clean fraggle
Signed-off-by: Andy Green <andy@warmcat.com>
diff --git a/README-test-server b/README-test-server
index b31ed62..aeb5d21 100644
--- a/README-test-server
+++ b/README-test-server
@@ -166,6 +166,50 @@
by --protocol=protocolname
+Fraggle test app
+----------------
+
+By default it runs in server mode
+
+$ libwebsockets-test-fraggle
+libwebsockets test fraggle
+(C) Copyright 2010-2011 Andy Green <andy@warmcat.com> licensed under LGPL2.1
+ Compiled with SSL support, not using it
+ Listening on port 7681
+server sees client connect
+accepted v06 connection
+Spamming 360 random fragments
+Spamming session over, len = 371913. sum = 0x2D3C0AE
+Spamming 895 random fragments
+Spamming session over, len = 875970. sum = 0x6A74DA1
+...
+
+You need to run a second session in client mode, you have to
+give the -c switch and the server address at least:
+
+$ libwebsockets-test-fraggle -c localhost
+libwebsockets test fraggle
+(C) Copyright 2010-2011 Andy Green <andy@warmcat.com> licensed under LGPL2.1
+ Client mode
+Connecting to localhost:7681
+denied deflate-stream extension
+handshake OK for protocol fraggle-protocol
+client connects to server
+EOM received 371913 correctly from 360 fragments
+EOM received 875970 correctly from 895 fragments
+EOM received 247140 correctly from 258 fragments
+EOM received 695451 correctly from 692 fragments
+...
+
+The fraggle test sends a random number up to 1024 fragmented websocket frames
+each of a random size between 1 and 2001 bytes in a single message, then sends
+a checksum and starts sending a new randomly sized and fragmented message.
+
+The fraggle test client receives the same message fragments and computes the
+same checksum using websocket framing to see when the message has ended. It
+then accepts the server checksum message and compares that to its checksum.
+
+
proxy support
-------------
diff --git a/test-server/test-fraggle.c b/test-server/test-fraggle.c
index fe75c4d..ecd6b8e 100644
--- a/test-server/test-fraggle.c
+++ b/test-server/test-fraggle.c
@@ -41,14 +41,6 @@
/* fraggle protocol */
-/*
- * one of these is auto-created for each connection and a pointer to the
- * appropriate instance is passed to the callback in the user parameter
- *
- * for this example protocol we use it to individualize the count for each
- * connection.
- */
-
struct per_session_data__fraggle {
int packets_left;
int total_message;
@@ -111,7 +103,7 @@
psf->sum = 0;
psf->total_message = 0;
psf->packets_left = 0;
-// fprintf(stderr, "starting receiving a message\n");
+
/* fallthru */
case 1:
@@ -139,13 +131,13 @@
"len = %d. sum = 0x%lX\n",
psf->total_message, psf->sum);
- buf[LWS_SEND_BUFFER_PRE_PADDING + 0] = psf->sum >> 24;
- buf[LWS_SEND_BUFFER_PRE_PADDING + 1] = psf->sum >> 16;
- buf[LWS_SEND_BUFFER_PRE_PADDING + 2] = psf->sum >> 8;
- buf[LWS_SEND_BUFFER_PRE_PADDING + 3] = psf->sum;
+ p[0] = psf->sum >> 24;
+ p[1] = psf->sum >> 16;
+ p[2] = psf->sum >> 8;
+ p[3] = psf->sum;
- n = libwebsocket_write(wsi, (unsigned char *)
- &buf[LWS_SEND_BUFFER_PRE_PADDING], 4, LWS_WRITE_TEXT);
+ n = libwebsocket_write(wsi, (unsigned char *)p,
+ 4, LWS_WRITE_TEXT);
libwebsocket_callback_on_writable(context, wsi);