1d4afb5ceSopenharmony_ci/* 2d4afb5ceSopenharmony_ci * lws-minimal-secure-streams-metadata 3d4afb5ceSopenharmony_ci * 4d4afb5ceSopenharmony_ci * Written in 2010-2020 by Andy Green <andy@warmcat.com> 5d4afb5ceSopenharmony_ci * 6d4afb5ceSopenharmony_ci * This file is made available under the Creative Commons CC0 1.0 7d4afb5ceSopenharmony_ci * Universal Public Domain Dedication. 8d4afb5ceSopenharmony_ci * 9d4afb5ceSopenharmony_ci * 10d4afb5ceSopenharmony_ci * This demonstrates a minimal http client using secure streams api. 11d4afb5ceSopenharmony_ci * 12d4afb5ceSopenharmony_ci * It visits https://warmcat.com/ and receives the html page there. 13d4afb5ceSopenharmony_ci * 14d4afb5ceSopenharmony_ci * This example is built two different ways from the same source... one includes 15d4afb5ceSopenharmony_ci * the policy everything needed to fulfil the stream directly. The other -client 16d4afb5ceSopenharmony_ci * variant has no policy itself and some other minor init changes, and connects 17d4afb5ceSopenharmony_ci * to the -proxy example to actually get the connection done. 18d4afb5ceSopenharmony_ci * 19d4afb5ceSopenharmony_ci * In the -client build case, the example does not even init the tls libraries 20d4afb5ceSopenharmony_ci * since the proxy part will take care of all that. 21d4afb5ceSopenharmony_ci */ 22d4afb5ceSopenharmony_ci 23d4afb5ceSopenharmony_ci#include <libwebsockets.h> 24d4afb5ceSopenharmony_ci#include <string.h> 25d4afb5ceSopenharmony_ci#include <signal.h> 26d4afb5ceSopenharmony_ci 27d4afb5ceSopenharmony_ci/* 28d4afb5ceSopenharmony_ci * uncomment to force network traffic through 127.0.0.1:1080 29d4afb5ceSopenharmony_ci * 30d4afb5ceSopenharmony_ci * On your local machine, you can run a SOCKS5 proxy like this 31d4afb5ceSopenharmony_ci * 32d4afb5ceSopenharmony_ci * $ ssh -N -D 0.0.0.0:1080 localhost -v 33d4afb5ceSopenharmony_ci * 34d4afb5ceSopenharmony_ci * If enabled, this also fetches a remote policy that also 35d4afb5ceSopenharmony_ci * specifies that all traffic should go through the remote 36d4afb5ceSopenharmony_ci * proxy. 37d4afb5ceSopenharmony_ci */ 38d4afb5ceSopenharmony_ci// #define VIA_LOCALHOST_SOCKS 39d4afb5ceSopenharmony_ci 40d4afb5ceSopenharmony_cistatic int interrupted, bad = 1, force_cpd_fail_portal, 41d4afb5ceSopenharmony_ci force_cpd_fail_no_internet; 42d4afb5ceSopenharmony_cistatic lws_state_notify_link_t nl; 43d4afb5ceSopenharmony_cistatic const char *server_name_or_url = "warmcat.com"; 44d4afb5ceSopenharmony_ci 45d4afb5ceSopenharmony_ci/* 46d4afb5ceSopenharmony_ci * If the -proxy app is fulfilling our connection, then we don't need to have 47d4afb5ceSopenharmony_ci * the policy in the client. 48d4afb5ceSopenharmony_ci * 49d4afb5ceSopenharmony_ci * When we build with LWS_SS_USE_SSPC, the apis hook up to a proxy process over 50d4afb5ceSopenharmony_ci * a Unix Domain Socket. To test that, you need to separately run the 51d4afb5ceSopenharmony_ci * ./lws-minimal-secure-streams-proxy test app on the same machine. 