blob: a7c07aaa0ced1cb4b202f1c874f17737f281eaa0 [file] [log] [blame]
Andy Greena0da8a82010-11-08 17:12:19 +00001/*
2 * libwebsockets - small server side websockets and web server implementation
Andy Greene77ddd82010-11-13 10:03:47 +00003 *
Andy Green7b405452013-02-01 10:50:15 +08004 * Copyright (C) 2010-2013 Andy Green <andy@warmcat.com>
Andy Greena0da8a82010-11-08 17:12:19 +00005 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation:
9 * version 2.1 of the License.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
19 * MA 02110-1301 USA
20 */
21
Markus Elfring75212332013-10-26 20:23:00 +080022#ifndef LIBWEBSOCKET_H_3060898B846849FF9F88F5DB59B5950C
23#define LIBWEBSOCKET_H_3060898B846849FF9F88F5DB59B5950C
Andy Greenab990e42010-10-31 12:42:52 +000024
Andy Greena11fe942011-09-25 10:30:26 +010025#ifdef __cplusplus
26extern "C" {
Paulo Roberto Urio4144e832012-06-04 09:04:33 +080027#include <cstddef>
Andy Greena11fe942011-09-25 10:30:26 +010028#endif
29
Andreas Pakulat68bd4bd2013-10-28 15:18:04 +010030#if defined(WIN32) || defined(_WIN32)
Peter Hinz56885f32011-03-02 22:03:47 +000031
32#ifndef WIN32_LEAN_AND_MEAN
33#define WIN32_LEAN_AND_MEAN
34#endif
35#include <winsock2.h>
36#include <ws2tcpip.h>
Paulo Roberto Urio4144e832012-06-04 09:04:33 +080037#include <stddef.h>
pmcdona0a0a7eb2013-12-18 10:17:25 +080038#include <basetsd.h>
Andreas Pakulatfe8589c2013-10-16 17:57:17 +020039#include "websock-w32.h"
Peter Hinz56885f32011-03-02 22:03:47 +000040
Oleg Golosovskiy2ef75052011-10-04 20:20:14 +080041#define strcasecmp stricmp
Andy Greendfb23042013-01-17 12:26:48 +080042#define getdtablesize() 30000
Oleg Golosovskiy2ef75052011-10-04 20:20:14 +080043
Andy Greenac1ebba2014-02-15 12:46:33 +080044#ifdef __MINGW64__
45#else
46#ifdef __MINGW32__
47#else
48
James Chen4ebedc22013-12-14 11:35:01 +080049#ifndef __SSIZE_T
50#define __SSIZE_T
51
52typedef SSIZE_T ssize_t;
53
54#endif // __SSIZE_T
Andy Greenac1ebba2014-02-15 12:46:33 +080055#endif
56#endif
David Brooks06fbcee2012-05-02 06:02:45 +080057
Andy Green3661d7b2013-04-26 07:37:16 +080058#define LWS_VISIBLE
59
David Galeano9454e212011-09-26 12:17:20 +010060#ifdef LWS_DLL
61#ifdef LWS_INTERNAL
62#define LWS_EXTERN extern __declspec(dllexport)
63#else
64#define LWS_EXTERN extern __declspec(dllimport)
65#endif
Andy Green3661d7b2013-04-26 07:37:16 +080066#else
67#define LWS_EXTERN
David Galeano9454e212011-09-26 12:17:20 +010068#endif
69
Joakim Soderbergf272cb02013-02-13 09:29:26 +080070#else // NOT WIN32
Andy Green3b3fa9e2013-12-25 16:34:37 +080071
72/* to get ppoll() */
Michael Haberlereca0e492014-01-10 23:40:14 +010073#ifndef _GNU_SOURCE
74#define _GNU_SOURCE
75#endif
Andy Green9f990342011-02-12 11:57:45 +000076#include <poll.h>
Andy Greendfb23042013-01-17 12:26:48 +080077#include <unistd.h>
Peter Pentchev9a4fef72013-03-30 09:52:21 +080078
79#if defined(__GNUC__)
80#define LWS_VISIBLE __attribute__((visibility("default")))
81#else
82#define LWS_VISIBLE
83#endif
84
Peter Hinz56885f32011-03-02 22:03:47 +000085#endif
Andy Green9f990342011-02-12 11:57:45 +000086
Peter Young27b32372013-01-17 10:10:10 +080087#include <assert.h>
88
David Galeano9454e212011-09-26 12:17:20 +010089#ifndef LWS_EXTERN
90#define LWS_EXTERN extern
91#endif
92
Andy Green4739e5c2011-01-22 12:51:57 +000093#define CONTEXT_PORT_NO_LISTEN 0
Andy Greena41314f2011-05-23 10:00:03 +010094#define MAX_MUX_RECURSION 2
Andy Greenbfb051f2011-02-09 08:49:14 +000095
Andy Green43db0452013-01-10 19:50:35 +080096enum lws_log_levels {
97 LLL_ERR = 1 << 0,
98 LLL_WARN = 1 << 1,
Andy Green7c19c342013-01-19 12:18:07 +080099 LLL_NOTICE = 1 << 2,
100 LLL_INFO = 1 << 3,
101 LLL_DEBUG = 1 << 4,
102 LLL_PARSER = 1 << 5,
103 LLL_HEADER = 1 << 6,
104 LLL_EXT = 1 << 7,
105 LLL_CLIENT = 1 << 8,
Andy Greend636e352013-01-29 12:36:17 +0800106 LLL_LATENCY = 1 << 9,
Andy Green43db0452013-01-10 19:50:35 +0800107
Andy Greend636e352013-01-29 12:36:17 +0800108 LLL_COUNT = 10 /* set to count of valid flags */
Andy Green43db0452013-01-10 19:50:35 +0800109};
110
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800111LWS_VISIBLE LWS_EXTERN void _lws_log(int filter, const char *format, ...);
Andy Green69e43642013-01-19 11:58:07 +0800112
Andy Greend636e352013-01-29 12:36:17 +0800113/* notice, warn and log are always compiled in */
Andy Green69e43642013-01-19 11:58:07 +0800114#define lwsl_notice(...) _lws_log(LLL_NOTICE, __VA_ARGS__)
115#define lwsl_warn(...) _lws_log(LLL_WARN, __VA_ARGS__)
116#define lwsl_err(...) _lws_log(LLL_ERR, __VA_ARGS__)
Andy Green69e43642013-01-19 11:58:07 +0800117/*
Andy Greend636e352013-01-29 12:36:17 +0800118 * weaker logging can be deselected at configure time using --disable-debug
Andy Green69e43642013-01-19 11:58:07 +0800119 * that gets rid of the overhead of checking while keeping _warn and _err
120 * active
121 */
122#ifdef _DEBUG
Andy Greend636e352013-01-29 12:36:17 +0800123
Andy Green69e43642013-01-19 11:58:07 +0800124#define lwsl_info(...) _lws_log(LLL_INFO, __VA_ARGS__)
125#define lwsl_debug(...) _lws_log(LLL_DEBUG, __VA_ARGS__)
126#define lwsl_parser(...) _lws_log(LLL_PARSER, __VA_ARGS__)
127#define lwsl_header(...) _lws_log(LLL_HEADER, __VA_ARGS__)
Andy Greend636e352013-01-29 12:36:17 +0800128#define lwsl_ext(...) _lws_log(LLL_EXT, __VA_ARGS__)
Andy Green69e43642013-01-19 11:58:07 +0800129#define lwsl_client(...) _lws_log(LLL_CLIENT, __VA_ARGS__)
Andy Greend636e352013-01-29 12:36:17 +0800130#define lwsl_latency(...) _lws_log(LLL_LATENCY, __VA_ARGS__)
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800131LWS_VISIBLE LWS_EXTERN void lwsl_hexdump(void *buf, size_t len);
Andy Greend636e352013-01-29 12:36:17 +0800132
Andy Green69e43642013-01-19 11:58:07 +0800133#else /* no debug */
Andy Greend636e352013-01-29 12:36:17 +0800134
Andy Green69e43642013-01-19 11:58:07 +0800135#define lwsl_info(...)
136#define lwsl_debug(...)
137#define lwsl_parser(...)
138#define lwsl_header(...)
139#define lwsl_ext(...)
140#define lwsl_client(...)
Andy Greend636e352013-01-29 12:36:17 +0800141#define lwsl_latency(...)
