1
0
Fork 0
mirror of https://github.com/warmcat/libwebsockets.git synced 2025-03-16 00:00:07 +01:00
Commit graph

4183 commits

Author SHA1 Message Date
Andy Green
e4aa3ece17 ss: check serialize null policy 2021-06-24 06:35:57 +01:00
Andy Green
4141a68f23 ss: avoid null ss policy on req tx len 2021-06-24 06:35:46 +01:00
Andy Green
de8185db9f ss: avoid null ss policy on req tx 2021-06-24 06:35:33 +01:00
Haopeng Li
526310dfea ss: h1: log dereferences NULL 2021-06-24 06:34:04 +01:00
Andy Green
7a283eba05 minimal: htt-client: send user agent and accept
Some servers will 4xx us if they don't see these headers
2021-06-24 06:33:37 +01:00
Andy Green
3d13468e9d ctest: do not reuse ctest-ssp path 2021-06-24 06:32:58 +01:00
Andy Green
e3da2a3b3b android: getnameinfo uses nonstandard size_t 2021-06-20 13:41:53 +01:00
Andy Green
8398ef794b getifaddrs: casts for android 2021-06-20 08:43:22 +01:00
Andy Green
02ae95fa79 non-windows: explicit cast vaarg to mode_t 2021-06-20 07:59:14 +01:00
Mykola Stryebkov
7c3c179e0e win32: client: just do WIN32 check 2021-06-20 07:21:31 +01:00
Andy Green
4c8195df22 windows: only conceal mode_t on windows 2021-06-20 07:21:05 +01:00
Andy Green
0ba8df6eb4 threadpool: disassociate wsi on close 2021-06-20 07:20:32 +01:00
Andy Green
94c50618a4 tls: mbedtls: fix cast for dump helper 2021-06-17 14:24:32 +01:00
RobHap
d896d40156 freertos: check for forcing each time around service loop
https://github.com/warmcat/libwebsockets/issues/2325
2021-06-17 14:21:28 +01:00
kekxv
cd87bc1cbe cmake: tls: use CHECK_SYMBOL_EXISTS 2021-06-17 14:21:11 +01:00
Andy Green
da17f01878 plugin: post: check unexpected write after protocol unbind 2021-06-17 14:20:29 +01:00
Chunho Lee
1c935dff79 clean: else became a NOP 2021-06-17 14:20:09 +01:00
Haopeng Li
896a2e09fc strexp: handle NULL better 2021-06-17 14:19:55 +01:00
DUOLabs333
aa090fc287 cygwin: include in unix type socket init 2021-06-17 14:19:40 +01:00
Andy Green
58a34cb0c3 examples: embedded: keep loop running on WROVER 2021-06-06 11:49:03 +01:00
caobug
85f772f2d1 OSX: Fixed can't find clock_gettime 2021-06-06 11:48:13 +01:00
Khem Raj
014aa77ed3 core-net: Remove unused variable
variable 'n' is being set but it is not used anywhere, latest clang is
able to detect this and flags it

Fixes

lib/core-net/route.c:41:6: error: variable 'n' set but not used [-Werror,-Wunused-but-set-variable]
|         int n = 0;
|             ^
2021-06-06 11:47:52 +01:00
Andy Green
e1ef230187 ss: h2: handle zero length COLON_PATH for metadata 2021-06-06 11:47:43 +01:00
Andy Green
0557e919bb sspc: handle nonexistent metadata cleanly 2021-06-06 11:47:30 +01:00
Andy Green
07bef6b83c coverity: ntp from blob: handle blob missing 2021-06-06 11:47:21 +01:00
Andy Green
2f9ed48d93 coverity: report problem in hpack_dynamic_size() to parent 2021-06-06 11:47:09 +01:00
Andy Green
d155970b67 coverity: h->cwsi must be valid if we are handling rx on it 2021-06-06 11:46:51 +01:00
Andy Green
2d97e343a3 ss: split out blob into own minimal example
The --blob option requires GENCRYPTO that's not on by default, to handle
the hash checks... that's going to cause a lot of confusion because it
means the simplest ss example won't build by default then.