52d4afb5ceSopenharmony_ci */ 53d4afb5ceSopenharmony_ci 54d4afb5ceSopenharmony_ci#if !defined(LWS_SS_USE_SSPC) 55d4afb5ceSopenharmony_cistatic const char * const default_ss_policy = 56d4afb5ceSopenharmony_ci "{" 57d4afb5ceSopenharmony_ci "\"release\":" "\"01234567\"," 58d4afb5ceSopenharmony_ci "\"product\":" "\"myproduct\"," 59d4afb5ceSopenharmony_ci "\"schema-version\":" "1," 60d4afb5ceSopenharmony_ci#if defined(VIA_LOCALHOST_SOCKS) 61d4afb5ceSopenharmony_ci "\"via-socks5\":" "\"127.0.0.1:1080\"," 62d4afb5ceSopenharmony_ci#endif 63d4afb5ceSopenharmony_ci 64d4afb5ceSopenharmony_ci "\"retry\": [" /* named backoff / retry strategies */ 65d4afb5ceSopenharmony_ci "{\"default\": {" 66d4afb5ceSopenharmony_ci "\"backoff\": [" "1000," 67d4afb5ceSopenharmony_ci "2000," 68d4afb5ceSopenharmony_ci "3000," 69d4afb5ceSopenharmony_ci "5000," 70d4afb5ceSopenharmony_ci "10000" 71d4afb5ceSopenharmony_ci "]," 72d4afb5ceSopenharmony_ci "\"conceal\":" "5," 73d4afb5ceSopenharmony_ci "\"jitterpc\":" "20," 74d4afb5ceSopenharmony_ci "\"svalidping\":" "30," 75d4afb5ceSopenharmony_ci "\"svalidhup\":" "35" 76d4afb5ceSopenharmony_ci "}}" 77d4afb5ceSopenharmony_ci "]," 78d4afb5ceSopenharmony_ci "\"certs\": [" /* named individual certificates in BASE64 DER */ 79d4afb5ceSopenharmony_ci /* 80d4afb5ceSopenharmony_ci * Let's Encrypt certs for warmcat.com / libwebsockets.org 81d4afb5ceSopenharmony_ci * 82d4afb5ceSopenharmony_ci * We fetch the real policy from there using SS and switch to 83d4afb5ceSopenharmony_ci * using that. 84d4afb5ceSopenharmony_ci */ 85d4afb5ceSopenharmony_ci "{\"isrg_root_x1\": \"" 86d4afb5ceSopenharmony_ci"MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw" 87d4afb5ceSopenharmony_ci"TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh" 88d4afb5ceSopenharmony_ci"cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4" 89d4afb5ceSopenharmony_ci"WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu" 90d4afb5ceSopenharmony_ci"ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY" 91d4afb5ceSopenharmony_ci"MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc" 92d4afb5ceSopenharmony_ci"h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+" 93d4afb5ceSopenharmony_ci"0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U" 94d4afb5ceSopenharmony_ci"A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW" 95d4afb5ceSopenharmony_ci"T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH" 96d4afb5ceSopenharmony_ci"B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC" 97d4afb5ceSopenharmony_ci"B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv" 98d4afb5ceSopenharmony_ci"KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn" 99d4afb5ceSopenharmony_ci"OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn" 100d4afb5ceSopenharmony_ci"jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw" 101d4afb5ceSopenharmony_ci"qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI" 102d4afb5ceSopenharmony_ci"rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV" 103d4afb5ceSopenharmony_ci"HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq" 