windows: fix mishandling slow connects
https://github.com/warmcat/libwebsockets/issues/3208
2024-08-20 13:58:56 +01:00
zzblydia
fdde9119f7 client hs: fix segmentation fault
https://github.com/warmcat/libwebsockets/pull/3171
2024-06-24 09:08:31 +01:00
Andy Green
4abdfa810a client-http: use enum for failures correctly
https://github.com/warmcat/libwebsockets/issues/3159
2024-05-31 17:09:59 +01:00
iwashiira
090ec8ef6b lepc: added bound check for collect_tgt 2024-05-30 05:46:25 +01:00
Andy Green
d1d622d3b9 upng: fuzz: handle 0 width 2024-05-16 08:44:14 +01:00
Andy Green
1e0953ffb8 dlo-lhp: take care margin and padding atr may be NULL
iwashiira on github https://github.com/warmcat/libwebsockets/issues/3140
found the html / css calculation could end up with NULL margin sizes.
2024-05-12 05:55:18 +01:00
Andy Green
bcde9a5b49 lhp: assert if NULL css stack coming to lws_csp_px
iwashiira on github https://github.com/warmcat/libwebsockets/issues/3140
found the html / css calculation could end up with NULL margin sizes.

This causes an assert if we get this unacceptable situation as far as
lws_csp_px()
2024-05-12 05:55:18 +01:00
Zac He
e0f401c0ac Restore erroneous modified assertion 2024-05-12 05:55:18 +01:00
iwashiira
8e84473e3c jpeg: extend mcu_buf_len so that pDst does not cause OOB 2024-05-12 05:17:50 +01:00
Dmitry Potapov
3b0eb45518 http: server: _lws_vhost_init_server_af only needed once
If we already have vh_listen_sockfd ready, call _lws_vhost_init_server_af
only once, regardless of IPv6 support.
2024-05-12 05:11:54 +01:00
Dmitry Potapov
4eab8f5a19 http: windows: adapt dup() to use windows api 2024-05-12 05:10:22 +01:00
iwashiira
7218743472 upng: check ims limits 2024-05-09 14:43:33 +01:00
Seo Suchan
9ba1504d01 mbedtls: fix compile on mbedtls 3.6+
they moved mbedtls_x509_get_name into interal zone.

Signed-off-by: Seo Suchan <tjtncks@gmail.com>
2024-05-07 13:49:23 +01:00
Zac He
e820283203 service: lock pt while using wsi fdtable pos 2024-04-14 05:08:13 +01:00
payne.ye
ec76f8178d smp: extend client to work with tsi
and take care of zombie sul previously left on connect failure path
2024-04-12 06:15:12 +01:00
titofra
5ab6e04c79 lws_xxx_all_protocol: also compare by protocol names 2024-04-12 06:04:40 +01:00
p-luke
e4be3317ee netlink: when binding the per-context socket, let the kernel choose the unicast address.
When using multiple client contextes in a single application, rops_pt_init_destroy_netlink() fails binding the second socket and on - only the first one succeeds. The failure is made obvious by this log:
  W: rops_pt_init_destroy_netlink: netlink bind failed

So, let's fix this by doing what netlink(7) man page suggests:
  If the application sets nl_pid before calling bind(2), then it is up to the
  application to make sure that nl_pid is unique. If the application sets it
  to 0, the kernel takes care of assigning it. The kernel assigns the process
  ID to the first netlink socket the process opens and assigns a unique nl_pid
  to every netlink socket that the process subsequently creates.
2024-03-20 07:29:11 +00:00
makejian
0d76f0950a mbedtls_wrapper: Modify 'd2i_X509' with standard declaration in openssl
https://github.com/warmcat/libwebsockets/pull/3095

Signed-off-by: makejian <makejian@xiaomi.com>
2024-03-18 12:50:30 +00:00
c-jimenez
c57c239368 basic-auth: allow NUL in password
https://github.com/warmcat/libwebsockets/issues/3092
2024-03-11 07:54:39 +00:00
Liu DongMiao
992f40c7a1 raw-skt: don't read more than rx_buffer_size
When other roles like ws reading data, they follow `rx_buffer_size`, then fallback to context's `pt_serv_buf_size`.
However, `raw-skt` don't follow `rx_buffer_size`, always use 0, then fallback to `pt_serv_buf_size`.

