Skip to content

Releases: tatsuhiro-t/wslay

wslay v1.1.1

20 Jun 07:02
release-1.1.1
Compare
Choose a tag to compare

slay 1.1.1

Release Note

This release fixes the bug that eof is not evaluated after the
invocation of read_callback.

Changes

  • Check for eof when read_callback returns 0 (GH-47)

    Patch from Robert Bragg

wslay v1.1.0

08 Jun 14:18
release-1.1.0
Compare
Choose a tag to compare

Release Note

This release adds CMake build support and the ability to set and
verify reserved bits. Build issue with nettle >= 3.4 was fixed.

Changes

  • Fix compilation of examples

    Since 3.4 nettle defines base64_encode_raw like this:

    void base64_encode_raw(char *dst, size_t length, const uint8_t *src);
    

    So examples have to be adjusted. More read at
    https://git.lysator.liu.se/nettle/nettle/blob/nettle_3.4_release_20171119/NEWS#L49-53

    Patch from Sergey Avseyev

  • check for 0 length before memcpy:

    .../wslay/lib/wslay_event.c:304:7: runtime error: null pointer passed as argument 2, which is declared to never be null

    Patch from Anders Bakken

  • Skip UTF-8 validation for PMCE fragments

    If the message was marked with rsv1 on the initial frame then we
    should skip utf-8 validation on subsequent continuation frames as
    well.

    Added test for this case.

    Found by autobahn wstest tool.

    Patch from Isaac Boukris

  • Allow RSV1 bit in event-based API for PMCE - RFC 7692

    Add a new function wslay_event_set_allowed_rsv_bits which only accpet
    RSV1 for now (or 0 to disable).

    Skip UTF-8 validation on frames with RSV1 set as it is too early for that.

    Add extended versions of wslay_event_queue_msg functions which also
    take the reserved bits to set for this message.

    Patch from Isaac Boukris

  • fixed missing malloc guard

    Patch from Jakub Piskorz

  • Fix argc check.

    Patch from Anders Bakken

  • CMake support

    Patch from wonder-mice