104d4afb5ceSopenharmony_ci"hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL" 105d4afb5ceSopenharmony_ci"ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ" 106d4afb5ceSopenharmony_ci"3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK" 107d4afb5ceSopenharmony_ci"NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5" 108d4afb5ceSopenharmony_ci"ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur" 109d4afb5ceSopenharmony_ci"TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC" 110d4afb5ceSopenharmony_ci"jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc" 111d4afb5ceSopenharmony_ci"oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq" 112d4afb5ceSopenharmony_ci"4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA" 113d4afb5ceSopenharmony_ci"mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d" 114d4afb5ceSopenharmony_ci"emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc=" 115d4afb5ceSopenharmony_ci "\"}" 116d4afb5ceSopenharmony_ci "]," 117d4afb5ceSopenharmony_ci "\"trust_stores\": [" /* named cert chains */ 118d4afb5ceSopenharmony_ci "{" 119d4afb5ceSopenharmony_ci "\"name\": \"le_via_isrg\"," 120d4afb5ceSopenharmony_ci "\"stack\": [" 121d4afb5ceSopenharmony_ci "\"isrg_root_x1\"" 122d4afb5ceSopenharmony_ci "]" 123d4afb5ceSopenharmony_ci "}" 124d4afb5ceSopenharmony_ci "]," 125d4afb5ceSopenharmony_ci "\"s\": [" 126d4afb5ceSopenharmony_ci "{\"mintest\": {" 127d4afb5ceSopenharmony_ci "\"endpoint\":" "\"${servername}\"," 128d4afb5ceSopenharmony_ci "\"port\":" "443," 129d4afb5ceSopenharmony_ci "\"protocol\":" "\"h1\"," 130d4afb5ceSopenharmony_ci "\"http_method\":" "\"GET\"," 131d4afb5ceSopenharmony_ci "\"http_url\":" "\"\"," 132d4afb5ceSopenharmony_ci "\"tls\":" "true," 133d4afb5ceSopenharmony_ci "\"opportunistic\":" "true," 134d4afb5ceSopenharmony_ci "\"retry\":" "\"default\"," 135d4afb5ceSopenharmony_ci "\"tls_trust_store\":" "\"le_via_isrg\"," 136d4afb5ceSopenharmony_ci "\"metadata\": [" 137d4afb5ceSopenharmony_ci "{\"servername\": \"\"}" 138d4afb5ceSopenharmony_ci "]" 139d4afb5ceSopenharmony_ci "}}" 140d4afb5ceSopenharmony_ci "]}" 141d4afb5ceSopenharmony_ci; 142d4afb5ceSopenharmony_ci 143d4afb5ceSopenharmony_ci#endif 144d4afb5ceSopenharmony_ci 145d4afb5ceSopenharmony_citypedef struct myss { 146d4afb5ceSopenharmony_ci struct lws_ss_handle *ss; 147d4afb5ceSopenharmony_ci void *opaque_data; 148d4afb5ceSopenharmony_ci /* ... application specific state ... */ 149d4afb5ceSopenharmony_ci lws_sorted_usec_list_t sul; 150d4afb5ceSopenharmony_ci} myss_t; 151d4afb5ceSopenharmony_ci 152d4afb5ceSopenharmony_ci/* secure streams payload interface */ 153d4afb5ceSopenharmony_ci 154d4afb5ceSopenharmony_cistatic lws_ss_state_return_t 155d4afb5ceSopenharmony_cimyss_rx(void *userobj, const uint8_t *buf, size_t len, int flags) 156d4afb5ceSopenharmony_ci{ 157d4afb5ceSopenharmony_ci// myss_t *m = (myss_t *)userobj; 158d4afb5ceSopenharmony_ci 159d4afb5ceSopenharmony_ci lwsl_user("%s: len %d, flags: %d\n", __func__, (int)len, flags); 