Home
last modified time | relevance | path

Searched refs:vhost (Results 1 - 25 of 109) sorted by relevance

12345

/third_party/libwebsockets/lib/tls/openssl/
H A Dopenssl-server.c62 n = wsi->a.vhost->protocols[0].callback(wsi, in OpenSSL_verify_callback()
100 struct lws_vhost *vhost, *vh; in lws_ssl_server_name_cb() local
107 * We can only get ssl accepted connections by using a vhost's ssl_ctx in lws_ssl_server_name_cb()
132 vhost = lws_select_vhost(context, vh->listen_port, servername); in lws_ssl_server_name_cb()
133 if (!vhost) { in lws_ssl_server_name_cb()
141 /* select the ssl ctx from the selected vhost for this conn */ in lws_ssl_server_name_cb()
142 SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx); in lws_ssl_server_name_cb()
149 * this may now get called after the vhost creation, when certs become
153 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, argument
177 int n = (int)lws_tls_generic_cert_checks(vhost, cer
497 lws_tls_server_vhost_backend_init(const struct lws_context_creation_info *info, struct lws_vhost *vhost, struct lws *wsi) global() argument
814 lws_tls_acme_sni_cert_create(struct lws_vhost *vhost, const char *san_a, const char *san_b) global() argument
935 lws_tls_acme_sni_cert_destroy(struct lws_vhost *vhost) global() argument
[all...]
H A Dopenssl-ssl.c138 lws_ssl_destroy_client_ctx(struct lws_vhost *vhost) in lws_ssl_destroy_client_ctx() argument
140 if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx) in lws_ssl_destroy_client_ctx()
143 if (vhost->tls.tcr && --vhost->tls.tcr->refcount) in lws_ssl_destroy_client_ctx()
146 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy_client_ctx()
147 vhost->tls.ssl_client_ctx = NULL; in lws_ssl_destroy_client_ctx()
149 vhost->context->tls.count_client_contexts--; in lws_ssl_destroy_client_ctx()
151 if (vhost->tls.tcr) { in lws_ssl_destroy_client_ctx()
152 lws_dll2_remove(&vhost in lws_ssl_destroy_client_ctx()
159 lws_ssl_destroy(struct lws_vhost *vhost) lws_ssl_destroy() argument
483 lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost) lws_ssl_SSL_CTX_destroy() argument
[all...]
/third_party/libwebsockets/lib/core-net/client/
H A Dclient.c30 lws_set_proxy(struct lws_vhost *vhost, const char *proxy) in lws_set_proxy() argument
52 vhost->proxy_basic_auth_token, in lws_set_proxy()
53 sizeof vhost->proxy_basic_auth_token) < 0) in lws_set_proxy()
56 lwsl_vhost_info(vhost, " Proxy auth in use"); in lws_set_proxy()
62 vhost->proxy_basic_auth_token[0] = '\0'; in lws_set_proxy()
80 lws_strncpy(vhost->http.http_proxy_address, proxy + brackets, in lws_set_proxy()
81 sizeof(vhost->http.http_proxy_address)); in lws_set_proxy()
83 p = vhost->http.http_proxy_address; in lws_set_proxy()
89 p = strchr(vhost->http.http_proxy_address, ']'); in lws_set_proxy()
91 lwsl_vhost_err(vhost, "malforme in lws_set_proxy()
[all...]
H A Dconnect2.c243 * Add ourselves to the vhost list of those so that others can
253 lws_vhost_lock(wsi->a.vhost);
257 &wsi->a.vhost->dll_cli_active_conns_owner);
258 lws_vhost_unlock(wsi->a.vhost);
282 * start off allowing ipv6 on connection if vhost allows it
284 wsi->ipv6 = LWS_IPV6_ENABLED(wsi->a.vhost);
305 if (wsi->a.vhost->http.http_proxy_port) {
306 adsin = wsi->a.vhost->http.http_proxy_address;
307 port = (int)wsi->a.vhost->http.http_proxy_port;
316 } else if (wsi->a.vhost
[all...]
