test-client.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664
  1. /*
  2. * libwebsockets-test-client - libwebsockets test implementation
  3. *
  4. * Copyright (C) 2011-2016 Andy Green <andy@warmcat.com>
  5. *
  6. * This file is made available under the Creative Commons CC0 1.0
  7. * Universal Public Domain Dedication.
  8. *
  9. * The person who associated a work with this deed has dedicated
  10. * the work to the public domain by waiving all of his or her rights
  11. * to the work worldwide under copyright law, including all related
  12. * and neighboring rights, to the extent allowed by law. You can copy,
  13. * modify, distribute and perform the work, even for commercial purposes,
  14. * all without asking permission.
  15. *
  16. * The test apps are intended to be adapted for use in your code, which
  17. * may be proprietary. So unlike the library itself, they are licensed
  18. * Public Domain.
  19. */
  20. #include "lws_config.h"
  21. #include <stdio.h>
  22. #include <stdlib.h>
  23. #include <getopt.h>
  24. #include <string.h>
  25. #include <signal.h>
  26. #ifdef _WIN32
  27. #define random rand
  28. #include "gettimeofday.h"
  29. #else
  30. #include <syslog.h>
  31. #include <sys/time.h>
  32. #include <unistd.h>
  33. #endif
  34. #include "../lib/libwebsockets.h"
  35. static int deny_deflate, longlived, mirror_lifetime, test_post;
  36. static struct lws *wsi_dumb, *wsi_mirror;
  37. static struct lws *wsi_multi[3];
  38. static volatile int force_exit;
  39. static unsigned int opts, rl_multi[3];
  40. static int flag_no_mirror_traffic;
  41. #if defined(LWS_USE_POLARSSL)
  42. #else
  43. #if defined(LWS_USE_MBEDTLS)
  44. #else
  45. #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
  46. char crl_path[1024] = "";
  47. #endif
  48. #endif
  49. #endif
  50. /*
  51. * This demo shows how to connect multiple websockets simultaneously to a
  52. * websocket server (there is no restriction on their having to be the same
  53. * server just it simplifies the demo).
  54. *
  55. * dumb-increment-protocol: we connect to the server and print the number
  56. * we are given
  57. *
  58. * lws-mirror-protocol: draws random circles, which are mirrored on to every
  59. * client (see them being drawn in every browser
  60. * session also using the test server)
  61. */
  62. enum demo_protocols {
  63. PROTOCOL_DUMB_INCREMENT,
  64. PROTOCOL_LWS_MIRROR,
  65. /* always last */
  66. DEMO_PROTOCOL_COUNT
  67. };
  68. /*
  69. * dumb_increment protocol
  70. *
  71. * since this also happens to be protocols[0], some callbacks that are not
  72. * bound to a specific protocol also turn up here.
  73. */
  74. static int
  75. callback_dumb_increment(struct lws *wsi, enum lws_callback_reasons reason,
  76. void *user, void *in, size_t len)
  77. {
  78. const char *which = "http";
  79. char which_wsi[10], buf[50 + LWS_PRE];
  80. int n;
  81. switch (reason) {
  82. case LWS_CALLBACK_CLIENT_ESTABLISHED:
  83. lwsl_info("dumb: LWS_CALLBACK_CLIENT_ESTABLISHED\n");
  84. break;
  85. case LWS_CALLBACK_CLOSED:
  86. lwsl_notice("dumb: LWS_CALLBACK_CLOSED\n");