160d4afb5ceSopenharmony_ci lwsl_hexdump_info(buf, len); 161d4afb5ceSopenharmony_ci 162d4afb5ceSopenharmony_ci /* 163d4afb5ceSopenharmony_ci * If we received the whole message, for our example it means 164d4afb5ceSopenharmony_ci * we are done. 165d4afb5ceSopenharmony_ci */ 166d4afb5ceSopenharmony_ci if (flags & LWSSS_FLAG_EOM) { 167d4afb5ceSopenharmony_ci bad = 0; 168d4afb5ceSopenharmony_ci interrupted = 1; 169d4afb5ceSopenharmony_ci } 170d4afb5ceSopenharmony_ci 171d4afb5ceSopenharmony_ci return 0; 172d4afb5ceSopenharmony_ci} 173d4afb5ceSopenharmony_ci 174d4afb5ceSopenharmony_cistatic lws_ss_state_return_t 175d4afb5ceSopenharmony_cimyss_tx(void *userobj, lws_ss_tx_ordinal_t ord, uint8_t *buf, size_t *len, 176d4afb5ceSopenharmony_ci int *flags) 177d4afb5ceSopenharmony_ci{ 178d4afb5ceSopenharmony_ci //myss_t *m = (myss_t *)userobj; 179d4afb5ceSopenharmony_ci 180d4afb5ceSopenharmony_ci return 0; 181d4afb5ceSopenharmony_ci} 182d4afb5ceSopenharmony_ci 183d4afb5ceSopenharmony_cistatic lws_ss_state_return_t 184d4afb5ceSopenharmony_cimyss_state(void *userobj, void *sh, lws_ss_constate_t state, 185d4afb5ceSopenharmony_ci lws_ss_tx_ordinal_t ack) 186d4afb5ceSopenharmony_ci{ 187d4afb5ceSopenharmony_ci myss_t *m = (myss_t *)userobj; 188d4afb5ceSopenharmony_ci 189d4afb5ceSopenharmony_ci lwsl_user("%s: %s, ord 0x%x\n", __func__, lws_ss_state_name((int)state), 190d4afb5ceSopenharmony_ci (unsigned int)ack); 191d4afb5ceSopenharmony_ci 192d4afb5ceSopenharmony_ci switch (state) { 193d4afb5ceSopenharmony_ci case LWSSSCS_CREATING: 194d4afb5ceSopenharmony_ci lwsl_notice("%s: CREATING: setting servername metadata to %s\n", 195d4afb5ceSopenharmony_ci __func__, server_name_or_url); 196d4afb5ceSopenharmony_ci if (lws_ss_set_metadata(m->ss, "servername", server_name_or_url, 197d4afb5ceSopenharmony_ci strlen(server_name_or_url))) 198d4afb5ceSopenharmony_ci return LWSSSSRET_DISCONNECT_ME; 199d4afb5ceSopenharmony_ci return lws_ss_client_connect(m->ss); 200d4afb5ceSopenharmony_ci 201d4afb5ceSopenharmony_ci case LWSSSCS_ALL_RETRIES_FAILED: 202d4afb5ceSopenharmony_ci /* if we're out of retries, we want to close the app and FAIL */ 203d4afb5ceSopenharmony_ci interrupted = 1; 204d4afb5ceSopenharmony_ci break; 205d4afb5ceSopenharmony_ci case LWSSSCS_QOS_ACK_REMOTE: 206d4afb5ceSopenharmony_ci lwsl_notice("%s: LWSSSCS_QOS_ACK_REMOTE\n", __func__); 207d4afb5ceSopenharmony_ci break; 208d4afb5ceSopenharmony_ci default: 209d4afb5ceSopenharmony_ci break; 210d4afb5ceSopenharmony_ci } 211d4afb5ceSopenharmony_ci 212d4afb5ceSopenharmony_ci return 0; 213d4afb5ceSopenharmony_ci} 214d4afb5ceSopenharmony_ci 215d4afb5ceSopenharmony_cistatic int 216d4afb5ceSopenharmony_ciapp_system_state_nf(lws_state_manager_t *mgr, lws_state_notify_link_t *link, 217d4afb5ceSopenharmony_ci int current, int target) 218d4afb5ceSopenharmony_ci{ 219d4afb5ceSopenharmony_ci struct lws_context *context = lws_system_context_from_system_mgr(mgr); 220d4afb5ceSopenharmony_ci 221d4afb5ceSopenharmony_ci /* 222d4afb5ceSopenharmony_ci * For the things we care about, let's notice if we are trying to get 223d4afb5ceSopenharmony_ci * past them when we haven't solved them yet, and make the system 224d4afb5ceSopenharmony_ci * state wait while we trigger the dependent action. 