Andy Green69e43642013-01-19 11:58:07 +0800142#define lwsl_hexdump(a, b)
Andy Greend636e352013-01-29 12:36:17 +0800143
Andy Green69e43642013-01-19 11:58:07 +0800144#endif
145
Andy Green4e7a1332013-11-11 07:30:33 +0800146#define ARRAY_SIZE(x) (sizeof(x) / sizeof(x[0]))
147
Andy Greenbfb051f2011-02-09 08:49:14 +0000148enum libwebsocket_context_options {
Andy Greenc6bf2c22011-02-20 11:10:47 +0000149 LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT = 2,
Andy Green788c4a82012-10-22 12:29:57 +0100150 LWS_SERVER_OPTION_SKIP_SERVER_CANONICAL_NAME = 4,
James Devine5b34c972013-12-14 11:41:29 +0800151 LWS_SERVER_OPTION_ALLOW_NON_SSL_ON_SSL_PORT = 8
Andy Greenbfb051f2011-02-09 08:49:14 +0000152};
Andy Green8014b292011-01-30 20:57:25 +0000153
Andy Green775c0dd2010-10-29 14:15:22 +0100154enum libwebsocket_callback_reasons {
155 LWS_CALLBACK_ESTABLISHED,
David Brooks80a44972012-04-20 12:18:47 +0800156 LWS_CALLBACK_CLIENT_CONNECTION_ERROR,
Andy Green2b57a342013-02-06 15:15:25 +0900157 LWS_CALLBACK_CLIENT_FILTER_PRE_ESTABLISH,
Andy Green90c7cbc2011-01-27 06:26:52 +0000158 LWS_CALLBACK_CLIENT_ESTABLISHED,
Andy Green775c0dd2010-10-29 14:15:22 +0100159 LWS_CALLBACK_CLOSED,
Andy Green0c9563b2013-06-10 22:54:40 +0800160 LWS_CALLBACK_CLOSED_HTTP,
Andy Green775c0dd2010-10-29 14:15:22 +0100161 LWS_CALLBACK_RECEIVE,
Andy Green4739e5c2011-01-22 12:51:57 +0000162 LWS_CALLBACK_CLIENT_RECEIVE,
Andy Greena6cbece2011-01-27 20:06:03 +0000163 LWS_CALLBACK_CLIENT_RECEIVE_PONG,
Andy Green90c7cbc2011-01-27 06:26:52 +0000164 LWS_CALLBACK_CLIENT_WRITEABLE,
Andy Green9e4c2b62011-03-07 20:47:39 +0000165 LWS_CALLBACK_SERVER_WRITEABLE,
Andy Greena2b0ab02010-11-11 12:28:29 +0000166 LWS_CALLBACK_HTTP,
kapejodce64fb02013-11-19 13:38:16 +0100167 LWS_CALLBACK_HTTP_BODY,
168 LWS_CALLBACK_HTTP_BODY_COMPLETION,
Andy Greend280b6e2013-01-15 13:40:23 +0800169 LWS_CALLBACK_HTTP_FILE_COMPLETION,
Andy Green54cb3462013-02-14 22:23:54 +0800170 LWS_CALLBACK_HTTP_WRITEABLE,
Andy Green07034092011-02-13 08:37:12 +0000171 LWS_CALLBACK_FILTER_NETWORK_CONNECTION,
Andy Green19895bc2013-11-09 11:59:56 +0800172 LWS_CALLBACK_FILTER_HTTP_CONNECTION,
Alexandre Erwin Ittnerd578f572014-02-06 23:15:51 -0200173 LWS_CALLBACK_SERVER_NEW_CLIENT_INSTANTIATED,
Andy Greenc85619d2011-02-13 08:25:26 +0000174 LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION,
Andy Green0894bda2011-02-19 09:09:11 +0000175 LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS,
Andy Greenc6bf2c22011-02-20 11:10:47 +0000176 LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS,
Andy Green6901cb32011-02-21 08:06:47 +0000177 LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION,
Andy Green385e7ad2011-03-01 21:06:02 +0000178 LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER,
Andy Greenc5114822011-03-06 10:29:35 +0000179 LWS_CALLBACK_CONFIRM_EXTENSION_OKAY,
Andy Greenc6517fa2011-03-06 13:15:29 +0000180 LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED,
Andy Greena7109e62013-02-11 12:05:54 +0800181 LWS_CALLBACK_PROTOCOL_INIT,
182 LWS_CALLBACK_PROTOCOL_DESTROY,
Andy Green76b6ea12014-02-15 19:25:50 +0800183 LWS_CALLBACK_WSI_CREATE, /* always protocol[0] */
184 LWS_CALLBACK_WSI_DESTROY, /* always protocol[0] */
Andy Green3b3fa9e2013-12-25 16:34:37 +0800185 LWS_CALLBACK_GET_THREAD_ID,
186
Andy Green3221f922011-02-12 13:14:11 +0000187 /* external poll() management support */
188 LWS_CALLBACK_ADD_POLL_FD,
189 LWS_CALLBACK_DEL_POLL_FD,
Michael Haberlerb3093052014-02-15 20:18:24 +0800190 LWS_CALLBACK_CHANGE_MODE_POLL_FD,
Andy Green7a132792013-12-18 09:48:26 +0800191 LWS_CALLBACK_LOCK_POLL,
192 LWS_CALLBACK_UNLOCK_POLL,
Andy Green09f00582014-02-15 16:49:41 +0800193
194 LWS_CALLBACK_USER = 1000, /* user code can use any including / above */
Andy Green5fd8a5e2010-10-31 11:57:17 +0000195};
196
Michael Haberlercb733062014-02-15 20:15:55 +0800197// argument structure for all external poll related calls
198// passed in via 'in'
199struct libwebsocket_pollargs {
200 int fd; // applicable file descriptor
201 int events; // the new event mask
202 int prev_events; // the previous event mask
203};
204
205
Andy Green3182ece2013-01-20 17:08:31 +0800206#ifndef LWS_NO_EXTENSIONS
Andy Greenc5114822011-03-06 10:29:35 +0000207enum libwebsocket_extension_callback_reasons {
Andy Greena41314f2011-05-23 10:00:03 +0100208 LWS_EXT_CALLBACK_SERVER_CONTEXT_CONSTRUCT,
209 LWS_EXT_CALLBACK_CLIENT_CONTEXT_CONSTRUCT,
210 LWS_EXT_CALLBACK_SERVER_CONTEXT_DESTRUCT,
211 LWS_EXT_CALLBACK_CLIENT_CONTEXT_DESTRUCT,
Andy Greenc5114822011-03-06 10:29:35 +0000212 LWS_EXT_CALLBACK_CONSTRUCT,
Andy Green2366b1c2011-03-06 13:15:31 +0000213 LWS_EXT_CALLBACK_CLIENT_CONSTRUCT,
Andy Green68b45042011-05-25 21:41:57 +0100214 LWS_EXT_CALLBACK_CHECK_OK_TO_REALLY_CLOSE,
Andy Green09226502011-05-28 10:19:19 +0100215 LWS_EXT_CALLBACK_CHECK_OK_TO_PROPOSE_EXTENSION,
Andy Greenc5114822011-03-06 10:29:35 +0000216 LWS_EXT_CALLBACK_DESTROY,
Andy Greena41314f2011-05-23 10:00:03 +0100217 LWS_EXT_CALLBACK_DESTROY_ANY_WSI_CLOSING,
218 LWS_EXT_CALLBACK_ANY_WSI_ESTABLISHED,
Andy Green98a717c2011-03-06 13:14:15 +0000219 LWS_EXT_CALLBACK_PACKET_RX_PREPARSE,
Andy Green3b84c002011-03-06 13:14:42 +0000220 LWS_EXT_CALLBACK_PACKET_TX_PRESEND,
Andy Greena41314f2011-05-23 10:00:03 +0100221 LWS_EXT_CALLBACK_PACKET_TX_DO_SEND,
222 LWS_EXT_CALLBACK_HANDSHAKE_REPLY_TX,
Andy Greenc44159f2011-03-07 07:08:18 +0000223 LWS_EXT_CALLBACK_FLUSH_PENDING_TX,
Andy Greena41314f2011-05-23 10:00:03 +0100224 LWS_EXT_CALLBACK_EXTENDED_PAYLOAD_RX,
225 LWS_EXT_CALLBACK_CAN_PROXY_CLIENT_CONNECTION,
226 LWS_EXT_CALLBACK_1HZ,
227 LWS_EXT_CALLBACK_REQUEST_ON_WRITEABLE,
228 LWS_EXT_CALLBACK_IS_WRITEABLE,
David Galeanoe2cf9922013-01-09 18:06:55 +0800229 LWS_EXT_CALLBACK_PAYLOAD_TX,
230 LWS_EXT_CALLBACK_PAYLOAD_RX,
Andy Greenc5114822011-03-06 10:29:35 +0000231};
Andy Green3182ece2013-01-20 17:08:31 +0800232#endif
Andy Greenc5114822011-03-06 10:29:35 +0000233
Andy Green5fd8a5e2010-10-31 11:57:17 +0000234enum libwebsocket_write_protocol {
235 LWS_WRITE_TEXT,
236 LWS_WRITE_BINARY,
Andy Green5d9d94b2011-03-07 20:47:41 +0000237 LWS_WRITE_CONTINUATION,
Andy Green38e57bb2011-01-19 12:20:27 +0000238 LWS_WRITE_HTTP,
239
Andy Green5e1fa172011-02-10 09:07:05 +0000240 /* special 04+ opcodes */
Andy Green38e57bb2011-01-19 12:20:27 +0000241
242 LWS_WRITE_CLOSE,
243 LWS_WRITE_PING,
Andy Green90c7cbc2011-01-27 06:26:52 +0000244 LWS_WRITE_PONG,
245
Andy Greenbd96d802011-01-30 08:24:31 +0000246 /* flags */
247
248 LWS_WRITE_NO_FIN = 0x40,
249 /*
250 * client packet payload goes out on wire unmunged
251 * only useful for security tests since normal servers cannot
252 * decode the content if used
253 */
254 LWS_WRITE_CLIENT_IGNORE_XOR_MASK = 0x80
Andy Greenff95d7a2010-10-28 22:36:01 +0100255};
256
Andy Greenc85619d2011-02-13 08:25:26 +0000257/*
258 * you need these to look at headers that have been parsed if using the
259 * LWS_CALLBACK_FILTER_CONNECTION callback. If a header from the enum
260 * list below is absent, .token = NULL and token_len = 0. Otherwise .token
261 * points to .token_len chars containing that header content.