H A Dconnect4.c57 if (wsi->a.vhost->http.http_proxy_port) { in lws_client_connect_4_established()
74 if (wsi->a.vhost->proxy_basic_auth_token[0]) in lws_client_connect_4_established()
77 wsi->a.vhost->proxy_basic_auth_token); in lws_client_connect_4_established()
90 wsi->a.vhost->http.http_proxy_address; in lws_client_connect_4_established()
94 wsi->a.vhost->http.http_proxy_address)) in lws_client_connect_4_established()
96 wsi->c_port = (uint16_t)wsi->a.vhost->http.http_proxy_port; in lws_client_connect_4_established()
167 wsi->a.vhost->name, lwsi_state(wsi)); in lws_client_connect_4_established()
/third_party/libwebsockets/lib/core-net/
H A Dpollfd.c160 if (wsi->a.vhost && in _lws_change_pollfd()
161 wsi->a.vhost->protocols[0].callback(wsi, in _lws_change_pollfd()
204 if (sampled_tid && wsi->a.vhost) { in _lws_change_pollfd()
205 tid = wsi->a.vhost->protocols[0].callback(wsi, in _lws_change_pollfd()
302 assert(wsi->event_pipe || wsi->a.vhost || wsi == pt->context->netlink); in __insert_wsi_socket_into_fds()
304 assert(wsi->event_pipe || wsi->a.vhost); in __insert_wsi_socket_into_fds()
310 if (wsi->a.vhost && in __insert_wsi_socket_into_fds()
311 wsi->a.vhost->protocols[0].callback(wsi, LWS_CALLBACK_LOCK_POLL, in __insert_wsi_socket_into_fds()
332 if (wsi->a.vhost && in __insert_wsi_socket_into_fds()
333 wsi->a.vhost in __insert_wsi_socket_into_fds()
602 lws_callback_on_writable_all_protocol_vhost(const struct lws_vhost *vhost, const struct lws_protocols *protocol) lws_callback_on_writable_all_protocol_vhost() argument
636 struct lws_vhost *vhost; lws_callback_on_writable_all_protocol() local
[all...]
H A Dsocks5-client.c30 lws_set_socks(struct lws_vhost *vhost, const char *socks) in lws_set_socks() argument
39 vhost->socks_user[0] = '\0'; in lws_set_socks()
40 vhost->socks_password[0] = '\0'; in lws_set_socks()
46 lwsl_vhost_err(vhost, "auth too long"); in lws_set_socks()
54 lwsl_vhost_err(vhost, "user too long"); in lws_set_socks()
59 lwsl_vhost_err(vhost, "pw too long"); in lws_set_socks()
63 lws_strncpy(vhost->socks_user, socks, in lws_set_socks()
65 lws_strncpy(vhost->socks_password, p_colon + 1, in lws_set_socks()
69 lwsl_vhost_info(vhost, " Socks auth, user: %s, password: %s", in lws_set_socks()
70 vhost in lws_set_socks()
[all...]
H A Dadopt.c48 lws_create_new_server_wsi(struct lws_vhost *vhost, int fixed_tsi, const char *desc) in lws_create_new_server_wsi() argument
54 n = lws_get_idlest_tsi(vhost->context); in lws_create_new_server_wsi()
57 lwsl_vhost_err(vhost, "no space for new conn"); in lws_create_new_server_wsi()
61 lws_context_lock(vhost->context, __func__); in lws_create_new_server_wsi()
62 new_wsi = __lws_wsi_create_with_role(vhost->context, n, NULL, in lws_create_new_server_wsi()
63 vhost->lc.log_cx); in lws_create_new_server_wsi()
64 lws_context_unlock(vhost->context); in lws_create_new_server_wsi()
66 lwsl_vhost_err(vhost, "OOM"); in lws_create_new_server_wsi()
72 __lws_lc_tag(vhost->context, &vhost in lws_create_new_server_wsi()
793 lws_create_adopt_udp(struct lws_vhost *vhost, const char *ads, int port, int flags, const char *protocol_name, const char *ifname, struct lws *parent_wsi, void *opaque, const lws_retry_bo_t *retry_policy, const char *fi_wsi_name) lws_create_adopt_udp() argument
935 lws_adopt_socket_vhost_readbuf(struct lws_vhost *vhost, lws_sockfd_type accept_fd, const char *readbuf, size_t len) lws_adopt_socket_vhost_readbuf() argument
[all...]
