/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-server.c | 62 n = wsi->a.vhost->protocols[0].callback(wsi, in OpenSSL_verify_callback() 100 struct lws_vhost *vhost, *vh; in lws_ssl_server_name_cb() local 107 * We can only get ssl accepted connections by using a vhost's ssl_ctx in lws_ssl_server_name_cb() 132 vhost = lws_select_vhost(context, vh->listen_port, servername); in lws_ssl_server_name_cb() 133 if (!vhost) { in lws_ssl_server_name_cb() 141 /* select the ssl ctx from the selected vhost for this conn */ in lws_ssl_server_name_cb() 142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb() 149 * this may now get called after the vhost creation, when certs become 153 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, argument 177 int n = (int)lws_tls_generic_cert_checks(vhost, cer 497 lws_tls_server_vhost_backend_init(const struct lws_context_creation_info *info, struct lws_vhost *vhost, struct lws *wsi) global() argument 814 lws_tls_acme_sni_cert_create(struct lws_vhost *vhost, const char *san_a, const char *san_b) global() argument 935 lws_tls_acme_sni_cert_destroy(struct lws_vhost *vhost) global() argument [all...] |
H A D | openssl-ssl.c | 138 lws_ssl_destroy_client_ctx(struct lws_vhost *vhost) in lws_ssl_destroy_client_ctx() argument 140 if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx) in lws_ssl_destroy_client_ctx() 143 if (vhost->tls.tcr && --vhost->tls.tcr->refcount) in lws_ssl_destroy_client_ctx() 146 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy_client_ctx() 147 vhost->tls.ssl_client_ctx = NULL; in lws_ssl_destroy_client_ctx() 149 vhost->context->tls.count_client_contexts--; in lws_ssl_destroy_client_ctx() 151 if (vhost->tls.tcr) { in lws_ssl_destroy_client_ctx() 152 lws_dll2_remove(&vhost in lws_ssl_destroy_client_ctx() 159 lws_ssl_destroy(struct lws_vhost *vhost) lws_ssl_destroy() argument 483 lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost) lws_ssl_SSL_CTX_destroy() argument [all...] |
/third_party/libwebsockets/lib/core-net/client/ |
H A D | client.c | 30 lws_set_proxy(struct lws_vhost *vhost, const char *proxy) in lws_set_proxy() argument 52 vhost->proxy_basic_auth_token, in lws_set_proxy() 53 sizeof vhost->proxy_basic_auth_token) < 0) in lws_set_proxy() 56 lwsl_vhost_info(vhost, " Proxy auth in use"); in lws_set_proxy() 62 vhost->proxy_basic_auth_token[0] = '\0'; in lws_set_proxy() 80 lws_strncpy(vhost->http.http_proxy_address, proxy + brackets, in lws_set_proxy() 81 sizeof(vhost->http.http_proxy_address)); in lws_set_proxy() 83 p = vhost->http.http_proxy_address; in lws_set_proxy() 89 p = strchr(vhost->http.http_proxy_address, ']'); in lws_set_proxy() 91 lwsl_vhost_err(vhost, "malforme in lws_set_proxy() [all...] |
H A D | connect2.c | 243 * Add ourselves to the vhost list of those so that others can 253 lws_vhost_lock(wsi->a.vhost); 257 &wsi->a.vhost->dll_cli_active_conns_owner); 258 lws_vhost_unlock(wsi->a.vhost); 282 * start off allowing ipv6 on connection if vhost allows it 284 wsi->ipv6 = LWS_IPV6_ENABLED(wsi->a.vhost); 305 if (wsi->a.vhost->http.http_proxy_port) { 306 adsin = wsi->a.vhost->http.http_proxy_address; 307 port = (int)wsi->a.vhost->http.http_proxy_port; 316 } else if (wsi->a.vhost [all...] |