262 */
263
264struct lws_tokens {
265 char *token;
266 int token_len;
267};
268
269enum lws_token_indexes {
270 WSI_TOKEN_GET_URI,
kapejodce64fb02013-11-19 13:38:16 +0100271 WSI_TOKEN_POST_URI,
Andy Greenc85619d2011-02-13 08:25:26 +0000272 WSI_TOKEN_HOST,
273 WSI_TOKEN_CONNECTION,
274 WSI_TOKEN_KEY1,
275 WSI_TOKEN_KEY2,
276 WSI_TOKEN_PROTOCOL,
277 WSI_TOKEN_UPGRADE,
278 WSI_TOKEN_ORIGIN,
279 WSI_TOKEN_DRAFT,
280 WSI_TOKEN_CHALLENGE,
281
282 /* new for 04 */
283 WSI_TOKEN_KEY,
284 WSI_TOKEN_VERSION,
285 WSI_TOKEN_SWORIGIN,
286
287 /* new for 05 */
288 WSI_TOKEN_EXTENSIONS,
289
290 /* client receives these */
291 WSI_TOKEN_ACCEPT,
292 WSI_TOKEN_NONCE,
293 WSI_TOKEN_HTTP,
Andy Greencc13c6f2013-11-09 10:09:09 +0800294
295 /* http-related */
296 WSI_TOKEN_HTTP_ACCEPT,
297 WSI_TOKEN_HTTP_IF_MODIFIED_SINCE,
298 WSI_TOKEN_HTTP_ACCEPT_ENCODING,
299 WSI_TOKEN_HTTP_ACCEPT_LANGUAGE,
300 WSI_TOKEN_HTTP_PRAGMA,
301 WSI_TOKEN_HTTP_CACHE_CONTROL,
302 WSI_TOKEN_HTTP_AUTHORIZATION,
303 WSI_TOKEN_HTTP_COOKIE,
kapejodce64fb02013-11-19 13:38:16 +0100304 WSI_TOKEN_HTTP_CONTENT_LENGTH,
Andy Greencc13c6f2013-11-09 10:09:09 +0800305 WSI_TOKEN_HTTP_CONTENT_TYPE,
306 WSI_TOKEN_HTTP_DATE,
307 WSI_TOKEN_HTTP_RANGE,
308 WSI_TOKEN_HTTP_REFERER,
Andy Green1e3f7b82013-11-13 07:45:17 +0800309 WSI_TOKEN_HTTP_URI_ARGS,
Andy Greencc13c6f2013-11-09 10:09:09 +0800310
311
Andy Greena41314f2011-05-23 10:00:03 +0100312 WSI_TOKEN_MUXURL,
Andy Greenc85619d2011-02-13 08:25:26 +0000313
Andy Greene77fb802013-02-11 13:04:45 +0800314 /* use token storage to stash these */
315
316 _WSI_TOKEN_CLIENT_SENT_PROTOCOLS,
317 _WSI_TOKEN_CLIENT_PEER_ADDRESS,
318 _WSI_TOKEN_CLIENT_URI,
319 _WSI_TOKEN_CLIENT_HOST,
320 _WSI_TOKEN_CLIENT_ORIGIN,
321
Andy Greenc85619d2011-02-13 08:25:26 +0000322 /* always last real token index*/
323 WSI_TOKEN_COUNT,
324 /* parser state additions */
325 WSI_TOKEN_NAME_PART,
326 WSI_TOKEN_SKIPPING,
327 WSI_TOKEN_SKIPPING_SAW_CR,
Andy Greena41314f2011-05-23 10:00:03 +0100328 WSI_PARSING_COMPLETE,
329 WSI_INIT_TOKEN_MUXURL,
Andy Greenc85619d2011-02-13 08:25:26 +0000330};
331
Andy Green687b0182011-02-26 11:04:01 +0000332/*
David Galeano2915a802013-01-09 15:26:08 +0800333 * From RFC 6455
Andy Green687b0182011-02-26 11:04:01 +0000334 1000
335
David Galeano2915a802013-01-09 15:26:08 +0800336 1000 indicates a normal closure, meaning that the purpose for
337 which the connection was established has been fulfilled.
Andy Green687b0182011-02-26 11:04:01 +0000338
339 1001
340
341 1001 indicates that an endpoint is "going away", such as a server
David Galeano2915a802013-01-09 15:26:08 +0800342 going down or a browser having navigated away from a page.
Andy Green687b0182011-02-26 11:04:01 +0000343
344 1002
345
346 1002 indicates that an endpoint is terminating the connection due
347 to a protocol error.
348
349 1003
350
351 1003 indicates that an endpoint is terminating the connection
David Galeano2915a802013-01-09 15:26:08 +0800352 because it has received a type of data it cannot accept (e.g., an
353 endpoint that understands only text data MAY send this if it
354 receives a binary message).
Andy Green687b0182011-02-26 11:04:01 +0000355
356 1004
357
David Galeano2915a802013-01-09 15:26:08 +0800358 Reserved. The specific meaning might be defined in the future.
359
360 1005
361
362 1005 is a reserved value and MUST NOT be set as a status code in a
363 Close control frame by an endpoint. It is designated for use in
364 applications expecting a status code to indicate that no status
365 code was actually present.
366
367 1006
368
369 1006 is a reserved value and MUST NOT be set as a status code in a
370 Close control frame by an endpoint. It is designated for use in
371 applications expecting a status code to indicate that the
372 connection was closed abnormally, e.g., without sending or
373 receiving a Close control frame.
374
375 1007
376
377 1007 indicates that an endpoint is terminating the connection
378 because it has received data within a message that was not
379 consistent with the type of the message (e.g., non-UTF-8 [RFC3629]
380 data within a text message).
381
382 1008
383
384 1008 indicates that an endpoint is terminating the connection
385 because it has received a message that violates its policy. This
386 is a generic status code that can be returned when there is no
387 other more suitable status code (e.g., 1003 or 1009) or if there
388 is a need to hide specific details about the policy.
389
390 1009
391
392 1009 indicates that an endpoint is terminating the connection
393 because it has received a message that is too big for it to
394 process.
395
396 1010
397
398 1010 indicates that an endpoint (client) is terminating the
399 connection because it has expected the server to negotiate one or
400 more extension, but the server didn't return them in the response
401 message of the WebSocket handshake. The list of extensions that
402 are needed SHOULD appear in the /reason/ part of the Close frame.
403 Note that this status code is not used by the server, because it
404 can fail the WebSocket handshake instead.
405
406 1011
407
408 1011 indicates that a server is terminating the connection because
409 it encountered an unexpected condition that prevented it from
410 fulfilling the request.
411
412 1015
413
414 1015 is a reserved value and MUST NOT be set as a status code in a
415 Close control frame by an endpoint. It is designated for use in
416 applications expecting a status code to indicate that the
417 connection was closed due to a failure to perform a TLS handshake
418 (e.g., the server certificate can't be verified).
Andy Green687b0182011-02-26 11:04:01 +0000419*/
420
421enum lws_close_status {
422 LWS_CLOSE_STATUS_NOSTATUS = 0,
423 LWS_CLOSE_STATUS_NORMAL = 1000,
424 LWS_CLOSE_STATUS_GOINGAWAY = 1001,
425 LWS_CLOSE_STATUS_PROTOCOL_ERR = 1002,
426 LWS_CLOSE_STATUS_UNACCEPTABLE_OPCODE = 1003,
David Galeano2915a802013-01-09 15:26:08 +0800427 LWS_CLOSE_STATUS_RESERVED = 1004,
428 LWS_CLOSE_STATUS_NO_STATUS = 1005,
429 LWS_CLOSE_STATUS_ABNORMAL_CLOSE = 1006,
430 LWS_CLOSE_STATUS_INVALID_PAYLOAD = 1007,
431 LWS_CLOSE_STATUS_POLICY_VIOLATION = 1008,
432 LWS_CLOSE_STATUS_MESSAGE_TOO_LARGE = 1009,
433 LWS_CLOSE_STATUS_EXTENSION_REQUIRED = 1010,
Andy Greenb5b23192013-02-11 17:13:32 +0800434 LWS_CLOSE_STATUS_UNEXPECTED_CONDITION = 1011,
435 LWS_CLOSE_STATUS_TLS_FAILURE = 1015,
Andy Green687b0182011-02-26 11:04:01 +0000436};
437
Andy Green4e7a1332013-11-11 07:30:33 +0800438enum http_status {
kapejodce64fb02013-11-19 13:38:16 +0100439 HTTP_STATUS_OK = 200,
440
Andy Green4e7a1332013-11-11 07:30:33 +0800441 HTTP_STATUS_BAD_REQUEST = 400,
442 HTTP_STATUS_UNAUTHORIZED,
443 HTTP_STATUS_PAYMENT_REQUIRED,
444 HTTP_STATUS_FORBIDDEN,
445 HTTP_STATUS_NOT_FOUND,
446 HTTP_STATUS_METHOD_NOT_ALLOWED,
447 HTTP_STATUS_NOT_ACCEPTABLE,
448 HTTP_STATUS_PROXY_AUTH_REQUIRED,
449 HTTP_STATUS_REQUEST_TIMEOUT,
450 HTTP_STATUS_CONFLICT,
451 HTTP_STATUS_GONE,
452 HTTP_STATUS_LENGTH_REQUIRED,
453 HTTP_STATUS_PRECONDITION_FAILED,
454 HTTP_STATUS_REQ_ENTITY_TOO_LARGE,
455 HTTP_STATUS_REQ_URI_TOO_LONG,
456 HTTP_STATUS_UNSUPPORTED_MEDIA_TYPE,
457 HTTP_STATUS_REQ_RANGE_NOT_SATISFIABLE,
458 HTTP_STATUS_EXPECTATION_FAILED,
459
460 HTTP_STATUS_INTERNAL_SERVER_ERROR = 500,
461 HTTP_STATUS_NOT_IMPLEMENTED,
462 HTTP_STATUS_BAD_GATEWAY,
463 HTTP_STATUS_SERVICE_UNAVAILABLE,
464 HTTP_STATUS_GATEWAY_TIMEOUT,
465 HTTP_STATUS_HTTP_VERSION_NOT_SUPPORTED,
466};
467
Andy Green775c0dd2010-10-29 14:15:22 +0100468struct libwebsocket;
Andy Greenb45993c2010-12-18 15:13:50 +0000469struct libwebsocket_context;
Andy Green3182ece2013-01-20 17:08:31 +0800470/* needed even with extensions disabled for create context */
Andy Green46c2ea02011-03-22 09:04:01 +0000471struct libwebsocket_extension;
Andy Greenff95d7a2010-10-28 22:36:01 +0100472
Andy Green8f037e42010-12-19 22:13:26 +0000473/**
David Brooks6c6a3d32012-04-20 12:13:50 +0800474 * callback_function() - User server actions
Andy Green32375b72011-02-19 08:32:53 +0000475 * @context: Websockets context
Andy Green8f037e42010-12-19 22:13:26 +0000476 * @wsi: Opaque websocket instance pointer
477 * @reason: The reason for the call
478 * @user: Pointer to per-session user data allocated by library
479 * @in: Pointer used for some callback reasons
480 * @len: Length set for some callback reasons
481 *
482 * This callback is the way the user controls what is served. All the
483 * protocol detail is hidden and handled by the library.