H A Dvhost.c143 * if the vhost is told to bind accepted sockets to a given role, in lws_role_call_adoption_bind()
146 if (lws_check_opt(wsi->a.vhost->options, in lws_role_call_adoption_bind()
148 wsi->a.vhost->listen_accept_role) { in lws_role_call_adoption_bind()
150 lws_role_by_name(wsi->a.vhost->listen_accept_role); in lws_role_call_adoption_bind()
153 prot = wsi->a.vhost->listen_accept_protocol; in lws_role_call_adoption_bind()
157 wsi->a.vhost->listen_accept_role); in lws_role_call_adoption_bind()
159 if (!strcmp(wsi->a.vhost->listen_accept_role, "raw-proxy")) in lws_role_call_adoption_bind()
179 wsi->a.vhost->listen_accept_role, prot, type); in lws_role_call_adoption_bind()
245 lws_protocol_vh_priv_zalloc(struct lws_vhost *vhost, in lws_protocol_vh_priv_zalloc() argument
250 if (!vhost || !pro in lws_protocol_vh_priv_zalloc()
286 lws_protocol_vh_priv_get(struct lws_vhost *vhost, const struct lws_protocols *prot) lws_protocol_vh_priv_get() argument
1063 lws_init_vhost_client_ssl(const struct lws_context_creation_info *info, struct lws_vhost *vhost) lws_init_vhost_client_ssl() argument
1669 lws_vhost_user(struct lws_vhost *vhost) global() argument
1675 lws_get_vhost_listen_port(struct lws_vhost *vhost) global() argument
[all...]
H A Dwsi.c67 if (wsi->a.vhost == vh) in lws_vhost_bind_wsi()
71 wsi->a.vhost = vh; in lws_vhost_bind_wsi()
87 assert(wsi->a.vhost->count_bound_wsi > 0); in lws_vhost_bind_wsi()
95 struct lws_vhost *vh = wsi->a.vhost; in __lws_vhost_unbind_wsi()
119 * We have closed all wsi that were bound to this vhost in __lws_vhost_unbind_wsi()
127 wsi->a.vhost = NULL; in __lws_vhost_unbind_wsi()
219 if (wsi->a.vhost == vh && (wsi->a.protocol == protocol || in lws_callback_all_protocol_vhost_args()
242 for (n = 0; n < wsi->a.vhost->count_protocols; n++) in lws_callback_vhost_protocols()
243 if (wsi->a.vhost->protocols[n].callback(wsi, (enum lws_callback_reasons)reason, NULL, in, len)) in lws_callback_vhost_protocols()
324 wsi->a.vhost in __lws_wsi_create_with_role()
954 lws_get_vhost_name(struct lws_vhost *vhost) lws_get_vhost_name() argument
960 lws_get_vhost_port(struct lws_vhost *vhost) lws_get_vhost_port() argument
966 lws_get_vhost_user(struct lws_vhost *vhost) lws_get_vhost_user() argument
972 lws_get_vhost_iface(struct lws_vhost *vhost) lws_get_vhost_iface() argument
[all...]
/third_party/libwebsockets/lib/tls/
H A Dtls-server.c44 struct lws_vhost *vhost) in lws_context_init_server_ssl()
46 struct lws_context *context = vhost->context; in lws_context_init_server_ssl()
47 lws_fakewsi_def_plwsa(&vhost->context->pt[0]); in lws_context_init_server_ssl()
49 lws_fakewsi_prep_plwsa_ctx(vhost->context); in lws_context_init_server_ssl()
53 vhost->tls.use_ssl = 0; in lws_context_init_server_ssl()
60 * it on this vhost. User code can leave the cert filepath NULL and in lws_context_init_server_ssl()
64 * provides the vhost SSL_CTX * in the user parameter. in lws_context_init_server_ssl()
67 vhost->options |= LWS_SERVER_OPTION_CREATE_VHOST_SSL_CTX; in lws_context_init_server_ssl()
71 vhost->tls.use_ssl = lws_check_opt(vhost in lws_context_init_server_ssl()
43 lws_context_init_server_ssl(const struct lws_context_creation_info *info, struct lws_vhost *vhost) lws_context_init_server_ssl() argument
[all...]
H A Dtls-client.c108 struct lws_vhost *vhost) in lws_context_init_client_ssl()
114 lws_fakewsi_def_plwsa(&vhost->context->pt[0]); in lws_context_init_client_ssl()
116 lws_fakewsi_prep_plwsa_ctx(vhost->context); in lws_context_init_client_ssl()
118 if (vhost->options & LWS_SERVER_OPTION_ADOPT_APPLY_LISTEN_ACCEPT_CONFIG) in lws_context_init_client_ssl()
121 if (vhost->tls.ssl_ctx) { in lws_context_init_client_ssl()
144 if (vhost->tls.ssl_client_ctx) in lws_context_init_client_ssl()
150 vhost->tls.ssl_client_ctx = info->provided_client_ssl_ctx; in lws_context_init_client_ssl()
152 vhost->tls.user_supplied_ssl_ctx = 1; in lws_context_init_client_ssl()
158 if (lws_tls_client_create_vhost_context(vhost, info, cipher_list, in lws_context_init_client_ssl()
171 lwsl_info("created client ssl context for %s\n", vhost in lws_context_init_client_ssl()
107 lws_context_init_client_ssl(const struct lws_context_creation_info *info, struct lws_vhost *vhost) lws_context_init_client_ssl() argument
[all...]
