8000 Tags · kingofsdtw/libwebsockets · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Tags: kingofsdtw/libwebsockets

Tags

v4.1.0-rc1

Toggle v4.1.0-rc1's commit message
changelog: prepare for v4.1

v4.0.20

Toggle v4.0.20's commit message
mbedtls: only free crt_parse when something came back

Mbedtls mbedtls_x509_crt_parse() returns 0 for success which is good.
But it has a complicated idea about what to return on fail... if it
couldn't make even one cert from the data, then it returns a negative
return indicating the parsing problem and there is nothing to free.

If it managed to parse at least one cert, instead it retuns a positive
number indicating the number of certs it didn't parse successfully,
and there is something to free.

Adapt the code to understand this quirk.

v4.0.19

Toggle v4.0.19's commit message
lejp: enable negative integers

warmcat#1957

v4.0.18

Toggle v4.0.18's commit message
context_destroy: backport event-lib fixes from master

v4.0.17

Toggle v4.0.17's commit message
libevent: enforce no event state duplication

warmcat#1956

v4.0.16

Toggle v4.0.16's commit message
multipart: quote boundary

warmcat#1948

v4.0.15

Toggle v4.0.15's commit message
clean: additional-lws_intptr_t

v4.0.13

Toggle v4.0.13's commit message
ss: add api test with ctest integration

Tests via httpbin.org

v4.0.12

Toggle v4.0.12's commit message
PEER_LIMITS: make sure to close socketfd on deny

v4.0.10

Toggle v4.0.10's commit message
unix domain: fix path name length

Unlike any other sockaddr variant it turns out when sockaddr_un reports its
sizeof() to connect() or listen(), it is trimmed to the used length of the
sun_path[] member not including any trailing 0x00.

Until now we worked fine, but our actual UDS paths have a large number of
trailing 0x00 (shown as @ in most tools).  Clients and servers can still
interoperate if they both have this broken name.

This patch fixes it to trim the sockaddr_un to the path length so the name
is as you would expect.
0