This PR make `raw-skt` don't read more than `rx_buffer_size` data.
2024-03-07 09:49:46 +00:00
Liu Dongmiao
e38e85e71f wolfssl: fix build 2024-03-07 09:49:41 +00:00
Liu DongMiao
29c0b56582 raw: connect callback can be triggered twice 2024-03-07 09:49:21 +00:00
Lio DongMiao
299b091ad4 context: fall back if no build-time mbedtls version 2024-03-07 09:49:11 +00:00
Liu Dongmiao
fe9a2b86ab ws: allow reserved bits and opcode
should close #3076
2024-03-01 08:15:08 +00:00
Vladislavs Burakovs
a724300d26 wol: fix socket return for windows 2024-03-01 08:11:11 +00:00
Andy Green
b71a6621b0 h2: file upload: avoid feeling too much POST
https://github.com/warmcat/libwebsockets/issues/3070
2024-02-17 12:34:14 +00:00
AD001\z0048zxj
4f3ce6458b openssl: support SSLKEYLOGFILE server secret logging 2024-02-16 15:45:45 +00:00
Andy Green
378ad62adf digest: only if we have tls lib to do hashing 2024-02-16 15:45:45 +00:00
Andy Green
1239a2b121 http-digest: coverity: dead code 2024-01-17 08:54:51 +00:00
Andy Green
837db622eb clean: avoid maybe-uninitialized
https://github.com/warmcat/libwebsockets/issues/3049
2024-01-16 07:15:30 +00:00
Dustin Lundquist
9393dd3934 ev: remove any watchers on close 2024-01-15 09:29:29 +00:00
Andy Green
c57733cb00 systemd-sockact: set port to 0 on unix domain 2024-01-15 09:18:48 +00:00
Andy Green
638558a4db openssl: only use pc libs if no find_package 2024-01-15 09:18:48 +00:00
Andy Green
49bfef2ecd wol: portability
https://github.com/warmcat/libwebsockets/issues/3048
2024-01-13 08:53:55 +00:00
markmaker
43df4901ee vhost: server: Ignore a vhost port mismatch when using CONTEXT_PORT_NO_LISTEN_SERVER
https://github.com/warmcat/libwebsockets/issues/3044
2024-01-08 14:40:46 +00:00
DomB
f88792df37 lecp: fix format_scan function for numeric longer than 2 digits and negative numbers 2024-01-08 08:25:59 +00:00
Ogre Transporter
50ba61082d windows: clean quirks
https://github.com/warmcat/libwebsockets/issues/3039
2024-01-05 05:50:57 +00:00
Andy Green
3207da067e vhost: allow fd adoption 2024-01-04 11:35:01 +00:00
Fabrice Fontaine
f18fc2316f lib/tls/CMakeLists.txt: fix wolfssl build with pkg-config 2023-12-27 06:36:59 +00:00
stropee
22808f049c http: fix auth digest 2023-12-27 06:34:09 +00:00
Andy Green
7efab5f905 h1: reset pipelined parsing 2023-12-27 06:34:03 +00:00
Andy Green
93ae4cb628 ipv6: avoid spinning on interface set
https://github.com/warmcat/libwebsockets/issues/3028
2023-12-14 05:58:15 +00:00
Andy Green
52a6ab357e context info: add default_loglevel
Allow this kind of pattern for context creation info preparation

        struct lws_context_creation_info info;

        lws_context_info_defaults(&info, policy);
        info.default_loglevel = LLL_USER | LLL_ERR | LLL_WARN;
        lws_cmdline_option_handle_builtin(argc, argv, &info);

Calling lws_context_info_defaults() zeros down and prepares boilerplate in
the info struct, setting the default_loglevel asserts your application
default for the loglevel and then lws_cmdline_option_handle_builtin() will
set either that default loglevel, or override it from the commandline with
-d 1039 etc
2023-12-14 05:53:21 +00:00