H A D | connect4.c | 57 if (wsi->a.vhost->http.http_proxy_port) { in lws_client_connect_4_established() 74 if (wsi->a.vhost->proxy_basic_auth_token[0]) in lws_client_connect_4_established() 77 wsi->a.vhost->proxy_basic_auth_token); in lws_client_connect_4_established() 90 wsi->a.vhost->http.http_proxy_address; in lws_client_connect_4_established() 94 wsi->a.vhost->http.http_proxy_address)) in lws_client_connect_4_established() 96 wsi->c_port = (uint16_t)wsi->a.vhost->http.http_proxy_port; in lws_client_connect_4_established() 167 wsi->a.vhost->name, lwsi_state(wsi)); in lws_client_connect_4_established()
|
/third_party/libwebsockets/lib/core-net/ |
H A D | pollfd.c | 160 if (wsi->a.vhost && in _lws_change_pollfd() 161 wsi->a.vhost->protocols[0].callback(wsi, in _lws_change_pollfd() 204 if (sampled_tid && wsi->a.vhost) { in _lws_change_pollfd() 205 tid = wsi->a.vhost->protocols[0].callback(wsi, in _lws_change_pollfd() 302 assert(wsi->event_pipe || wsi->a.vhost || wsi == pt->context->netlink); in __insert_wsi_socket_into_fds() 304 assert(wsi->event_pipe || wsi->a.vhost); in __insert_wsi_socket_into_fds() 310 if (wsi->a.vhost && in __insert_wsi_socket_into_fds() 311 wsi->a.vhost->protocols[0].callback(wsi, LWS_CALLBACK_LOCK_POLL, in __insert_wsi_socket_into_fds() 332 if (wsi->a.vhost && in __insert_wsi_socket_into_fds() 333 wsi->a.vhost in __insert_wsi_socket_into_fds() 602 lws_callback_on_writable_all_protocol_vhost(const struct lws_vhost *vhost, const struct lws_protocols *protocol) lws_callback_on_writable_all_protocol_vhost() argument 636 struct lws_vhost *vhost; lws_callback_on_writable_all_protocol() local [all...] |
H A D | socks5-client.c | 30 lws_set_socks(struct lws_vhost *vhost, const char *socks) in lws_set_socks() argument 39 vhost->socks_user[0] = '\0'; in lws_set_socks() 40 vhost->socks_password[0] = '\0'; in lws_set_socks() 46 lwsl_vhost_err(vhost, "auth too long"); in lws_set_socks() 54 lwsl_vhost_err(vhost, "user too long"); in lws_set_socks() 59 lwsl_vhost_err(vhost, "pw too long"); in lws_set_socks() 63 lws_strncpy(vhost->socks_user, socks, in lws_set_socks() 65 lws_strncpy(vhost->socks_password, p_colon + 1, in lws_set_socks() 69 lwsl_vhost_info(vhost, " Socks auth, user: %s, password: %s", in lws_set_socks() 70 vhost in lws_set_socks() [all...] |
H A D | adopt.c | 48 lws_create_new_server_wsi(struct lws_vhost *vhost, int fixed_tsi, const char *desc) in lws_create_new_server_wsi() argument 54 n = lws_get_idlest_tsi(vhost->context); in lws_create_new_server_wsi() 57 lwsl_vhost_err(vhost, "no space for new conn"); in lws_create_new_server_wsi() 61 lws_context_lock(vhost->context, __func__); in lws_create_new_server_wsi() 62 new_wsi = __lws_wsi_create_with_role(vhost->context, n, NULL, in lws_create_new_server_wsi() 63 vhost->lc.log_cx); in lws_create_new_server_wsi() 64 lws_context_unlock(vhost->context); in lws_create_new_server_wsi() 66 lwsl_vhost_err(vhost, "OOM"); in lws_create_new_server_wsi() 72 __lws_lc_tag(vhost->context, &vhost in lws_create_new_server_wsi() 793 lws_create_adopt_udp(struct lws_vhost *vhost, const char *ads, int port, int flags, const char *protocol_name, const char *ifname, struct lws *parent_wsi, void *opaque, const lws_retry_bo_t *retry_policy, const char *fi_wsi_name) lws_create_adopt_udp() argument 935 lws_adopt_socket_vhost_readbuf(struct lws_vhost *vhost, lws_sockfd_type accept_fd, const char *readbuf, size_t len) lws_adopt_socket_vhost_readbuf() argument [all...] |