H A Dprivate-network.h95 lws_context_init_alpn(struct lws_vhost *vhost);
112 lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost);
134 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi,
139 lws_tls_generic_cert_checks(struct lws_vhost *vhost, const char *cert,
144 struct lws_vhost *vhost);
146 lws_tls_acme_sni_cert_destroy(struct lws_vhost *vhost);
153 lws_ssl_destroy(struct lws_vhost *vhost);
163 struct lws_vhost *vhost, struct lws *wsi);
202 struct lws_vhost *vhost);
H A Dtls.c156 lws_context_init_alpn(struct lws_vhost *vhost) in lws_context_init_alpn() argument
160 const char *alpn_comma = vhost->context->tls.alpn_default; in lws_context_init_alpn()
162 if (vhost->tls.alpn) in lws_context_init_alpn()
163 alpn_comma = vhost->tls.alpn; in lws_context_init_alpn()
166 vhost->name, alpn_comma); in lws_context_init_alpn()
168 vhost->tls.alpn_ctx.len = (uint8_t)lws_alpn_comma_to_openssl(alpn_comma, in lws_context_init_alpn()
169 vhost->tls.alpn_ctx.data, in lws_context_init_alpn()
170 sizeof(vhost->tls.alpn_ctx.data) - 1); in lws_context_init_alpn()
172 SSL_CTX_set_alpn_select_cb(vhost->tls.ssl_ctx, alpn_cb, in lws_context_init_alpn()
173 &vhost in lws_context_init_alpn()
[all...]
/third_party/libwebsockets/plugins/acme-client/
H A Dprotocol_lws_acme_client.c81 struct lws_vhost *vhost; member
108 struct lws_vhost *vhost; member
112 * the vhd is allocated for every vhost using the plugin.
136 struct lws_vhost *vhost = lws_get_vhost(wsi); in callback_chall_http01() local
137 struct acme_connection *ac = lws_vhost_user(vhost); in callback_chall_http01()
602 i->vhost = vh; in lws_acme_client_connect()
627 if (vhd->ac->vhost) in lws_acme_finished()
628 lws_vhost_destroy(vhd->ac->vhost); in lws_acme_finished()
674 lwsl_vhost_warn(vhd->vhost, "failed to create keypair"); in lws_acme_load_create_auth_keys()
681 lwsl_vhost_warn(vhd->vhost, "unabl in lws_acme_load_create_auth_keys()
[all...]
/third_party/libwebsockets/lib/tls/mbedtls/
H A Dmbedtls-ssl.c29 lws_ssl_destroy(struct lws_vhost *vhost) in lws_ssl_destroy() argument
31 if (!lws_check_opt(vhost->context->options, in lws_ssl_destroy()
35 if (vhost->tls.ssl_ctx) in lws_ssl_destroy()
36 SSL_CTX_free(vhost->tls.ssl_ctx); in lws_ssl_destroy()
37 if (!vhost->tls.user_supplied_ssl_ctx && vhost->tls.ssl_client_ctx) in lws_ssl_destroy()
38 SSL_CTX_free(vhost->tls.ssl_client_ctx); in lws_ssl_destroy()
40 if (vhost->tls.x509_client_CA) in lws_ssl_destroy()
41 X509_free(vhost->tls.x509_client_CA); in lws_ssl_destroy()
105 if (wsi->a.vhost) in lws_ssl_capable_read()
287 lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost) lws_ssl_SSL_CTX_destroy() argument
[all...]