225d4afb5ceSopenharmony_ci */ 226d4afb5ceSopenharmony_ci switch (target) { 227d4afb5ceSopenharmony_ci 228d4afb5ceSopenharmony_ci case LWS_SYSTATE_OPERATIONAL: 229d4afb5ceSopenharmony_ci if (current == LWS_SYSTATE_OPERATIONAL) { 230d4afb5ceSopenharmony_ci lws_ss_info_t ssi; 231d4afb5ceSopenharmony_ci 232d4afb5ceSopenharmony_ci /* We're making an outgoing secure stream ourselves */ 233d4afb5ceSopenharmony_ci 234d4afb5ceSopenharmony_ci memset(&ssi, 0, sizeof(ssi)); 235d4afb5ceSopenharmony_ci ssi.handle_offset = offsetof(myss_t, ss); 236d4afb5ceSopenharmony_ci ssi.opaque_user_data_offset = offsetof(myss_t, 237d4afb5ceSopenharmony_ci opaque_data); 238d4afb5ceSopenharmony_ci ssi.rx = myss_rx; 239d4afb5ceSopenharmony_ci ssi.tx = myss_tx; 240d4afb5ceSopenharmony_ci ssi.state = myss_state; 241d4afb5ceSopenharmony_ci ssi.user_alloc = sizeof(myss_t); 242d4afb5ceSopenharmony_ci ssi.streamtype = "mintest"; 243d4afb5ceSopenharmony_ci 244d4afb5ceSopenharmony_ci if (lws_ss_create(context, 0, &ssi, NULL, NULL, 245d4afb5ceSopenharmony_ci NULL, NULL)) { 246d4afb5ceSopenharmony_ci lwsl_err("%s: failed to create secure stream\n", 247d4afb5ceSopenharmony_ci __func__); 248d4afb5ceSopenharmony_ci return -1; 249d4afb5ceSopenharmony_ci } 250d4afb5ceSopenharmony_ci } 251d4afb5ceSopenharmony_ci break; 252d4afb5ceSopenharmony_ci } 253d4afb5ceSopenharmony_ci 254d4afb5ceSopenharmony_ci return 0; 255d4afb5ceSopenharmony_ci} 256d4afb5ceSopenharmony_ci 257d4afb5ceSopenharmony_cistatic lws_state_notify_link_t * const app_notifier_list[] = { 258d4afb5ceSopenharmony_ci &nl, NULL 259d4afb5ceSopenharmony_ci}; 260d4afb5ceSopenharmony_ci 261d4afb5ceSopenharmony_cistatic void 262d4afb5ceSopenharmony_cisigint_handler(int sig) 263d4afb5ceSopenharmony_ci{ 264d4afb5ceSopenharmony_ci interrupted = 1; 265d4afb5ceSopenharmony_ci} 266d4afb5ceSopenharmony_ci 267d4afb5ceSopenharmony_ciint main(int argc, const char **argv) 268d4afb5ceSopenharmony_ci{ 269d4afb5ceSopenharmony_ci struct lws_context_creation_info info; 270d4afb5ceSopenharmony_ci struct lws_context *context; 271d4afb5ceSopenharmony_ci const char *p; 272d4afb5ceSopenharmony_ci int n = 0; 273d4afb5ceSopenharmony_ci 274d4afb5ceSopenharmony_ci signal(SIGINT, sigint_handler); 275d4afb5ceSopenharmony_ci 276d4afb5ceSopenharmony_ci memset(&info, 0, sizeof info); 277d4afb5ceSopenharmony_ci lws_cmdline_option_handle_builtin(argc, argv, &info); 278d4afb5ceSopenharmony_ci 279d4afb5ceSopenharmony_ci lwsl_user("LWS secure streams test client [-d<verb>]\n"); 280d4afb5ceSopenharmony_ci 281d4afb5ceSopenharmony_ci /* these options are mutually exclusive if given */ 282d4afb5ceSopenharmony_ci 283d4afb5ceSopenharmony_ci if (lws_cmdline_option(argc, argv, "--force-portal")) 284d4afb5ceSopenharmony_ci force_cpd_fail_portal = 1; 285d4afb5ceSopenharmony_ci 