H A D | vhost.c | 143 * if the vhost is told to bind accepted sockets to a given role, in lws_role_call_adoption_bind() 146 if (lws_check_opt(wsi->a.vhost->options, in lws_role_call_adoption_bind() 148 wsi->a.vhost->listen_accept_role) { in lws_role_call_adoption_bind() 150 lws_role_by_name(wsi->a.vhost->listen_accept_role); in lws_role_call_adoption_bind() 153 prot = wsi->a.vhost->listen_accept_protocol; in lws_role_call_adoption_bind() 157 wsi->a.vhost->listen_accept_role); in lws_role_call_adoption_bind() 159 if (!strcmp(wsi->a.vhost->listen_accept_role, "raw-proxy")) in lws_role_call_adoption_bind() 179 wsi->a.vhost->listen_accept_role, prot, type); in lws_role_call_adoption_bind() 245 lws_protocol_vh_priv_zalloc(struct lws_vhost *vhost, in lws_protocol_vh_priv_zalloc() argument 250 if (!vhost || !pro in lws_protocol_vh_priv_zalloc() 286 lws_protocol_vh_priv_get(struct lws_vhost *vhost, const struct lws_protocols *prot) lws_protocol_vh_priv_get() argument 1063 lws_init_vhost_client_ssl(const struct lws_context_creation_info *info, struct lws_vhost *vhost) lws_init_vhost_client_ssl() argument 1669 lws_vhost_user(struct lws_vhost *vhost) global() argument 1675 lws_get_vhost_listen_port(struct lws_vhost *vhost) global() argument [all...] |
H A D | wsi.c | 67 if (wsi->a.vhost == vh) in lws_vhost_bind_wsi() 71 wsi->a.vhost = vh; in lws_vhost_bind_wsi() 87 assert(wsi->a.vhost->count_bound_wsi > 0); in lws_vhost_bind_wsi() 95 struct lws_vhost *vh = wsi->a.vhost; in __lws_vhost_unbind_wsi() 119 * We have closed all wsi that were bound to this vhost in __lws_vhost_unbind_wsi() 127 wsi->a.vhost = NULL; in __lws_vhost_unbind_wsi() 219 if (wsi->a.vhost == vh && (wsi->a.protocol == protocol || in lws_callback_all_protocol_vhost_args() 242 for (n = 0; n < wsi->a.vhost->count_protocols; n++) in lws_callback_vhost_protocols() 243 if (wsi->a.vhost->protocols[n].callback(wsi, (enum lws_callback_reasons)reason, NULL, in, len)) in lws_callback_vhost_protocols() 324 wsi->a.vhost in __lws_wsi_create_with_role() 954 lws_get_vhost_name(struct lws_vhost *vhost) lws_get_vhost_name() argument 960 lws_get_vhost_port(struct lws_vhost *vhost) lws_get_vhost_port() argument 966 lws_get_vhost_user(struct lws_vhost *vhost) lws_get_vhost_user() argument 972 lws_get_vhost_iface(struct lws_vhost *vhost) lws_get_vhost_iface() argument [all...] |
/third_party/libwebsockets/lib/tls/ |
H A D | tls-server.c | 44 struct lws_vhost *vhost) in lws_context_init_server_ssl() 46 struct lws_context *context = vhost->context; in lws_context_init_server_ssl() 47 lws_fakewsi_def_plwsa(&vhost->context->pt[0]); in lws_context_init_server_ssl() 49 lws_fakewsi_prep_plwsa_ctx(vhost->context); in lws_context_init_server_ssl() 53 vhost->tls.use_ssl = 0; in lws_context_init_server_ssl() 60 * it on this vhost. User code can leave the cert filepath NULL and in lws_context_init_server_ssl() 64 * provides the vhost SSL_CTX * in the user parameter. in lws_context_init_server_ssl() 67 vhost->options |= LWS_SERVER_OPTION_CREATE_VHOST_SSL_CTX; in lws_context_init_server_ssl() 71 vhost->tls.use_ssl = lws_check_opt(vhost in lws_context_init_server_ssl() 43 lws_context_init_server_ssl(const struct lws_context_creation_info *info, struct lws_vhost *vhost) lws_context_init_server_ssl() argument [all...] |