Andy Green6964bb52011-01-23 16:50:33 +0000484 *
Andy Green8f037e42010-12-19 22:13:26 +0000485 * For each connection / session there is user data allocated that is
486 * pointed to by "user". You set the size of this user data area when
487 * the library is initialized with libwebsocket_create_server.
Andy Green6964bb52011-01-23 16:50:33 +0000488 *
Andy Green8f037e42010-12-19 22:13:26 +0000489 * You get an opportunity to initialize user data when called back with
490 * LWS_CALLBACK_ESTABLISHED reason.
491 *
Andy Green2b57a342013-02-06 15:15:25 +0900492 * LWS_CALLBACK_ESTABLISHED: after the server completes a handshake with
Andy Green90c7cbc2011-01-27 06:26:52 +0000493 * an incoming client
494 *
David Brooks80a44972012-04-20 12:18:47 +0800495 * LWS_CALLBACK_CLIENT_CONNECTION_ERROR: the request client connection has
496 * been unable to complete a handshake with the remote server
497 *
Andy Green2b57a342013-02-06 15:15:25 +0900498 * LWS_CALLBACK_CLIENT_FILTER_PRE_ESTABLISH: this is the last chance for the
Andy Greenb5b23192013-02-11 17:13:32 +0800499 * client user code to examine the http headers
500 * and decide to reject the connection. If the
501 * content in the headers is interesting to the
502 * client (url, etc) it needs to copy it out at
503 * this point since it will be destroyed before
504 * the CLIENT_ESTABLISHED call
Andy Green2b57a342013-02-06 15:15:25 +0900505 *
David Brooks80a44972012-04-20 12:18:47 +0800506 * LWS_CALLBACK_CLIENT_ESTABLISHED: after your client connection completed
Andy Green90c7cbc2011-01-27 06:26:52 +0000507 * a handshake with the remote server
Andy Green8f037e42010-12-19 22:13:26 +0000508 *
509 * LWS_CALLBACK_CLOSED: when the websocket session ends
510 *
Andy Green0c9563b2013-06-10 22:54:40 +0800511 * LWS_CALLBACK_CLOSED_HTTP: when a HTTP (non-websocket) session ends
512 *
Andy Green90c7cbc2011-01-27 06:26:52 +0000513 * LWS_CALLBACK_RECEIVE: data has appeared for this server endpoint from a
514 * remote client, it can be found at *in and is
515 * len bytes long
516 *
Andy Greena6cbece2011-01-27 20:06:03 +0000517 * LWS_CALLBACK_CLIENT_RECEIVE_PONG: if you elected to see PONG packets,
518 * they appear with this callback reason. PONG
519 * packets only exist in 04+ protocol
520 *
Andy Green90c7cbc2011-01-27 06:26:52 +0000521 * LWS_CALLBACK_CLIENT_RECEIVE: data has appeared from the server for the
522 * client connection, it can be found at *in and
523 * is len bytes long
Andy Green8f037e42010-12-19 22:13:26 +0000524 *
Andy Green6964bb52011-01-23 16:50:33 +0000525 * LWS_CALLBACK_HTTP: an http request has come from a client that is not
Andy Green8f037e42010-12-19 22:13:26 +0000526 * asking to upgrade the connection to a websocket
527 * one. This is a chance to serve http content,
528 * for example, to send a script to the client
529 * which will then open the websockets connection.
Andy Green6964bb52011-01-23 16:50:33 +0000530 * @in points to the URI path requested and
Andy Green8f037e42010-12-19 22:13:26 +0000531 * libwebsockets_serve_http_file() makes it very
532 * simple to send back a file to the client.
Andy Green24b588b2013-01-13 09:53:18 +0800533 * Normally after sending the file you are done
534 * with the http connection, since the rest of the
535 * activity will come by websockets from the script
536 * that was delivered by http, so you will want to
537 * return 1; to close and free up the connection.
538 * That's important because it uses a slot in the
539 * total number of client connections allowed set
540 * by MAX_CLIENTS.
Andy Green90c7cbc2011-01-27 06:26:52 +0000541 *
kapejodce64fb02013-11-19 13:38:16 +0100542 * LWS_CALLBACK_HTTP_BODY: the next @len bytes data from the http
543 * request body HTTP connection is now available in @in.
544 *
545 * LWS_CALLBACK_HTTP_BODY_COMPLETION: the expected amount of http request
546 * body has been delivered
547 *
Andy Green54cb3462013-02-14 22:23:54 +0800548 * LWS_CALLBACK_HTTP_WRITEABLE: you can write more down the http protocol
549 * link now.
550 *
Andy Greend280b6e2013-01-15 13:40:23 +0800551 * LWS_CALLBACK_HTTP_FILE_COMPLETION: a file requested to be send down
552 * http link has completed.
553 *
Andy Green9e4c2b62011-03-07 20:47:39 +0000554 * LWS_CALLBACK_CLIENT_WRITEABLE:
555 * LWS_CALLBACK_SERVER_WRITEABLE: If you call
Andy Green90c7cbc2011-01-27 06:26:52 +0000556 * libwebsocket_callback_on_writable() on a connection, you will
Andy Green9e4c2b62011-03-07 20:47:39 +0000557 * get one of these callbacks coming when the connection socket
558 * is able to accept another write packet without blocking.
559 * If it already was able to take another packet without blocking,
560 * you'll get this callback at the next call to the service loop
561 * function. Notice that CLIENTs get LWS_CALLBACK_CLIENT_WRITEABLE
562 * and servers get LWS_CALLBACK_SERVER_WRITEABLE.
Andy Greene7981dc2011-02-12 21:24:03 +0000563 *
Andy Green07034092011-02-13 08:37:12 +0000564 * LWS_CALLBACK_FILTER_NETWORK_CONNECTION: called when a client connects to
565 * the server at network level; the connection is accepted but then
566 * passed to this callback to decide whether to hang up immediately
Edwin van den Oetelaar8c8a8e12013-02-20 20:56:59 +0800567 * or not, based on the client IP. @in contains the connection
Alexandre Erwin Ittnerd578f572014-02-06 23:15:51 -0200568 * socket's descriptor. Since the client connection information is
569 * not available yet, @wsi still pointing to the main server socket.
570 * Return non-zero to terminate the connection before sending or
571 * receiving anything. Because this happens immediately after the
572 * network connection from the client, there's no websocket protocol
573 * selected yet so this callback is issued only to protocol 0.
Andy Green19895bc2013-11-09 11:59:56 +0800574 *
Alexandre Erwin Ittnerd578f572014-02-06 23:15:51 -0200575 * LWS_CALLBACK_SERVER_NEW_CLIENT_INSTANTIATED: A new client just had
576 * been connected, accepted, and instantiated into the pool. This
577 * callback allows setting any relevant property to it. Because this
578 * happens immediately after the instantiation of a new client,
579 * there's no websocket protocol selected yet so this callback is
580 * issued only to protocol 0. Only @wsi is defined, pointing to the
581 * new client, and the return value is ignored.
582 *
Andy Green19895bc2013-11-09 11:59:56 +0800583 * LWS_CALLBACK_FILTER_HTTP_CONNECTION: called when the request has
584 * been received and parsed from the client, but the response is
585 * not sent yet. Return non-zero to disallow the connection.
586 * @user is a pointer to the connection user space allocation,
587 * @in is the URI, eg, "/"
588 * In your handler you can use the public APIs
589 * lws_hdr_total_length() / lws_hdr_copy() to access all of the
590 * headers using the header enums lws_token_indexes from
591 * libwebsockets.h to check for and read the supported header
592 * presence and content before deciding to allow the http
593 * connection to proceed or to kill the connection.
Andy Green07034092011-02-13 08:37:12 +0000594 *
Andy Greenb5b23192013-02-11 17:13:32 +0800595 * LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION: called when the handshake has
596 * been received and parsed from the client, but the response is
597 * not sent yet. Return non-zero to disallow the connection.
Andy Green96d48fd2013-09-18 08:32:55 +0800598 * @user is a pointer to the connection user space allocation,
599 * @in is the requested protocol name
600 * In your handler you can use the public APIs
601 * lws_hdr_total_length() / lws_hdr_copy() to access all of the
602 * headers using the header enums lws_token_indexes from
603 * libwebsockets.h to check for and read the supported header
604 * presence and content before deciding to allow the handshake
605 * to proceed or to kill the connection.