  87. wsi_dumb = NULL;
  88. break;
  89. case LWS_CALLBACK_CLIENT_RECEIVE:
  90. ((char *)in)[len] = '\0';
  91. lwsl_info("rx %d '%s'\n", (int)len, (char *)in);
  92. break;
  93. /* because we are protocols[0] ... */
  94. case LWS_CALLBACK_CLIENT_CONNECTION_ERROR:
  95. if (wsi == wsi_dumb) {
  96. which = "dumb";
  97. wsi_dumb = NULL;
  98. }
  99. if (wsi == wsi_mirror) {
  100. which = "mirror";
  101. wsi_mirror = NULL;
  102. }
  103. for (n = 0; n < ARRAY_SIZE(wsi_multi); n++)
  104. if (wsi == wsi_multi[n]) {
  105. sprintf(which_wsi, "multi %d", n);
  106. which = which_wsi;
  107. wsi_multi[n] = NULL;
  108. }
  109. lwsl_err("CLIENT_CONNECTION_ERROR: %s: %s %p\n", which, in);
  110. break;
  111. case LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED:
  112. if ((strcmp(in, "deflate-stream") == 0) && deny_deflate) {
  113. lwsl_notice("denied deflate-stream extension\n");
  114. return 1;
  115. }
  116. if ((strcmp(in, "x-webkit-deflate-frame") == 0))
  117. return 1;
  118. if ((strcmp(in, "deflate-frame") == 0))
  119. return 1;
  120. break;
  121. case LWS_CALLBACK_RECEIVE_CLIENT_HTTP:
  122. {
  123. char buffer[1024 + LWS_PRE];
  124. char *px = buffer + LWS_PRE;
  125. int lenx = sizeof(buffer) - LWS_PRE;
  126. lwsl_notice("LWS_CALLBACK_RECEIVE_CLIENT_HTTP\n");
  127. /*
  128. * Often you need to flow control this by something
  129. * else being writable. In that case call the api
  130. * to get a callback when writable here, and do the
  131. * pending client read in the writeable callback of
  132. * the output.
  133. */
  134. if (lws_http_client_read(wsi, &px, &lenx) < 0)
  135. return -1;
  136. while (lenx--)
  137. putchar(*px++);
  138. }
  139. break;
  140. case LWS_CALLBACK_CLIENT_WRITEABLE:
  141. lwsl_info("Client wsi %p writable\n", wsi);
  142. break;
  143. case LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER:
  144. if (test_post) {
  145. unsigned char **p = (unsigned char **)in, *end = (*p) + len;
  146. if (lws_add_http_header_by_token(wsi,
  147. WSI_TOKEN_HTTP_CONTENT_LENGTH,
  148. (unsigned char *)"29", 2, p, end))
  149. return -1;
  150. if (lws_add_http_header_by_token(wsi,
  151. WSI_TOKEN_HTTP_CONTENT_TYPE,
  152. (unsigned char *)"application/x-www-form-urlencoded", 33, p, end))
  153. return -1;
  154. /* inform lws we have http body to send */
  155. lws_client_http_body_pending(wsi, 1);
  156. lws_callback_on_writable(wsi);
  157. }
  158. break;
  159. case LWS_CALLBACK_CLIENT_HTTP_WRITEABLE:
  160. strcpy(buf + LWS_PRE, "text=hello&send=Send+the+form");
  161. n = lws_write(wsi, (unsigned char *)&buf[LWS_PRE], strlen(&buf[LWS_PRE]), LWS_WRITE_HTTP);
  162. if (n < 0)
  163. return -1;
  164. /* we only had one thing to send, so inform lws we are done
  165. * if we had more to send, call lws_callback_on_writable(wsi);
  166. * and just return 0 from callback. On having sent the last
  167. * part, call the below api instead.*/
  168. lws_client_http_body_pending(wsi, 0);
  169. break;
  170. case LWS_CALLBACK_COMPLETED_CLIENT_HTTP:
  171. wsi_dumb = NULL;
  172. force_exit = 1;
  173. break;