H A Dmbedtls-server.c58 struct lws_vhost *vhost, *vh; in lws_mbedtls_sni_cb() local
63 * We can only get ssl accepted connections by using a vhost's ssl_ctx in lws_mbedtls_sni_cb()
80 vhost = lws_select_vhost(context, vh->listen_port, in lws_mbedtls_sni_cb()
82 if (!vhost) { in lws_mbedtls_sni_cb()
88 lwsl_info("SNI: Found: %s:%d at vhost '%s'\n", servername, in lws_mbedtls_sni_cb()
89 vh->listen_port, vhost->name); in lws_mbedtls_sni_cb()
91 if (!vhost->tls.ssl_ctx) { in lws_mbedtls_sni_cb()
92 lwsl_err("%s: vhost %s matches SNI but no valid cert\n", in lws_mbedtls_sni_cb()
98 /* select the ssl ctx from the selected vhost for this conn */ in lws_mbedtls_sni_cb()
99 SSL_set_SSL_CTX(ssl, vhost in lws_mbedtls_sni_cb()
105 lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi, const char *cert, const char *private_key, const char *mem_cert, size_t mem_cert_len, const char *mem_privkey, size_t mem_privkey_len) lws_tls_server_certs_load() argument
185 lws_tls_server_vhost_backend_init(const struct lws_context_creation_info *info, struct lws_vhost *vhost, struct lws *wsi) lws_tls_server_vhost_backend_init() argument
453 lws_tls_acme_sni_cert_create(struct lws_vhost *vhost, const char *san_a, const char *san_b) lws_tls_acme_sni_cert_create() argument
591 lws_tls_acme_sni_cert_destroy(struct lws_vhost *vhost) lws_tls_acme_sni_cert_destroy() argument
[all...]
H A Dmbedtls-session.c80 if (!wsi->a.vhost || in lws_tls_reuse_session()
81 wsi->a.vhost->options & LWS_SERVER_OPTION_DISABLE_TLS_SESSION_CACHE) in lws_tls_reuse_session()
85 lws_vhost_lock(wsi->a.vhost); /* -------------- vh { */ in lws_tls_reuse_session()
90 ts = __lws_tls_session_lookup_by_name(wsi->a.vhost, buf); in lws_tls_reuse_session()
106 lws_dll2_add_tail(&ts->list, &wsi->a.vhost->tls_sessions); in lws_tls_reuse_session()
109 lws_vhost_unlock(wsi->a.vhost); /* } vh -------------- */ in lws_tls_reuse_session()
175 vh = wsi->a.vhost; in lws_tls_session_new_mbedtls()
199 * We have reached the vhost's session cache limit, in lws_tls_session_new_mbedtls()
/third_party/libwebsockets/lib/roles/http/server/
H A Dserver.c58 struct lws_vhost *vhost; member
69 if (!lws_vhost_compare_listen(wsi->a.vhost, a->vhost)) in check_extant()
75 lwsl_notice(" using listen skt from vhost %s\n", wsi->a.vhost->name); in check_extant()
87 struct lws_context *cx = a->vhost->context; in _lws_vhost_init_server_af()
102 if (lws_vhost_foreach_listen_wsi(a->vhost->context, a, check_extant)) in _lws_vhost_init_server_af()
107 if (a->vhost->iface) { in _lws_vhost_init_server_af()
113 is = lws_socket_bind(a->vhost, NULL, LWS_SOCK_INVALID, in _lws_vhost_init_server_af()
114 a->vhost in _lws_vhost_init_server_af()
406 _lws_vhost_init_server(const struct lws_context_creation_info *info, struct lws_vhost *vhost) _lws_vhost_init_server() argument
506 struct lws_vhost *vhost = context->vhost_list; lws_select_vhost() local
2272 struct lws_vhost *vhost = lws_select_vhost( lws_handshake_server() local
[all...]
/third_party/libwebsockets/lib/roles/listen/
H A Dops-listen.c37 /* if our vhost is going down, ignore it */ in rops_handle_POLLIN_listen()
39 if (wsi->a.vhost->being_destroyed) in rops_handle_POLLIN_listen()
59 * another vhost may also have had POLLIN on his in rops_handle_POLLIN_listen()
62 if (wsi->a.vhost->tls.use_ssl && in rops_handle_POLLIN_listen()
103 lws_plat_set_socket_options(wsi->a.vhost, filt.accept_fd, 0); in rops_handle_POLLIN_listen()
128 if ((wsi->a.vhost->protocols[0].callback)(wsi, in rops_handle_POLLIN_listen()
137 if (!(wsi->a.vhost->options & in rops_handle_POLLIN_listen()
142 if (!wsi->a.vhost->tls.use_ssl) in rops_handle_POLLIN_listen()
147 cwsi = lws_adopt_descriptor_vhost(wsi->a.vhost, (lws_adoption_type)opts, fd, in rops_handle_POLLIN_listen()
148 wsi->a.vhost in rops_handle_POLLIN_listen()
[all...]