Andy Greenc85619d2011-02-13 08:25:26 +0000606 *
Andy Greenb5b23192013-02-11 17:13:32 +0800607 * LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS: if configured for
608 * including OpenSSL support, this callback allows your user code
609 * to perform extra SSL_CTX_load_verify_locations() or similar
Andy Green0894bda2011-02-19 09:09:11 +0000610 * calls to direct OpenSSL where to find certificates the client
611 * can use to confirm the remote server identity. @user is the
612 * OpenSSL SSL_CTX*
Andy Greenc85619d2011-02-13 08:25:26 +0000613 *
Andy Greenc6bf2c22011-02-20 11:10:47 +0000614 * LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS: if configured for
615 * including OpenSSL support, this callback allows your user code
616 * to load extra certifcates into the server which allow it to
617 * verify the validity of certificates returned by clients. @user
618 * is the server's OpenSSL SSL_CTX*
619 *
Andy Green6901cb32011-02-21 08:06:47 +0000620 * LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION: if the
621 * libwebsockets context was created with the option
622 * LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT, then this
623 * callback is generated during OpenSSL verification of the cert
624 * sent from the client. It is sent to protocol[0] callback as
625 * no protocol has been negotiated on the connection yet.
626 * Notice that the libwebsockets context and wsi are both NULL
627 * during this callback. See
628 * http://www.openssl.org/docs/ssl/SSL_CTX_set_verify.html
629 * to understand more detail about the OpenSSL callback that
630 * generates this libwebsockets callback and the meanings of the
631 * arguments passed. In this callback, @user is the x509_ctx,
632 * @in is the ssl pointer and @len is preverify_ok
633 * Notice that this callback maintains libwebsocket return
634 * conventions, return 0 to mean the cert is OK or 1 to fail it.
635 * This also means that if you don't handle this callback then
636 * the default callback action of returning 0 allows the client
637 * certificates.
638 *
Andy Green385e7ad2011-03-01 21:06:02 +0000639 * LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER: this callback happens
640 * when a client handshake is being compiled. @user is NULL,
641 * @in is a char **, it's pointing to a char * which holds the
642 * next location in the header buffer where you can add
643 * headers, and @len is the remaining space in the header buffer,
644 * which is typically some hundreds of bytes. So, to add a canned
645 * cookie, your handler code might look similar to:
646 *
647 * char **p = (char **)in;
648 *
Andy Greenb5b23192013-02-11 17:13:32 +0800649 * if (len < 100)
650 * return 1;
Andy Green385e7ad2011-03-01 21:06:02 +0000651 *
652 * *p += sprintf(*p, "Cookie: a=b\x0d\x0a");
653 *
654 * return 0;
655 *
656 * Notice if you add anything, you just have to take care about
657 * the CRLF on the line you added. Obviously this callback is
658 * optional, if you don't handle it everything is fine.
659 *
Andy Greenb5b23192013-02-11 17:13:32 +0800660 * Notice the callback is coming to protocols[0] all the time,
Andy Green385e7ad2011-03-01 21:06:02 +0000661 * because there is no specific protocol handshook yet.
662 *
Andy Greenb5b23192013-02-11 17:13:32 +0800663 * LWS_CALLBACK_CONFIRM_EXTENSION_OKAY: When the server handshake code
Andy Greenc5114822011-03-06 10:29:35 +0000664 * sees that it does support a requested extension, before
665 * accepting the extension by additing to the list sent back to
666 * the client it gives this callback just to check that it's okay
667 * to use that extension. It calls back to the requested protocol
668 * and with @in being the extension name, @len is 0 and @user is
669 * valid. Note though at this time the ESTABLISHED callback hasn't
670 * happened yet so if you initialize @user content there, @user
671 * content during this callback might not be useful for anything.
672 * Notice this callback comes to protocols[0].
673 *
Andy Greenc6517fa2011-03-06 13:15:29 +0000674 * LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED: When a client
675 * connection is being prepared to start a handshake to a server,
676 * each supported extension is checked with protocols[0] callback
677 * with this reason, giving the user code a chance to suppress the
678 * claim to support that extension by returning non-zero. If
679 * unhandled, by default 0 will be returned and the extension
680 * support included in the header to the server. Notice this
681 * callback comes to protocols[0].
682 *
Andy Greena7109e62013-02-11 12:05:54 +0800683 * LWS_CALLBACK_PROTOCOL_INIT: One-time call per protocol so it can
684 * do initial setup / allocations etc
685 *
686 * LWS_CALLBACK_PROTOCOL_DESTROY: One-time call per protocol indicating
687 * this protocol won't get used at all after this callback, the
688 * context is getting destroyed. Take the opportunity to
689 * deallocate everything that was allocated by the protocol.
690 *
Andy Green76b6ea12014-02-15 19:25:50 +0800691 * LWS_CALLBACK_WSI_CREATE: outermost (earliest) wsi create notification
692 *
693 * LWS_CALLBACK_WSI_DESTROY: outermost (latest) wsi destroy notification
694 *
Michael Haberler8284cf12014-02-15 20:33:46 +0800695 * The next five reasons are optional and only need taking care of if you
Andy Greenb5b23192013-02-11 17:13:32 +0800696 * will be integrating libwebsockets sockets into an external polling
697 * array.
698 *
Michael Haberler8284cf12014-02-15 20:33:46 +0800699 * For these calls, @in points to a struct libwebsocket_pollargs that
700 * contains @fd, @events and @prev_events members
701 *
Andy Greenb5b23192013-02-11 17:13:32 +0800702 * LWS_CALLBACK_ADD_POLL_FD: libwebsocket deals with its poll() loop
703 * internally, but in the case you are integrating with another
704 * server you will need to have libwebsocket sockets share a
705 * polling array with the other server. This and the other
706 * POLL_FD related callbacks let you put your specialized
707 * poll array interface code in the callback for protocol 0, the
708 * first protocol you support, usually the HTTP protocol in the
Michael Haberler8284cf12014-02-15 20:33:46 +0800709 * serving case.
710 * This callback happens when a socket needs to be
711 * added to the polling loop: @in points to a struct
712 * libwebsocket_pollargs; the @fd member of the struct is the file
713 * descriptor, and @events contains the active events.
714 *
715 * If you are using the internal polling loop (the "service"
716 * callback), you can just ignore these callbacks.
Andy Greene7981dc2011-02-12 21:24:03 +0000717 *
Andy Greenb5b23192013-02-11 17:13:32 +0800718 * LWS_CALLBACK_DEL_POLL_FD: This callback happens when a socket descriptor
Andy Green50097dd2013-02-15 22:36:30 +0800719 * needs to be removed from an external polling array. @in is
Michael Haberler8284cf12014-02-15 20:33:46 +0800720 * again the struct libwebsocket_pollargs containing the @fd member
721 * to be removed. If you are using the internal polling
Andy Greenb5b23192013-02-11 17:13:32 +0800722 * loop, you can just ignore it.
Andy Greene7981dc2011-02-12 21:24:03 +0000723 *
Michael Haberler8284cf12014-02-15 20:33:46 +0800724 * LWS_CALLBACK_CHANGE_MODE_POLL_FD: This callback happens when
725 * libwebsockets wants to modify the events for a connectiion.
726 * @in is the struct libwebsocket_pollargs with the @fd to change.
727 * The new event mask is in @events member and the old mask is in
728 * the @prev_events member.
729 * If you are using the internal polling loop, you can just ignore
730 * it.
Andy Greene7981dc2011-02-12 21:24:03 +0000731 *
Michael Haberler8284cf12014-02-15 20:33:46 +0800732 * LWS_CALLBACK_LOCK_POLL:
733 * LWS_CALLBACK_UNLOCK_POLL: These allow the external poll changes driven
734 * by libwebsockets to participate in an external thread locking
735 * scheme around the changes, so the whole thing is threadsafe.
Andy Green8f037e42010-12-19 22:13:26 +0000736 */
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800737LWS_VISIBLE LWS_EXTERN int callback(struct libwebsocket_context *context,
Andy Green62c54d22011-02-14 09:14:25 +0000738 struct libwebsocket *wsi,
Andy Green6964bb52011-01-23 16:50:33 +0000739 enum libwebsocket_callback_reasons reason, void *user,
Andy Green8f037e42010-12-19 22:13:26 +0000740 void *in, size_t len);
741
Andy Greenb5b23192013-02-11 17:13:32 +0800742typedef int (callback_function)(struct libwebsocket_context *context,
David Brooks6c6a3d32012-04-20 12:13:50 +0800743 struct libwebsocket *wsi,
744 enum libwebsocket_callback_reasons reason, void *user,
745 void *in, size_t len);
746
Andy Green3182ece2013-01-20 17:08:31 +0800747#ifndef LWS_NO_EXTENSIONS
Andy Green57b4e9a2011-03-06 13:14:46 +0000748/**
David Brooks6c6a3d32012-04-20 12:13:50 +0800749 * extension_callback_function() - Hooks to allow extensions to operate
Andy Green57b4e9a2011-03-06 13:14:46 +0000750 * @context: Websockets context
Andy Green46c2ea02011-03-22 09:04:01 +0000751 * @ext: This extension
Andy Green57b4e9a2011-03-06 13:14:46 +0000752 * @wsi: Opaque websocket instance pointer
753 * @reason: The reason for the call
754 * @user: Pointer to per-session user data allocated by library
755 * @in: Pointer used for some callback reasons
756 * @len: Length set for some callback reasons
757 *
758 * Each extension that is active on a particular connection receives
759 * callbacks during the connection lifetime to allow the extension to
760 * operate on websocket data and manage itself.