H A D | tls-client.c | 108 struct lws_vhost *vhost) in lws_context_init_client_ssl() 114 lws_fakewsi_def_plwsa(&vhost->context->pt[0]); in lws_context_init_client_ssl() 116 lws_fakewsi_prep_plwsa_ctx(vhost->context); in lws_context_init_client_ssl() 118 if (vhost->options & LWS_SERVER_OPTION_ADOPT_APPLY_LISTEN_ACCEPT_CONFIG) in lws_context_init_client_ssl() 121 if (vhost->tls.ssl_ctx) { in lws_context_init_client_ssl() 144 if (vhost->tls.ssl_client_ctx) in lws_context_init_client_ssl() 150 vhost->tls.ssl_client_ctx = info->provided_client_ssl_ctx; in lws_context_init_client_ssl() 152 vhost->tls.user_supplied_ssl_ctx = 1; in lws_context_init_client_ssl() 158 if (lws_tls_client_create_vhost_context(vhost, info, cipher_list, in lws_context_init_client_ssl() 171 lwsl_info("created client ssl context for %s\n", vhost in lws_context_init_client_ssl() 107 lws_context_init_client_ssl(const struct lws_context_creation_info *info, struct lws_vhost *vhost) lws_context_init_client_ssl() argument [all...] |
H A D | private-network.h | 95 lws_context_init_alpn(struct lws_vhost *vhost); 112 lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost); 134 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, 139 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert, 144 struct lws_vhost *vhost); 146 lws_tls_acme_sni_cert_destroy(struct lws_vhost *vhost); 153 lws_ssl_destroy(struct lws_vhost *vhost); 163 struct lws_vhost *vhost, struct lws *wsi); 202 struct lws_vhost *vhost);
|
H A D | tls.c | 156 lws_context_init_alpn(struct lws_vhost *vhost) in lws_context_init_alpn() argument 160 const char *alpn_comma = vhost->context->tls.alpn_default; in lws_context_init_alpn() 162 if (vhost->tls.alpn) in lws_context_init_alpn() 163 alpn_comma = vhost->tls.alpn; in lws_context_init_alpn() 166 vhost->name, alpn_comma); in lws_context_init_alpn() 168 vhost->tls.alpn_ctx.len = (uint8_t)lws_alpn_comma_to_openssl(alpn_comma, in lws_context_init_alpn() 169 vhost->tls.alpn_ctx.data, in lws_context_init_alpn() 170 sizeof(vhost->tls.alpn_ctx.data) - 1); in lws_context_init_alpn() 172 SSL_CTX_set_alpn_select_cb(vhost->tls.ssl_ctx, alpn_cb, in lws_context_init_alpn() 173 &vhost in lws_context_init_alpn() [all...] |
/third_party/libwebsockets/plugins/acme-client/ |
H A D | protocol_lws_acme_client.c | 81 struct lws_vhost *vhost; member 108 struct lws_vhost *vhost; member 112 * the vhd is allocated for every vhost using the plugin. 136 struct lws_vhost *vhost = lws_get_vhost(wsi); in callback_chall_http01() local 137 struct acme_connection *ac = lws_vhost_user(vhost); in callback_chall_http01() 602 i->vhost = vh; in lws_acme_client_connect() 627 if (vhd->ac->vhost) in lws_acme_finished() 628 lws_vhost_destroy(vhd->ac->vhost); in lws_acme_finished() 674 lwsl_vhost_warn(vhd->vhost, "failed to create keypair"); in lws_acme_load_create_auth_keys() 681 lwsl_vhost_warn(vhd->vhost, "unabl in lws_acme_load_create_auth_keys() [all...] |
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | mbedtls-ssl.c | 29 lws_ssl_destroy(struct lws_vhost *vhost) in lws_ssl_destroy() argument 31 if (!lws_check_opt(vhost->context->options, in lws_ssl_destroy() 35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy() 36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy() 37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy() 38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy() 40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy() 41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy() 105 if (wsi->a.vhost) in lws_ssl_capable_read() 287 lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost) lws_ssl_SSL_CTX_destroy() argument [all...] |