  174. #if defined(LWS_USE_POLARSSL)
  175. #else
  176. #if defined(LWS_USE_MBEDTLS)
  177. #else
  178. #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
  179. case LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS:
  180. if (crl_path[0]) {
  181. /* Enable CRL checking of the server certificate */
  182. X509_VERIFY_PARAM *param = X509_VERIFY_PARAM_new();
  183. X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
  184. SSL_CTX_set1_param((SSL_CTX*)user, param);
  185. X509_STORE *store = SSL_CTX_get_cert_store((SSL_CTX*)user);
  186. X509_LOOKUP *lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
  187. int n = X509_load_cert_crl_file(lookup, crl_path, X509_FILETYPE_PEM);
  188. X509_VERIFY_PARAM_free(param);
  189. if (n != 1) {
  190. char errbuf[256];
  191. n = ERR_get_error();
  192. lwsl_err("LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS: SSL error: %s (%d)\n", ERR_error_string(n, errbuf), n);
  193. return 1;
  194. }
  195. }
  196. break;
  197. #endif
  198. #endif
  199. #endif
  200. default:
  201. break;
  202. }
  203. return 0;
  204. }
  205. /* lws-mirror_protocol */
  206. static int
  207. callback_lws_mirror(struct lws *wsi, enum lws_callback_reasons reason,
  208. void *user, void *in, size_t len)
  209. {
  210. unsigned char buf[LWS_PRE + 4096];
  211. unsigned int rands[4];
  212. int l = 0;
  213. int n;
  214. switch (reason) {
  215. case LWS_CALLBACK_CLIENT_ESTABLISHED:
  216. lwsl_notice("mirror: LWS_CALLBACK_CLIENT_ESTABLISHED\n");
  217. lws_get_random(lws_get_context(wsi), rands, sizeof(rands[0]));
  218. mirror_lifetime = 16384 + (rands[0] & 65535);
  219. /* useful to test single connection stability */
  220. if (longlived)
  221. mirror_lifetime += 500000;
  222. lwsl_info("opened mirror connection with "
  223. "%d lifetime\n", mirror_lifetime);
  224. /*
  225. * mirror_lifetime is decremented each send, when it reaches
  226. * zero the connection is closed in the send callback.
  227. * When the close callback comes, wsi_mirror is set to NULL
  228. * so a new connection will be opened
  229. *
  230. * start the ball rolling,
  231. * LWS_CALLBACK_CLIENT_WRITEABLE will come next service
  232. */
  233. if (!flag_no_mirror_traffic)
  234. lws_callback_on_writable(wsi);
  235. break;
  236. case LWS_CALLBACK_CLOSED:
  237. lwsl_notice("mirror: LWS_CALLBACK_CLOSED mirror_lifetime=%d\n", mirror_lifetime);
  238. wsi_mirror = NULL;
  239. break;
  240. case LWS_CALLBACK_CLIENT_WRITEABLE:
  241. if (flag_no_mirror_traffic)
  242. return 0;
  243. for (n = 0; n < 1; n++) {
  244. lws_get_random(lws_get_context(wsi), rands, sizeof(rands));
  245. l += sprintf((char *)&buf[LWS_PRE + l],
  246. "c #%06X %u %u %u;",
  247. rands[0] & 0xffffff, /* colour */
  248. rands[1] & 511, /* x */
  249. rands[2] & 255, /* y */
  250. (rands[3] & 31) + 1); /* radius */
  251. }
  252. n = lws_write(wsi, &buf[LWS_PRE], l,
  253. opts | LWS_WRITE_TEXT);
  254. if (n < 0)
  255. return -1;
  256. if (n < l) {
  257. lwsl_err("Partial write LWS_CALLBACK_CLIENT_WRITEABLE\n");
  258. return -1;
  259. }
  260. mirror_lifetime--;