286d4afb5ceSopenharmony_ci if (lws_cmdline_option(argc, argv, "--force-no-internet")) 287d4afb5ceSopenharmony_ci force_cpd_fail_no_internet = 1; 288d4afb5ceSopenharmony_ci 289d4afb5ceSopenharmony_ci info.fd_limit_per_thread = 1 + 6 + 1; 290d4afb5ceSopenharmony_ci info.port = CONTEXT_PORT_NO_LISTEN; 291d4afb5ceSopenharmony_ci 292d4afb5ceSopenharmony_ci#if defined(LWS_SS_USE_SSPC) 293d4afb5ceSopenharmony_ci info.protocols = lws_sspc_protocols; 294d4afb5ceSopenharmony_ci 295d4afb5ceSopenharmony_ci /* connect to ssproxy via UDS by default, else via 296d4afb5ceSopenharmony_ci * tcp connection to this port */ 297d4afb5ceSopenharmony_ci if ((p = lws_cmdline_option(argc, argv, "-p"))) 298d4afb5ceSopenharmony_ci info.ss_proxy_port = (uint16_t)atoi(p); 299d4afb5ceSopenharmony_ci 300d4afb5ceSopenharmony_ci /* UDS "proxy.ss.lws" in abstract namespace, else this socket 301d4afb5ceSopenharmony_ci * path; when -p given this can specify the network interface 302d4afb5ceSopenharmony_ci * to bind to */ 303d4afb5ceSopenharmony_ci if ((p = lws_cmdline_option(argc, argv, "-i"))) 304d4afb5ceSopenharmony_ci info.ss_proxy_bind = p; 305d4afb5ceSopenharmony_ci 306d4afb5ceSopenharmony_ci /* if -p given, -a specifies the proxy address to connect to */ 307d4afb5ceSopenharmony_ci if ((p = lws_cmdline_option(argc, argv, "-a"))) 308d4afb5ceSopenharmony_ci info.ss_proxy_address = p; 309d4afb5ceSopenharmony_ci#else 310d4afb5ceSopenharmony_ci info.pss_policies_json = default_ss_policy; 311d4afb5ceSopenharmony_ci info.options = LWS_SERVER_OPTION_EXPLICIT_VHOSTS | 312d4afb5ceSopenharmony_ci LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT; 313d4afb5ceSopenharmony_ci#endif 314d4afb5ceSopenharmony_ci 315d4afb5ceSopenharmony_ci if ((p = lws_cmdline_option(argc, argv, "-u"))) 316d4afb5ceSopenharmony_ci server_name_or_url = p; 317d4afb5ceSopenharmony_ci 318d4afb5ceSopenharmony_ci /* integrate us with lws system state management when context created */ 319d4afb5ceSopenharmony_ci 320d4afb5ceSopenharmony_ci nl.name = "app"; 321d4afb5ceSopenharmony_ci nl.notify_cb = app_system_state_nf; 322d4afb5ceSopenharmony_ci info.register_notifier_list = app_notifier_list; 323d4afb5ceSopenharmony_ci 324d4afb5ceSopenharmony_ci /* create the context */ 325d4afb5ceSopenharmony_ci 326d4afb5ceSopenharmony_ci context = lws_create_context(&info); 327d4afb5ceSopenharmony_ci if (!context) { 328d4afb5ceSopenharmony_ci lwsl_err("lws init failed\n"); 329d4afb5ceSopenharmony_ci return 1; 330d4afb5ceSopenharmony_ci } 331d4afb5ceSopenharmony_ci 332d4afb5ceSopenharmony_ci 333d4afb5ceSopenharmony_ci /* the event loop */ 334d4afb5ceSopenharmony_ci 335d4afb5ceSopenharmony_ci while (n >= 0 && !interrupted) 336d4afb5ceSopenharmony_ci n = lws_service(context, 0); 337d4afb5ceSopenharmony_ci 338d4afb5ceSopenharmony_ci lws_context_destroy(context); 339d4afb5ceSopenharmony_ci 340d4afb5ceSopenharmony_ci lwsl_user("Completed: %s\n", bad ? "failed" : "OK"); 341d4afb5ceSopenharmony_ci 342d4afb5ceSopenharmony_ci return bad; 343d4afb5ceSopenharmony_ci} 344