761 *
762 * Libwebsockets takes care of allocating and freeing "user" memory for
763 * each active extension on each connection. That is what is pointed to
764 * by the @user parameter.
765 *
766 * LWS_EXT_CALLBACK_CONSTRUCT: called when the server has decided to
767 * select this extension from the list provided by the client,
768 * just before the server will send back the handshake accepting
769 * the connection with this extension active. This gives the
770 * extension a chance to initialize its connection context found
771 * in @user.
772 *
Andy Greenb5b23192013-02-11 17:13:32 +0800773 * LWS_EXT_CALLBACK_CLIENT_CONSTRUCT: same as LWS_EXT_CALLBACK_CONSTRUCT
Andy Green2366b1c2011-03-06 13:15:31 +0000774 * but called when client is instantiating this extension. Some
775 * extensions will work the same on client and server side and then
776 * you can just merge handlers for both CONSTRUCTS.
777 *
Andy Green57b4e9a2011-03-06 13:14:46 +0000778 * LWS_EXT_CALLBACK_DESTROY: called when the connection the extension was
779 * being used on is about to be closed and deallocated. It's the
780 * last chance for the extension to deallocate anything it has
781 * allocated in the user data (pointed to by @user) before the
Andy Green2366b1c2011-03-06 13:15:31 +0000782 * user data is deleted. This same callback is used whether you
783 * are in client or server instantiation context.
Andy Green57b4e9a2011-03-06 13:14:46 +0000784 *
785 * LWS_EXT_CALLBACK_PACKET_RX_PREPARSE: when this extension was active on
786 * a connection, and a packet of data arrived at the connection,
787 * it is passed to this callback to give the extension a chance to
788 * change the data, eg, decompress it. @user is pointing to the
789 * extension's private connection context data, @in is pointing
790 * to an lws_tokens struct, it consists of a char * pointer called
791 * token, and an int called token_len. At entry, these are
792 * set to point to the received buffer and set to the content
793 * length. If the extension will grow the content, it should use
794 * a new buffer allocated in its private user context data and
795 * set the pointed-to lws_tokens members to point to its buffer.
796 *
797 * LWS_EXT_CALLBACK_PACKET_TX_PRESEND: this works the same way as
798 * LWS_EXT_CALLBACK_PACKET_RX_PREPARSE above, except it gives the
799 * extension a chance to change websocket data just before it will
800 * be sent out. Using the same lws_token pointer scheme in @in,
801 * the extension can change the buffer and the length to be
802 * transmitted how it likes. Again if it wants to grow the
803 * buffer safely, it should copy the data into its own buffer and
804 * set the lws_tokens token pointer to it.
805 */
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800806LWS_VISIBLE LWS_EXTERN int extension_callback(struct libwebsocket_context *context,
Andy Green46c2ea02011-03-22 09:04:01 +0000807 struct libwebsocket_extension *ext,
Andy Green57b4e9a2011-03-06 13:14:46 +0000808 struct libwebsocket *wsi,
Andy Greenb5b23192013-02-11 17:13:32 +0800809 enum libwebsocket_extension_callback_reasons reason,
810 void *user, void *in, size_t len);
Andy Green57b4e9a2011-03-06 13:14:46 +0000811
Andy Greenb5b23192013-02-11 17:13:32 +0800812typedef int (extension_callback_function)(struct libwebsocket_context *context,
David Brooks6c6a3d32012-04-20 12:13:50 +0800813 struct libwebsocket_extension *ext,
814 struct libwebsocket *wsi,
Andy Greenb5b23192013-02-11 17:13:32 +0800815 enum libwebsocket_extension_callback_reasons reason,
816 void *user, void *in, size_t len);
Andy Green3182ece2013-01-20 17:08:31 +0800817#endif
Andy Green57b4e9a2011-03-06 13:14:46 +0000818
Andy Green4f3943a2010-11-12 10:44:16 +0000819/**
Andy Green6964bb52011-01-23 16:50:33 +0000820 * struct libwebsocket_protocols - List of protocols and handlers server
821 * supports.
Andy Green4f3943a2010-11-12 10:44:16 +0000822 * @name: Protocol name that must match the one given in the client
Andy Green6964bb52011-01-23 16:50:33 +0000823 * Javascript new WebSocket(url, 'protocol') name
Andy Green4f3943a2010-11-12 10:44:16 +0000824 * @callback: The service callback used for this protocol. It allows the
Andy Green6964bb52011-01-23 16:50:33 +0000825 * service action for an entire protocol to be encapsulated in
826 * the protocol-specific callback
Andy Green4f3943a2010-11-12 10:44:16 +0000827 * @per_session_data_size: Each new connection using this protocol gets
Andy Green6964bb52011-01-23 16:50:33 +0000828 * this much memory allocated on connection establishment and
829 * freed on connection takedown. A pointer to this per-connection
830 * allocation is passed into the callback in the 'user' parameter
Andy Green54495112013-02-06 21:10:16 +0900831 * @rx_buffer_size: if you want atomic frames delivered to the callback, you
Andy Greenb5b23192013-02-11 17:13:32 +0800832 * should set this to the size of the biggest legal frame that
833 * you support. If the frame size is exceeded, there is no
834 * error, but the buffer will spill to the user callback when
835 * full, which you can detect by using
836 * libwebsockets_remaining_packet_payload(). Notice that you
837 * just talk about frame size here, the LWS_SEND_BUFFER_PRE_PADDING
838 * and post-padding are automatically also allocated on top.
Andy Green1f4267b2013-10-17 08:09:19 +0800839 * @no_buffer_all_partial_tx: Leave at zero if you want the library to take
840 * care of all partial tx for you. It's useful if you only have
841 * small tx packets and the chance of any truncated send is small
842 * enough any additional malloc / buffering overhead is less
843 * painful than writing the code to deal with partial sends. For
844 * protocols where you stream big blocks, set to nonzero and use
845 * the return value from libwebsocket_write() to manage how much
846 * got send yourself.
Andy Greenb45993c2010-12-18 15:13:50 +0000847 * @owning_server: the server init call fills in this opaque pointer when
Andy Green6964bb52011-01-23 16:50:33 +0000848 * registering this protocol with the server.
Andy Greenb45993c2010-12-18 15:13:50 +0000849 * @protocol_index: which protocol we are starting from zero
Andy Greene77ddd82010-11-13 10:03:47 +0000850 *
Andy Green6964bb52011-01-23 16:50:33 +0000851 * This structure represents one protocol supported by the server. An
852 * array of these structures is passed to libwebsocket_create_server()
853 * allows as many protocols as you like to be handled by one server.
Andy Green4f3943a2010-11-12 10:44:16 +0000854 */
855
856struct libwebsocket_protocols {
857 const char *name;
David Brooks6c6a3d32012-04-20 12:13:50 +0800858 callback_function *callback;
Andy Green4f3943a2010-11-12 10:44:16 +0000859 size_t per_session_data_size;
Andy Green54495112013-02-06 21:10:16 +0900860 size_t rx_buffer_size;
Andy Green1f4267b2013-10-17 08:09:19 +0800861 int no_buffer_all_partial_tx;
Andy Greenb45993c2010-12-18 15:13:50 +0000862
863 /*
864 * below are filled in on server init and can be left uninitialized,
865 * no need for user to use them directly either
866 */
Andy Green6964bb52011-01-23 16:50:33 +0000867
Andy Greenb45993c2010-12-18 15:13:50 +0000868 struct libwebsocket_context *owning_server;
Andy Greenb45993c2010-12-18 15:13:50 +0000869 int protocol_index;
Andy Green4f3943a2010-11-12 10:44:16 +0000870};
871
Andy Green3182ece2013-01-20 17:08:31 +0800872#ifndef LWS_NO_EXTENSIONS
Andy Greend6e09112011-03-05 16:12:15 +0000873/**
874 * struct libwebsocket_extension - An extension we know how to cope with
875 *
876 * @name: Formal extension name, eg, "deflate-stream"
877 * @callback: Service callback
Andy Greenb5b23192013-02-11 17:13:32 +0800878 * @per_session_data_size: Libwebsockets will auto-malloc this much
879 * memory for the use of the extension, a pointer
Andy Greend6e09112011-03-05 16:12:15 +0000880 * to it comes in the @user callback parameter
Peter Pentchevc74964e2013-02-07 16:17:13 +0200881 * @per_context_private_data: Optional storage for this extension that
Andy Greenb5b23192013-02-11 17:13:32 +0800882 * is per-context, so it can track stuff across
883 * all sessions, etc, if it wants
Andy Greend6e09112011-03-05 16:12:15 +0000884 */
885
886struct libwebsocket_extension {
887 const char *name;
David Brooks6c6a3d32012-04-20 12:13:50 +0800888 extension_callback_function *callback;
Andy Greend6e09112011-03-05 16:12:15 +0000889 size_t per_session_data_size;
Andy Greenb5b23192013-02-11 17:13:32 +0800890 void *per_context_private_data;
Andy Greend6e09112011-03-05 16:12:15 +0000891};
Andy Green3182ece2013-01-20 17:08:31 +0800892#endif
Andy Greend6e09112011-03-05 16:12:15 +0000893
Andy Green1b265272013-02-09 14:01:09 +0800894/**
895 * struct lws_context_creation_info: parameters to create context with
896 *
897 * @port: Port to listen on... you can use 0 to suppress listening on
898 * any port, that's what you want if you are not running a
899 * websocket server at all but just using it as a client
Andy Green7a506ba2013-02-12 10:13:02 +0800900 * @iface: NULL to bind the listen socket to all interfaces, or the
Andy Green1b265272013-02-09 14:01:09 +0800901 * interface name, eg, "eth2"
902 * @protocols: Array of structures listing supported protocols and a protocol-
903 * specific callback for each one. The list is ended with an
904 * entry that has a NULL callback pointer.