/third_party/libwebsockets/lib/plat/unix/
H A Dunix-sockets.c102 lws_plat_set_socket_options(struct lws_vhost *vhost, int fd, int unix_skt) in lws_plat_set_socket_options() argument
123 if (!unix_skt && vhost->ka_time) { in lws_plat_set_socket_options()
144 optval = 1000 * (vhost->ka_time + in lws_plat_set_socket_options()
145 (vhost->ka_interval * vhost->ka_probes)); in lws_plat_set_socket_options()
150 optval = vhost->ka_time; in lws_plat_set_socket_options()
155 optval = vhost->ka_interval; in lws_plat_set_socket_options()
160 optval = vhost->ka_probes; in lws_plat_set_socket_options()
168 if (!unix_skt && vhost->bind_iface && vhost in lws_plat_set_socket_options()
589 lws_plat_vhost_tls_client_ctx_init(struct lws_vhost *vhost) lws_plat_vhost_tls_client_ctx_init() argument
[all...]
/third_party/libwebsockets/lib/roles/ws/
H A Dclient-ws.c181 ext = wsi->a.vhost->ws.extensions; in lws_generate_client_ws_handshake()
184 n = wsi->a.vhost->protocols[0].callback(wsi, in lws_generate_client_ws_handshake()
349 wsi->a.protocol = &wsi->a.vhost->protocols[0]; in lws_client_ws_upgrade()
389 while (n < wsi->a.vhost->count_protocols) { in lws_client_ws_upgrade()
391 strcmp(p, wsi->a.vhost->protocols[n].name) == 0) { in lws_client_ws_upgrade()
392 wsi->a.protocol = &wsi->a.vhost->protocols[n]; in lws_client_ws_upgrade()
398 if (n == wsi->a.vhost->count_protocols) { /* no match */ in lws_client_ws_upgrade()
409 while (wsi->a.vhost->protocols[n].callback) { in lws_client_ws_upgrade()
411 wsi->a.vhost->protocols[n].name) == 0) { in lws_client_ws_upgrade()
412 wsi->a.protocol = &wsi->a.vhost in lws_client_ws_upgrade()
[all...]
H A Dserver-ws.c115 ext = wsi->a.vhost->ws.extensions; in lws_extension_server_handshake()
266 * For vhost ws basic auth, it is "basic-auth": "path" as usual but in lws_process_ws_upgrade2()
267 * applied to the protocol's entry in the vhost's "ws-protocols": in lws_process_ws_upgrade2()
271 pvos = lws_vhost_protocol_options(wsi->a.vhost, wsi->a.protocol->name); in lws_process_ws_upgrade2()
314 if (wsi->a.vhost->ss_handle) { in lws_process_ws_upgrade2()
316 __func__, lws_ss_tag(wsi->a.vhost->ss_handle)); in lws_process_ws_upgrade2()
325 (void)lws_ss_event_helper(wsi->a.vhost->ss_handle, in lws_process_ws_upgrade2()
539 int n = wsi->a.vhost->default_protocol_index; in lws_process_ws_upgrade()
542 * protocol list header... allow it and match to the vhost's in lws_process_ws_upgrade()
545 * Setting the vhost defaul in lws_process_ws_upgrade()
[all...]
/third_party/libwebsockets/lib/roles/raw-file/
H A Dops-raw-file.c70 if (wsi->a.vhost->default_protocol_index >= in rops_adoption_bind_raw_file()
71 wsi->a.vhost->count_protocols) in rops_adoption_bind_raw_file()
74 wsi->a.protocol = &wsi->a.vhost->protocols[ in rops_adoption_bind_raw_file()
75 wsi->a.vhost->default_protocol_index]; in rops_adoption_bind_raw_file()
/third_party/libwebsockets/lib/plat/freertos/
H A Dfreertos-sockets.c87 lws_plat_set_socket_options(struct lws_vhost *vhost, int fd, int unix_skt) in lws_plat_set_socket_options() argument
99 if (vhost->ka_time) { in lws_plat_set_socket_options()
117 optval = vhost->ka_time; in lws_plat_set_socket_options()
122 optval = vhost->ka_interval; in lws_plat_set_socket_options()
127 optval = vhost->ka_probes; in lws_plat_set_socket_options()
328 lws_plat_vhost_tls_client_ctx_init(struct lws_vhost *vhost) in lws_plat_vhost_tls_client_ctx_init() argument

Completed in 13 milliseconds

12345