Let's remove the blob support (and GENCRYPTO dependency) from the simplest
example and make a new minimal-secure-streams-blob example that has --blob
support and the GENCRYPTO dependency as well.
2021-06-06 11:46:32 +01:00
Jed Lu
c3dd4d05fe ss: sspc: handle destroy for client_connect and request_tx 2021-06-06 11:46:06 +01:00
Jed Lu
4b6a7982b6 ss: do not restrict close handling to WITH_SERVER 2021-05-27 17:13:26 +01:00
Andrey Grafin
62af701cc8 netlink: fix UB on RTM_NEWADDR/RTM_DELADDR
this patch makes ubsan (-fsanitize-undefined-trap-on-error) happy.

let's look at the following scenario:
1. netlink sends RTM_NEWADDR/RTM_DELADDR message
2. rops_handle_POLLIN_netlink() handles message attributes as RTA_*
3. rops_handle_POLLIN_netlink() finds RTA_PRIORITY attribute and
handles it as u32 value, but it's IFA_CACHEINFO attribute in reality
and payload holds another type
4. ubsan throws SIGTRAP

so, don't handle RTM_NEWADDR/RTM_DELADDR attributes as RTA_*
2021-05-27 17:13:17 +01:00
Andy Green
da512b08c1 coverity: ss: handle NULL omd 2021-05-27 17:13:06 +01:00
Andy Green
d85bfb2816 ss: deal with missing handle metadata 2021-05-27 17:12:57 +01:00
Andy Green
b156268521 sse: server: handle close found as HUP 2021-05-23 17:17:33 +01:00
Or Lupovitz
a0bfc98edf mbedtls: server: enforce client cert check when vhost requires 2021-05-23 17:16:32 +01:00
Andy Green
6c39ba15c7 mbedtls: prepare for v3 changes 2021-05-23 17:16:20 +01:00
Andy Green
8a540be959 smd_queue_depth: cast around toolchain int16_t conv warning 2021-05-23 17:16:06 +01:00
Jin Wang
eef783631f sspc: handle DESTROY_ME at proxy link close cb
It's open to user state callback to respond to the DISCONNECT we issue on
the proxy link closure by escalating it to a DESTROY_ME... we have to deal
with that if it comes.
2021-05-20 15:31:36 +01:00
Yichen Gu
6c011f0530 lwip: handle ECONNABORTED on tls read 2021-05-20 14:07:35 +01:00
Andy Green
531f998cf8 smp: fix client tsi detection 2021-05-20 14:07:25 +01:00
Andy Green
fda7294bd0 ss: h2: leave the ss bound to its affiliated wsi until close clears it
In sai, on Xenial (only...) noticed that the wsi is still bound to the ss
handle, and can reference it even after the ss has been destroyed on
ss-testsfail sometimes.

Leave the handle knowing its wsi and able to detach it later during close.
2021-05-20 14:07:11 +01:00
Andy Green
edcf346f9f h2: migration: migrate for_ss
The attribute indicating that a wsi belongs to an SS object also must be
migrated when we split out the original transaction wsi into a new nwsi, if we're
not going to lose track of its affiliation.

Likewise if the affiliated SS object points to the original wsi, we have to
migrate his pointer when we migrate the wsi.

Taking care of this book-keeping is necessary to get correct behaviours at
close-time.
2021-05-20 14:07:01 +01:00
Andy Green
74b96f831a ss: avs: let multipart handle content-type
We added the neccessary return check on set_metadata which is good, but it
doesn't take into account that for LWA, we will normally use the multipart
stuff, that provides its own conflicting content-type.

Currently the lwa streamtype policy doesn't even provide ctype metadata
type, let's just comment it out.
2021-05-20 14:06:51 +01:00
Andy Green
9cd1f4d78b listen: ip bind: force ipv4 if given ipv4 numeric iface 2021-05-20 14:06:39 +01:00
Jed Lu
0a71e0716c cpd: remove scheduled recheck on dns fail 2021-05-20 14:06:29 +01:00
ycyang1229
3fa6b23a08 mbedtls: privkey from file: fix off-by-one 2021-05-20 13:33:00 +01:00
Andy Green
d12e79b8d8 license: fix two old headers from pre-MIT change
These two headers managed to avoid the global switch from
LGPL2.1 -> MIT back in the day, correct them to be aligned
with the rest of lws' own license, ie, MIT.
2021-05-04 18:35:00 +01:00
Andy Green
281931b753 LICENSE: copy secondary license texts into LICENSE as a convenience 2021-05-04 15:54:42 +01:00
Catalin Raceanu
3ae611cdca tls: client: session cache synthetic cb 2021-05-04 15:54:32 +01:00
Yury Is
f1ff43ddea netlink: fix RTM_NEWLINK handling
https://github.com/warmcat/libwebsockets/issues/2287
2021-04-29 12:29:35 +01:00