905 * It's not const because we write the owning_server member
906 * @extensions: NULL or array of libwebsocket_extension structs listing the
907 * extensions this context supports. If you configured with
908 * --without-extensions, you should give NULL here.
909 * @ssl_cert_filepath: If libwebsockets was compiled to use ssl, and you want
910 * to listen using SSL, set to the filepath to fetch the
911 * server cert from, otherwise NULL for unencrypted
912 * @ssl_private_key_filepath: filepath to private key if wanting SSL mode,
913 * else ignored
914 * @ssl_ca_filepath: CA certificate filepath or NULL
Andy Green2672fb22013-02-22 09:54:35 +0800915 * @ssl_cipher_list: List of valid ciphers to use (eg,
916 * "RC4-MD5:RC4-SHA:AES128-SHA:AES256-SHA:HIGH:!DSS:!aNULL"
917 * or you can leave it as NULL to get "DEFAULT"
Andy Green1b265272013-02-09 14:01:09 +0800918 * @gid: group id to change to after setting listen socket, or -1.
919 * @uid: user id to change to after setting listen socket, or -1.
920 * @options: 0, or LWS_SERVER_OPTION_DEFEAT_CLIENT_MASK
921 * @user: optional user pointer that can be recovered via the context
Andy Greenb5b23192013-02-11 17:13:32 +0800922 * pointer using libwebsocket_context_user
Andy Greena690cd02013-02-09 12:25:31 +0800923 * @ka_time: 0 for no keepalive, otherwise apply this keepalive timeout to
924 * all libwebsocket sockets, client or server
925 * @ka_probes: if ka_time was nonzero, after the timeout expires how many
926 * times to try to get a response from the peer before giving up
927 * and killing the connection
928 * @ka_interval: if ka_time was nonzero, how long to wait before each ka_probes
929 * attempt
Andy Green1b265272013-02-09 14:01:09 +0800930 */
931
932struct lws_context_creation_info {
933 int port;
Joakim Soderberg63ff1202013-02-11 17:52:23 +0100934 const char *iface;
Andy Green1b265272013-02-09 14:01:09 +0800935 struct libwebsocket_protocols *protocols;
936 struct libwebsocket_extension *extensions;
937 const char *ssl_cert_filepath;
938 const char *ssl_private_key_filepath;
939 const char *ssl_ca_filepath;
Andy Green2672fb22013-02-22 09:54:35 +0800940 const char *ssl_cipher_list;
Patrick Gansterer148b9452014-02-28 02:31:23 +0100941 const char *http_proxy_address;
942 unsigned int http_proxy_port;
Andy Green1b265272013-02-09 14:01:09 +0800943 int gid;
944 int uid;
945 unsigned int options;
946 void *user;
Andy Greena690cd02013-02-09 12:25:31 +0800947 int ka_time;
948 int ka_probes;
949 int ka_interval;
950
Andy Green1b265272013-02-09 14:01:09 +0800951};
952
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800953LWS_VISIBLE LWS_EXTERN
Andy Greenb5b23192013-02-11 17:13:32 +0800954void lws_set_log_level(int level,
955 void (*log_emit_function)(int level, const char *line));
Andy Greend6e09112011-03-05 16:12:15 +0000956
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800957LWS_VISIBLE LWS_EXTERN void
Andy Greenc11db202013-01-19 11:12:16 +0800958lwsl_emit_syslog(int level, const char *line);
959
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800960LWS_VISIBLE LWS_EXTERN struct libwebsocket_context *
Andy Green1b265272013-02-09 14:01:09 +0800961libwebsocket_create_context(struct lws_context_creation_info *info);
shysb4e800e2013-10-24 22:12:03 +0800962
963LWS_VISIBLE LWS_EXTERN int
964libwebsocket_set_proxy(struct libwebsocket_context *context, const char *proxy);
Andy Greenff95d7a2010-10-28 22:36:01 +0100965
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800966LWS_VISIBLE LWS_EXTERN void
Darin Willitsc19456f2011-02-14 17:52:39 +0000967libwebsocket_context_destroy(struct libwebsocket_context *context);
Andy Green6964bb52011-01-23 16:50:33 +0000968
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800969LWS_VISIBLE LWS_EXTERN int
Darin Willitsc19456f2011-02-14 17:52:39 +0000970libwebsocket_service(struct libwebsocket_context *context, int timeout_ms);
Andy Greene92cd172011-01-19 13:11:55 +0000971
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800972LWS_VISIBLE LWS_EXTERN int
Darin Willitsc19456f2011-02-14 17:52:39 +0000973libwebsocket_service_fd(struct libwebsocket_context *context,
Andy Green9f990342011-02-12 11:57:45 +0000974 struct pollfd *pollfd);
975
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800976LWS_VISIBLE LWS_EXTERN void *
Alon Levy0291eb32012-10-19 11:21:56 +0200977libwebsocket_context_user(struct libwebsocket_context *context);
978
Andy Green9beedc12013-09-18 08:47:15 +0800979enum pending_timeout {
980 NO_PENDING_TIMEOUT = 0,
981 PENDING_TIMEOUT_AWAITING_PROXY_RESPONSE,
Andy Green5dc62ea2013-09-20 20:26:12 +0800982 PENDING_TIMEOUT_AWAITING_CONNECT_RESPONSE,
Andy Green9beedc12013-09-18 08:47:15 +0800983 PENDING_TIMEOUT_ESTABLISH_WITH_SERVER,
984 PENDING_TIMEOUT_AWAITING_SERVER_RESPONSE,
985 PENDING_TIMEOUT_AWAITING_PING,
986 PENDING_TIMEOUT_CLOSE_ACK,
987 PENDING_TIMEOUT_AWAITING_EXTENSION_CONNECT_RESPONSE,
988 PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE,
989 PENDING_TIMEOUT_SSL_ACCEPT,
kapejodce64fb02013-11-19 13:38:16 +0100990 PENDING_TIMEOUT_HTTP_CONTENT,
Andy Green9beedc12013-09-18 08:47:15 +0800991};
992
Patrick Gansterer2ff69552014-02-26 18:51:05 +0100993LWS_VISIBLE LWS_EXTERN void
Andy Green9beedc12013-09-18 08:47:15 +0800994libwebsocket_set_timeout(struct libwebsocket *wsi,
995 enum pending_timeout reason, int secs);
996
Andy Green4ea60062010-10-30 12:15:07 +0100997/*
998 * IMPORTANT NOTICE!
Andy Greene77ddd82010-11-13 10:03:47 +0000999 *
Andy Green5fd8a5e2010-10-31 11:57:17 +00001000 * When sending with websocket protocol (LWS_WRITE_TEXT or LWS_WRITE_BINARY)
1001 * the send buffer has to have LWS_SEND_BUFFER_PRE_PADDING bytes valid BEFORE
Andy Green4ea60062010-10-30 12:15:07 +01001002 * buf, and LWS_SEND_BUFFER_POST_PADDING bytes valid AFTER (buf + len).
Andy Greene77ddd82010-11-13 10:03:47 +00001003 *
Andy Green4ea60062010-10-30 12:15:07 +01001004 * This allows us to add protocol info before and after the data, and send as
1005 * one packet on the network without payload copying, for maximum efficiency.
Andy Greene77ddd82010-11-13 10:03:47 +00001006 *
Andy Green4ea60062010-10-30 12:15:07 +01001007 * So for example you need this kind of code to use libwebsocket_write with a
Andy Greene77ddd82010-11-13 10:03:47 +00001008 * 128-byte payload
1009 *
Andy Greenab990e42010-10-31 12:42:52 +00001010 * char buf[LWS_SEND_BUFFER_PRE_PADDING + 128 + LWS_SEND_BUFFER_POST_PADDING];
Andy Greene77ddd82010-11-13 10:03:47 +00001011 *
Andy Greenab990e42010-10-31 12:42:52 +00001012 * // fill your part of the buffer... for example here it's all zeros
1013 * memset(&buf[LWS_SEND_BUFFER_PRE_PADDING], 0, 128);
Andy Greene77ddd82010-11-13 10:03:47 +00001014 *
Alex Rhatushnyak9f2246e2013-03-09 12:01:47 +08001015 * libwebsocket_write(wsi, &buf[LWS_SEND_BUFFER_PRE_PADDING], 128,
1016 * LWS_WRITE_TEXT);
Andy Greene77ddd82010-11-13 10:03:47 +00001017 *
Andy Green5fd8a5e2010-10-31 11:57:17 +00001018 * When sending LWS_WRITE_HTTP, there is no protocol addition and you can just
1019 * use the whole buffer without taking care of the above.