  261. if (!mirror_lifetime) {
  262. lwsl_info("closing mirror session\n");
  263. return -1;
  264. }
  265. /* get notified as soon as we can write again */
  266. lws_callback_on_writable(wsi);
  267. break;
  268. default:
  269. break;
  270. }
  271. return 0;
  272. }
  273. /* list of supported protocols and callbacks */
  274. static struct lws_protocols protocols[] = {
  275. {
  276. "dumb-increment-protocol,fake-nonexistant-protocol",
  277. callback_dumb_increment,
  278. 0,
  279. 20,
  280. },
  281. {
  282. "fake-nonexistant-protocol,lws-mirror-protocol",
  283. callback_lws_mirror,
  284. 0,
  285. 128,
  286. },
  287. { NULL, NULL, 0, 0 } /* end */
  288. };
  289. static const struct lws_extension exts[] = {
  290. {
  291. "permessage-deflate",
  292. lws_extension_callback_pm_deflate,
  293. "permessage-deflate; client_max_window_bits"
  294. },
  295. {
  296. "deflate-frame",
  297. lws_extension_callback_pm_deflate,
  298. "deflate_frame"
  299. },
  300. { NULL, NULL, NULL /* terminator */ }
  301. };
  302. void sighandler(int sig)
  303. {
  304. force_exit = 1;
  305. }
  306. static struct option options[] = {
  307. { "help", no_argument, NULL, 'h' },
  308. { "debug", required_argument, NULL, 'd' },
  309. { "port", required_argument, NULL, 'p' },
  310. { "ssl", no_argument, NULL, 's' },
  311. { "strict-ssl", no_argument, NULL, 'S' },
  312. { "version", required_argument, NULL, 'v' },
  313. { "undeflated", no_argument, NULL, 'u' },
  314. { "multi-test", no_argument, NULL, 'm' },
  315. { "nomirror", no_argument, NULL, 'n' },
  316. { "longlived", no_argument, NULL, 'l' },
  317. { "post", no_argument, NULL, 'o' },
  318. { "pingpong-secs", required_argument, NULL, 'P' },
  319. { "ssl-cert", required_argument, NULL, 'C' },
  320. { "ssl-key", required_argument, NULL, 'K' },
  321. { "ssl-ca", required_argument, NULL, 'A' },
  322. #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
  323. { "ssl-crl", required_argument, NULL, 'R' },
  324. #endif
  325. { NULL, 0, 0, 0 }
  326. };
  327. static int ratelimit_connects(unsigned int *last, unsigned int secs)
  328. {
  329. struct timeval tv;
  330. gettimeofday(&tv, NULL);
  331. if (tv.tv_sec - (*last) < secs)
  332. return 0;
  333. *last = tv.tv_sec;
  334. return 1;
  335. }
  336. int main(int argc, char **argv)
  337. {
  338. int n = 0, m, ret = 0, port = 7681, use_ssl = 0, ietf_version = -1;
  339. unsigned int rl_dumb = 0, rl_mirror = 0, do_ws = 1, pp_secs = 0, do_multi = 0;
  340. struct lws_context_creation_info info;
  341. struct lws_client_connect_info i;
  342. struct lws_context *context;
  343. const char *prot, *p;
  344. char path[300];
  345. char cert_path[1024] = "";
  346. char key_path[1024] = "";
  347. char ca_path[1024] = "";
  348. memset(&info, 0, sizeof info);
  349. lwsl_notice("libwebsockets test client - license LGPL2.1+SLE\n");
  350. lwsl_notice("(C) Copyright 2010-2016 Andy Green <andy@warmcat.com>\n");
  351. if (argc < 2)
  352. goto usage;
  353. while (n >= 0) {
  354. n = getopt_long(argc, argv, "Snuv:hsp:d:lC:K:A:P:mo", options, NULL);
  355. if (n < 0)