H A D | mbedtls-server.c | 58 struct lws_vhost *vhost, *vh; in lws_mbedtls_sni_cb() local 63 * We can only get ssl accepted connections by using a vhost's ssl_ctx in lws_mbedtls_sni_cb() 80 vhost = lws_select_vhost(context, vh->listen_port, in lws_mbedtls_sni_cb() 82 if (!vhost) { in lws_mbedtls_sni_cb() 88 lwsl_info("SNI: Found: %s:%d at vhost '%s'\n", servername, in lws_mbedtls_sni_cb() 89 vh->listen_port, vhost->name); in lws_mbedtls_sni_cb() 91 if (!vhost->tls.ssl_ctx) { in lws_mbedtls_sni_cb() 92 lwsl_err("%s: vhost %s matches SNI but no valid cert\n", in lws_mbedtls_sni_cb() 98 /* select the ssl ctx from the selected vhost for this conn */ in lws_mbedtls_sni_cb() 99 SSL_set_SSL_CTX(ssl, vhost in lws_mbedtls_sni_cb() 105 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) lws_tls_server_certs_load() argument 185 lws_tls_server_vhost_backend_init(const struct lws_context_creation_info *info, struct lws_vhost *vhost, struct lws *wsi) lws_tls_server_vhost_backend_init() argument 453 lws_tls_acme_sni_cert_create(struct lws_vhost *vhost, const char *san_a, const char *san_b) lws_tls_acme_sni_cert_create() argument 591 lws_tls_acme_sni_cert_destroy(struct lws_vhost *vhost) lws_tls_acme_sni_cert_destroy() argument [all...] |
H A D | mbedtls-session.c | 80 if (!wsi->a.vhost || in lws_tls_reuse_session() 81 wsi->a.vhost->options & LWS_SERVER_OPTION_DISABLE_TLS_SESSION_CACHE) in lws_tls_reuse_session() 85 lws_vhost_lock(wsi->a.vhost); /* -------------- vh { */ in lws_tls_reuse_session() 90 ts = __lws_tls_session_lookup_by_name(wsi->a.vhost, buf); in lws_tls_reuse_session() 106 lws_dll2_add_tail(&ts->list, &wsi->a.vhost->tls_sessions); in lws_tls_reuse_session() 109 lws_vhost_unlock(wsi->a.vhost); /* } vh -------------- */ in lws_tls_reuse_session() 175 vh = wsi->a.vhost; in lws_tls_session_new_mbedtls() 199 * We have reached the vhost's session cache limit, in lws_tls_session_new_mbedtls()
|
/third_party/libwebsockets/lib/roles/http/server/ |
H A D | server.c | 58 struct lws_vhost *vhost; member 69 if (!lws_vhost_compare_listen(wsi->a.vhost, a->vhost)) in check_extant() 75 lwsl_notice(" using listen skt from vhost %s\n", wsi->a.vhost->name); in check_extant() 87 struct lws_context *cx = a->vhost->context; in _lws_vhost_init_server_af() 102 if (lws_vhost_foreach_listen_wsi(a->vhost->context, a, check_extant)) in _lws_vhost_init_server_af() 107 if (a->vhost->iface) { in _lws_vhost_init_server_af() 113 is = lws_socket_bind(a->vhost, NULL, LWS_SOCK_INVALID, in _lws_vhost_init_server_af() 114 a->vhost in _lws_vhost_init_server_af() 406 _lws_vhost_init_server(const struct lws_context_creation_info *info, struct lws_vhost *vhost) _lws_vhost_init_server() argument 506 struct lws_vhost *vhost = context->vhost_list; lws_select_vhost() local 2272 struct lws_vhost *vhost = lws_select_vhost( lws_handshake_server() local [all...] |
/third_party/libwebsockets/lib/roles/listen/ |
H A D | ops-listen.c | 37 /* if our vhost is going down, ignore it */ in rops_handle_POLLIN_listen() 39 if (wsi->a.vhost->being_destroyed) in rops_handle_POLLIN_listen() 59 * another vhost may also have had POLLIN on his in rops_handle_POLLIN_listen() 62 if (wsi->a.vhost->tls.use_ssl && in rops_handle_POLLIN_listen() 103 lws_plat_set_socket_options(wsi->a.vhost, filt.accept_fd, 0); in rops_handle_POLLIN_listen() 128 if ((wsi->a.vhost->protocols[0].callback)(wsi, in rops_handle_POLLIN_listen() 137 if (!(wsi->a.vhost->options & in rops_handle_POLLIN_listen() 142 if (!wsi->a.vhost->tls.use_ssl) in rops_handle_POLLIN_listen() 147 cwsi = lws_adopt_descriptor_vhost(wsi->a.vhost, (lws_adoption_type)opts, fd, in rops_handle_POLLIN_listen() 148 wsi->a.vhost in rops_handle_POLLIN_listen() [all...] |