Andy Green4ea60062010-10-30 12:15:07 +01001020 */
1021
Andy Green687b0182011-02-26 11:04:01 +00001022/*
1023 * this is the frame nonce plus two header plus 8 length
Andy Greena41314f2011-05-23 10:00:03 +01001024 * there's an additional two for mux extension per mux nesting level
Andy Green687b0182011-02-26 11:04:01 +00001025 * 2 byte prepend on close will already fit because control frames cannot use
1026 * the big length style
1027 */
Andy Green4739e5c2011-01-22 12:51:57 +00001028
Andy Greena41314f2011-05-23 10:00:03 +01001029#define LWS_SEND_BUFFER_PRE_PADDING (4 + 10 + (2 * MAX_MUX_RECURSION))
David Galeanoe2cf9922013-01-09 18:06:55 +08001030#define LWS_SEND_BUFFER_POST_PADDING 4
Andy Green4ea60062010-10-30 12:15:07 +01001031
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001032LWS_VISIBLE LWS_EXTERN int
Andy Greene77ddd82010-11-13 10:03:47 +00001033libwebsocket_write(struct libwebsocket *wsi, unsigned char *buf, size_t len,
Andy Green5fd8a5e2010-10-31 11:57:17 +00001034 enum libwebsocket_write_protocol protocol);
Andy Greena2b0ab02010-11-11 12:28:29 +00001035
Gabriel Gritsch890f8e92014-02-15 16:20:25 +08001036/* helper for case where buffer may be const */
1037static inline int
1038libwebsocket_write_http(struct libwebsocket *wsi,
1039 const unsigned char *buf, size_t len)
1040{
1041 return libwebsocket_write(wsi, (unsigned char *)buf, len,
1042 LWS_WRITE_HTTP);
1043}
1044
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001045LWS_VISIBLE LWS_EXTERN int
Andy Greend280b6e2013-01-15 13:40:23 +08001046libwebsockets_serve_http_file(struct libwebsocket_context *context,
1047 struct libwebsocket *wsi, const char *file,
Andy Green79002562013-11-09 11:04:35 +08001048 const char *content_type, const char *other_headers);
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001049LWS_VISIBLE LWS_EXTERN int
Andy Greend280b6e2013-01-15 13:40:23 +08001050libwebsockets_serve_http_file_fragment(struct libwebsocket_context *context,
1051 struct libwebsocket *wsi);
Andy Greenab990e42010-10-31 12:42:52 +00001052
Joakim Soderberg7b7b7b22014-02-24 18:23:00 +01001053LWS_VISIBLE LWS_EXTERN int libwebsockets_return_http_status(
Andy Green4e7a1332013-11-11 07:30:33 +08001054 struct libwebsocket_context *context,
1055 struct libwebsocket *wsi, unsigned int code,
1056 const char *html_body);
1057
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001058LWS_VISIBLE LWS_EXTERN const struct libwebsocket_protocols *
Andy Greenb45993c2010-12-18 15:13:50 +00001059libwebsockets_get_protocol(struct libwebsocket *wsi);
1060
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001061LWS_VISIBLE LWS_EXTERN int
Darin Willitsc19456f2011-02-14 17:52:39 +00001062libwebsocket_callback_on_writable(struct libwebsocket_context *context,
Andy Green62c54d22011-02-14 09:14:25 +00001063 struct libwebsocket *wsi);
Andy Green90c7cbc2011-01-27 06:26:52 +00001064
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001065LWS_VISIBLE LWS_EXTERN int
Andy Green90c7cbc2011-01-27 06:26:52 +00001066libwebsocket_callback_on_writable_all_protocol(
1067 const struct libwebsocket_protocols *protocol);
1068
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001069LWS_VISIBLE LWS_EXTERN int
Andy Greene39e6ef2014-02-15 16:36:38 +08001070libwebsocket_callback_all_protocol(
1071 const struct libwebsocket_protocols *protocol, int reason);
1072
1073LWS_VISIBLE LWS_EXTERN int
Andy Greena6cbece2011-01-27 20:06:03 +00001074libwebsocket_get_socket_fd(struct libwebsocket *wsi);
Andy Green90c7cbc2011-01-27 06:26:52 +00001075
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001076LWS_VISIBLE LWS_EXTERN int
Andy Green82c3d542011-03-07 21:16:31 +00001077libwebsocket_is_final_fragment(struct libwebsocket *wsi);
1078
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001079LWS_VISIBLE LWS_EXTERN unsigned char
David Galeanoe2cf9922013-01-09 18:06:55 +08001080libwebsocket_get_reserved_bits(struct libwebsocket *wsi);
1081
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001082LWS_VISIBLE LWS_EXTERN int
Andy Green90c7cbc2011-01-27 06:26:52 +00001083libwebsocket_rx_flow_control(struct libwebsocket *wsi, int enable);
1084
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001085LWS_VISIBLE LWS_EXTERN void
Andy Greenb55451c2013-03-16 12:32:27 +08001086libwebsocket_rx_flow_allow_all_protocol(
1087 const struct libwebsocket_protocols *protocol);
1088
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001089LWS_VISIBLE LWS_EXTERN size_t
Andy Green38e57bb2011-01-19 12:20:27 +00001090libwebsockets_remaining_packet_payload(struct libwebsocket *wsi);
1091
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001092LWS_VISIBLE LWS_EXTERN struct libwebsocket *
Andy Green4739e5c2011-01-22 12:51:57 +00001093libwebsocket_client_connect(struct libwebsocket_context *clients,
1094 const char *address,
1095 int port,
Andy Green90c7cbc2011-01-27 06:26:52 +00001096 int ssl_connection,
Andy Green4739e5c2011-01-22 12:51:57 +00001097 const char *path,
1098 const char *host,
1099 const char *origin,
Andy Greenbfb051f2011-02-09 08:49:14 +00001100 const char *protocol,
1101 int ietf_version_or_minus_one);
Andy Green4739e5c2011-01-22 12:51:57 +00001102
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001103LWS_VISIBLE LWS_EXTERN struct libwebsocket *
David Brooks2c60d952012-04-20 12:19:01 +08001104libwebsocket_client_connect_extended(struct libwebsocket_context *clients,
1105 const char *address,
1106 int port,
1107 int ssl_connection,
1108 const char *path,
1109 const char *host,
1110 const char *origin,
1111 const char *protocol,
1112 int ietf_version_or_minus_one,
1113 void *userdata);
1114
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001115LWS_VISIBLE LWS_EXTERN const char *
Darin Willitsc19456f2011-02-14 17:52:39 +00001116libwebsocket_canonical_hostname(struct libwebsocket_context *context);
Andy Green2ac5a6f2011-01-28 10:00:18 +00001117
Andy Green4739e5c2011-01-22 12:51:57 +00001118
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001119LWS_VISIBLE LWS_EXTERN void
Andy Greenaaf0b9f2013-01-30 08:12:20 +08001120libwebsockets_get_peer_addresses(struct libwebsocket_context *context,
1121 struct libwebsocket *wsi, int fd, char *name, int name_len,
Andy Green07034092011-02-13 08:37:12 +00001122 char *rip, int rip_len);
1123
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001124LWS_VISIBLE LWS_EXTERN int
Andy Green8acc1942011-03-07 20:47:40 +00001125libwebsockets_get_random(struct libwebsocket_context *context,
1126 void *buf, int len);
1127
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001128LWS_VISIBLE LWS_EXTERN int
Andy Green279a3032013-01-17 10:05:39 +08001129lws_daemonize(const char *_lock_path);
1130
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001131LWS_VISIBLE LWS_EXTERN int
Andy Green043a0ba2011-04-25 23:54:11 +08001132lws_send_pipe_choked(struct libwebsocket *wsi);
1133
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001134LWS_VISIBLE LWS_EXTERN int
Andy Green2fd3f2f2013-01-18 09:49:20 +08001135lws_frame_is_binary(struct libwebsocket *wsi);
1136
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001137LWS_VISIBLE LWS_EXTERN unsigned char *
Andy Green2836c642011-03-07 20:47:41 +00001138libwebsockets_SHA1(const unsigned char *d, size_t n, unsigned char *md);
1139
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001140LWS_VISIBLE LWS_EXTERN int
Andy Greenf94e0582011-05-14 15:07:56 +02001141lws_b64_encode_string(const char *in, int in_len, char *out, int out_size);
1142
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001143LWS_VISIBLE LWS_EXTERN int
Andy Greenf94e0582011-05-14 15:07:56 +02001144lws_b64_decode_string(const char *in, char *out, int out_size);
1145
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001146LWS_VISIBLE LWS_EXTERN const char *
Andy Green7b405452013-02-01 10:50:15 +08001147lws_get_library_version(void);
1148
Andy Green16ab3182013-02-10 18:02:31 +08001149/* access to headers... only valid while headers valid */
1150
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001151LWS_VISIBLE LWS_EXTERN int
Andy Green16ab3182013-02-10 18:02:31 +08001152lws_hdr_total_length(struct libwebsocket *wsi, enum lws_token_indexes h);
1153
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001154LWS_VISIBLE LWS_EXTERN int
Andy Greenb5b23192013-02-11 17:13:32 +08001155lws_hdr_copy(struct libwebsocket *wsi, char *dest, int len,
1156 enum lws_token_indexes h);
Andy Green16ab3182013-02-10 18:02:31 +08001157
Andy Greenea0642a2013-01-29 06:52:00 +08001158/*
1159 * Note: this is not normally needed as a user api. It's provided in case it is
1160 * useful when integrating with other app poll loop service code.
1161 */
1162
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001163LWS_VISIBLE LWS_EXTERN int
Andy Greenea0642a2013-01-29 06:52:00 +08001164libwebsocket_read(struct libwebsocket_context *context,
1165 struct libwebsocket *wsi,
1166 unsigned char *buf, size_t len);
1167
Andy Green3182ece2013-01-20 17:08:31 +08001168#ifndef LWS_NO_EXTENSIONS
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001169LWS_VISIBLE LWS_EXTERN struct libwebsocket_extension *libwebsocket_get_internal_extensions();
Andy Green3182ece2013-01-20 17:08:31 +08001170#endif
Andy Green4cd87a02011-03-06 13:15:32 +00001171
Peter Hinz56885f32011-03-02 22:03:47 +00001172#ifdef __cplusplus
1173}
1174#endif
Andy Greena11fe942011-09-25 10:30:26 +01001175
Andy Greenab990e42010-10-31 12:42:52 +00001176#endif