  356. continue;
  357. switch (n) {
  358. case 'd':
  359. lws_set_log_level(atoi(optarg), NULL);
  360. break;
  361. case 's': /* lax SSL, allow selfsigned, skip checking hostname */
  362. use_ssl = LCCSCF_USE_SSL |
  363. LCCSCF_ALLOW_SELFSIGNED |
  364. LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK;
  365. break;
  366. case 'S': /* Strict SSL, no selfsigned, check server hostname */
  367. use_ssl = LCCSCF_USE_SSL;
  368. break;
  369. case 'p':
  370. port = atoi(optarg);
  371. break;
  372. case 'P':
  373. pp_secs = atoi(optarg);
  374. lwsl_notice("Setting pingpong interval to %d\n", pp_secs);
  375. break;
  376. case 'l':
  377. longlived = 1;
  378. break;
  379. case 'v':
  380. ietf_version = atoi(optarg);
  381. break;
  382. case 'u':
  383. deny_deflate = 1;
  384. break;
  385. case 'm':
  386. do_multi = 1;
  387. break;
  388. case 'o':
  389. test_post = 1;
  390. break;
  391. case 'n':
  392. flag_no_mirror_traffic = 1;
  393. lwsl_notice("Disabled sending mirror data (for pingpong testing)\n");
  394. break;
  395. case 'C':
  396. strncpy(cert_path, optarg, sizeof(cert_path) - 1);
  397. cert_path[sizeof(cert_path) - 1] = '\0';
  398. break;
  399. case 'K':
  400. strncpy(key_path, optarg, sizeof(key_path) - 1);
  401. key_path[sizeof(key_path) - 1] = '\0';
  402. break;
  403. case 'A':
  404. strncpy(ca_path, optarg, sizeof(ca_path) - 1);
  405. ca_path[sizeof(ca_path) - 1] = '\0';
  406. break;
  407. #if defined(LWS_USE_POLARSSL)
  408. #else
  409. #if defined(LWS_USE_MBEDTLS)
  410. #else
  411. #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
  412. case 'R':
  413. strncpy(crl_path, optarg, sizeof(crl_path) - 1);
  414. crl_path[sizeof(crl_path) - 1] = '\0';
  415. break;
  416. #endif
  417. #endif
  418. #endif
  419. case 'h':
  420. goto usage;
  421. }
  422. }
  423. if (optind >= argc)
  424. goto usage;
  425. signal(SIGINT, sighandler);
  426. memset(&i, 0, sizeof(i));
  427. i.port = port;
  428. if (lws_parse_uri(argv[optind], &prot, &i.address, &i.port, &p))
  429. goto usage;
  430. /* add back the leading / on path */
  431. path[0] = '/';
  432. strncpy(path + 1, p, sizeof(path) - 2);
  433. path[sizeof(path) - 1] = '\0';
  434. i.path = path;
  435. if (!strcmp(prot, "http") || !strcmp(prot, "ws"))
  436. use_ssl = 0;
  437. if (!strcmp(prot, "https") || !strcmp(prot, "wss"))
  438. if (!use_ssl)
  439. use_ssl = LCCSCF_USE_SSL;
  440. /*
  441. * create the websockets context. This tracks open connections and
  442. * knows how to route any traffic and which protocol version to use,
  443. * and if each connection is client or server side.
  444. *
  445. * For this client-only demo, we tell it to not listen on any port.
  446. */
  447. info.port = CONTEXT_PORT_NO_LISTEN;
  448. info.protocols = protocols;
  449. info.gid = -1;
  450. info.uid = -1;
  451. info.ws_ping_pong_interval = pp_secs;
  452. if (use_ssl) {
  453. info.options |= LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
  454. /*
  455. * If the server wants us to present a valid SSL client certificate
  456. * then we can set it up here.