/third_party/libwebsockets/lib/plat/unix/ |
H A D | unix-sockets.c | 102 lws_plat_set_socket_options(struct lws_vhost *vhost, int fd, int unix_skt) in lws_plat_set_socket_options() argument 123 if (!unix_skt && vhost->ka_time) { in lws_plat_set_socket_options() 144 optval = 1000 * (vhost->ka_time + in lws_plat_set_socket_options() 145 (vhost->ka_interval * vhost->ka_probes)); in lws_plat_set_socket_options() 150 optval = vhost->ka_time; in lws_plat_set_socket_options() 155 optval = vhost->ka_interval; in lws_plat_set_socket_options() 160 optval = vhost->ka_probes; in lws_plat_set_socket_options() 168 if (!unix_skt && vhost->bind_iface && vhost in lws_plat_set_socket_options() 589 lws_plat_vhost_tls_client_ctx_init(struct lws_vhost *vhost) lws_plat_vhost_tls_client_ctx_init() argument [all...] |
/third_party/libwebsockets/lib/roles/ws/ |
H A D | client-ws.c | 181 ext = wsi->a.vhost->ws.extensions; in lws_generate_client_ws_handshake() 184 n = wsi->a.vhost->protocols[0].callback(wsi, in lws_generate_client_ws_handshake() 349 wsi->a.protocol = &wsi->a.vhost->protocols[0]; in lws_client_ws_upgrade() 389 while (n < wsi->a.vhost->count_protocols) { in lws_client_ws_upgrade() 391 strcmp(p, wsi->a.vhost->protocols[n].name) == 0) { in lws_client_ws_upgrade() 392 wsi->a.protocol = &wsi->a.vhost->protocols[n]; in lws_client_ws_upgrade() 398 if (n == wsi->a.vhost->count_protocols) { /* no match */ in lws_client_ws_upgrade() 409 while (wsi->a.vhost->protocols[n].callback) { in lws_client_ws_upgrade() 411 wsi->a.vhost->protocols[n].name) == 0) { in lws_client_ws_upgrade() 412 wsi->a.protocol = &wsi->a.vhost in lws_client_ws_upgrade() [all...] |
H A D | server-ws.c | 115 ext = wsi->a.vhost->ws.extensions; in lws_extension_server_handshake() 266 * For vhost ws basic auth, it is "basic-auth": "path" as usual but in lws_process_ws_upgrade2() 267 * applied to the protocol's entry in the vhost's "ws-protocols": in lws_process_ws_upgrade2() 271 pvos = lws_vhost_protocol_options(wsi->a.vhost, wsi->a.protocol->name); in lws_process_ws_upgrade2() 314 if (wsi->a.vhost->ss_handle) { in lws_process_ws_upgrade2() 316 __func__, lws_ss_tag(wsi->a.vhost->ss_handle)); in lws_process_ws_upgrade2() 325 (void)lws_ss_event_helper(wsi->a.vhost->ss_handle, in lws_process_ws_upgrade2() 539 int n = wsi->a.vhost->default_protocol_index; in lws_process_ws_upgrade() 542 * protocol list header... allow it and match to the vhost's in lws_process_ws_upgrade() 545 * Setting the vhost defaul in lws_process_ws_upgrade() [all...] |
/third_party/libwebsockets/lib/roles/raw-file/ |
H A D | ops-raw-file.c | 70 if (wsi->a.vhost->default_protocol_index >= in rops_adoption_bind_raw_file() 71 wsi->a.vhost->count_protocols) in rops_adoption_bind_raw_file() 74 wsi->a.protocol = &wsi->a.vhost->protocols[ in rops_adoption_bind_raw_file() 75 wsi->a.vhost->default_protocol_index]; in rops_adoption_bind_raw_file()
|
/third_party/libwebsockets/lib/plat/freertos/ |
H A D | freertos-sockets.c | 87 lws_plat_set_socket_options(struct lws_vhost *vhost, int fd, int unix_skt) in lws_plat_set_socket_options() argument 99 if (vhost->ka_time) { in lws_plat_set_socket_options() 117 optval = vhost->ka_time; in lws_plat_set_socket_options() 122 optval = vhost->ka_interval; in lws_plat_set_socket_options() 127 optval = vhost->ka_probes; in lws_plat_set_socket_options() 328 lws_plat_vhost_tls_client_ctx_init(struct lws_vhost *vhost) in lws_plat_vhost_tls_client_ctx_init() argument
|