  457. */
  458. if (cert_path[0])
  459. info.ssl_cert_filepath = cert_path;
  460. if (key_path[0])
  461. info.ssl_private_key_filepath = key_path;
  462. /*
  463. * A CA cert and CRL can be used to validate the cert send by the server
  464. */
  465. if (ca_path[0])
  466. info.ssl_ca_filepath = ca_path;
  467. #if defined(LWS_USE_POLARSSL)
  468. #else
  469. #if defined(LWS_USE_MBEDTLS)
  470. #else
  471. #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
  472. else if (crl_path[0])
  473. lwsl_notice("WARNING, providing a CRL requires a CA cert!\n");
  474. #endif
  475. #endif
  476. #endif
  477. }
  478. if (use_ssl & LCCSCF_USE_SSL)
  479. lwsl_notice(" Using SSL\n");
  480. else
  481. lwsl_notice(" SSL disabled\n");
  482. if (use_ssl & LCCSCF_ALLOW_SELFSIGNED)
  483. lwsl_notice(" Selfsigned certs allowed\n");
  484. else
  485. lwsl_notice(" Cert must validate correctly (use -s to allow selfsigned)\n");
  486. if (use_ssl & LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK)
  487. lwsl_notice(" Skipping peer cert hostname check\n");
  488. else
  489. lwsl_notice(" Requiring peer cert hostname matches\n");
  490. context = lws_create_context(&info);
  491. if (context == NULL) {
  492. fprintf(stderr, "Creating libwebsocket context failed\n");
  493. return 1;
  494. }
  495. i.context = context;
  496. i.ssl_connection = use_ssl;
  497. i.host = i.address;
  498. i.origin = i.address;
  499. i.ietf_version_or_minus_one = ietf_version;
  500. i.client_exts = exts;
  501. if (!strcmp(prot, "http") || !strcmp(prot, "https")) {
  502. lwsl_notice("using %s mode (non-ws)\n", prot);
  503. if (test_post) {
  504. i.method = "POST";
  505. lwsl_notice("POST mode\n");
  506. }
  507. else
  508. i.method = "GET";
  509. do_ws = 0;
  510. } else
  511. lwsl_notice("using %s mode (ws)\n", prot);
  512. /*
  513. * sit there servicing the websocket context to handle incoming
  514. * packets, and drawing random circles on the mirror protocol websocket
  515. *
  516. * nothing happens until the client websocket connection is
  517. * asynchronously established... calling lws_client_connect() only
  518. * instantiates the connection logically, lws_service() progresses it
  519. * asynchronously.
  520. */
  521. m = 0;
  522. while (!force_exit) {
  523. if (do_multi) {
  524. for (n = 0; n < ARRAY_SIZE(wsi_multi); n++) {
  525. if (!wsi_multi[n] && ratelimit_connects(&rl_multi[n], 2u)) {
  526. lwsl_notice("dumb %d: connecting\n", n);
  527. i.protocol = protocols[PROTOCOL_DUMB_INCREMENT].name;
  528. i.pwsi = &wsi_multi[n];
  529. lws_client_connect_via_info(&i);
  530. }
  531. }
  532. } else {
  533. if (do_ws) {
  534. if (!wsi_dumb && ratelimit_connects(&rl_dumb, 2u)) {
  535. lwsl_notice("dumb: connecting\n");
  536. i.protocol = protocols[PROTOCOL_DUMB_INCREMENT].name;
  537. i.pwsi = &wsi_dumb;
  538. lws_client_connect_via_info(&i);
  539. }
  540. if (!wsi_mirror && ratelimit_connects(&rl_mirror, 2u)) {
  541. lwsl_notice("mirror: connecting\n");
  542. i.protocol = protocols[PROTOCOL_LWS_MIRROR].name;
  543. i.pwsi = &wsi_mirror;
  544. wsi_mirror = lws_client_connect_via_info(&i);
  545. }
  546. } else
  547. if (!wsi_dumb && ratelimit_connects(&rl_dumb, 2u)) {
  548. lwsl_notice("http: connecting\n");
  549. i.pwsi = &wsi_dumb;
  550. lws_client_connect_via_info(&i);
  551. }
  552. }
  553. lws_service(context, 500);
  554. if (do_multi) {
  555. m++;
  556. if (m == 10) {
  557. m = 0;
  558. lwsl_notice("doing lws_callback_on_writable_all_protocol\n");
  559. lws_callback_on_writable_all_protocol(context, &protocols[PROTOCOL_DUMB_INCREMENT]);
  560. }
  561. }
  562. }
  563. lwsl_err("Exiting\n");
  564. lws_context_destroy(context);
  565. return ret;
  566. usage:
  567. fprintf(stderr, "Usage: libwebsockets-test-client "
  568. "<server address> [--port=<p>] "
  569. "[--ssl] [-k] [-v <ver>] "
  570. "[-d <log bitfield>] [-l]\n");
  571. return 1;
  572. }