blob: 00d38e1c04c8376939dc7dea856d47c51a79ab0e [file] [log] [blame]
Andy Greenf7ee5492011-02-13 09:04:21 +00001<h2>libwebsockets_hangup_on_client - Server calls to terminate client connection</h2>
2<i>void</i>
3<b>libwebsockets_hangup_on_client</b>
Peter Hinz56885f32011-03-02 22:03:47 +00004(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Greenf7ee5492011-02-13 09:04:21 +00005<i>int</i> <b>fd</b>)
6<h3>Arguments</h3>
7<dl>
Peter Hinz56885f32011-03-02 22:03:47 +00008<dt><b>context</b>
Andy Greenf7ee5492011-02-13 09:04:21 +00009<dd>libwebsockets context
10<dt><b>fd</b>
11<dd>Connection socket descriptor
12</dl>
13<hr>
Andy Green07034092011-02-13 08:37:12 +000014<h2>libwebsockets_get_peer_addresses - Get client address information</h2>
15<i>void</i>
16<b>libwebsockets_get_peer_addresses</b>
17(<i>int</i> <b>fd</b>,
18<i>char *</i> <b>name</b>,
19<i>int</i> <b>name_len</b>,
20<i>char *</i> <b>rip</b>,
21<i>int</i> <b>rip_len</b>)
22<h3>Arguments</h3>
23<dl>
24<dt><b>fd</b>
25<dd>Connection socket descriptor
26<dt><b>name</b>
27<dd>Buffer to take client address name
28<dt><b>name_len</b>
29<dd>Length of client address name buffer
30<dt><b>rip</b>
31<dd>Buffer to take client address IP qotted quad
32<dt><b>rip_len</b>
33<dd>Length of client address IP buffer
34</dl>
35<h3>Description</h3>
36<blockquote>
37This function fills in <tt><b>name</b></tt> and <tt><b>rip</b></tt> with the name and IP of
38the client connected with socket descriptor <tt><b>fd</b></tt>. Names may be
39truncated if there is not enough room. If either cannot be
40determined, they will be returned as valid zero-length strings.
41</blockquote>
42<hr>
Andy Green9f990342011-02-12 11:57:45 +000043<h2>libwebsocket_service_fd - Service polled socket with something waiting</h2>
44<i>int</i>
45<b>libwebsocket_service_fd</b>
Peter Hinz56885f32011-03-02 22:03:47 +000046(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green9f990342011-02-12 11:57:45 +000047<i>struct pollfd *</i> <b>pollfd</b>)
48<h3>Arguments</h3>
49<dl>
Peter Hinz56885f32011-03-02 22:03:47 +000050<dt><b>context</b>
Andy Green9f990342011-02-12 11:57:45 +000051<dd>Websocket context
52<dt><b>pollfd</b>
53<dd>The pollfd entry describing the socket fd and which events
54happened.
55</dl>
56<h3>Description</h3>
57<blockquote>
58This function closes any active connections and then frees the
59context. After calling this, any further use of the context is
60undefined.
61</blockquote>
62<hr>
Andy Green6964bb52011-01-23 16:50:33 +000063<h2>libwebsocket_context_destroy - Destroy the websocket context</h2>
64<i>void</i>
65<b>libwebsocket_context_destroy</b>
Peter Hinz56885f32011-03-02 22:03:47 +000066(<i>struct libwebsocket_context *</i> <b>context</b>)
Andy Green6964bb52011-01-23 16:50:33 +000067<h3>Arguments</h3>
68<dl>
Peter Hinz56885f32011-03-02 22:03:47 +000069<dt><b>context</b>
Andy Green6964bb52011-01-23 16:50:33 +000070<dd>Websocket context
71</dl>
72<h3>Description</h3>
73<blockquote>
74This function closes any active connections and then frees the
75context. After calling this, any further use of the context is
76undefined.
77</blockquote>
78<hr>
79<h2>libwebsocket_service - Service any pending websocket activity</h2>
80<i>int</i>
81<b>libwebsocket_service</b>
Peter Hinz56885f32011-03-02 22:03:47 +000082(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green6964bb52011-01-23 16:50:33 +000083<i>int</i> <b>timeout_ms</b>)
84<h3>Arguments</h3>
85<dl>
Peter Hinz56885f32011-03-02 22:03:47 +000086<dt><b>context</b>
Andy Green6964bb52011-01-23 16:50:33 +000087<dd>Websocket context
88<dt><b>timeout_ms</b>
89<dd>Timeout for poll; 0 means return immediately if nothing needed
90service otherwise block and service immediately, returning
91after the timeout if nothing needed service.
92</dl>
93<h3>Description</h3>
94<blockquote>
95This function deals with any pending websocket traffic, for three
96kinds of event. It handles these events on both server and client
97types of connection the same.
98<p>
991) Accept new connections to our context's server
100<p>
1012) Perform pending broadcast writes initiated from other forked
102processes (effectively serializing asynchronous broadcasts)
103<p>
1043) Call the receive callback for incoming frame data received by
105server or client connections.
106<p>
107You need to call this service function periodically to all the above
108functions to happen; if your application is single-threaded you can
109just call it in your main event loop.
110<p>
111Alternatively you can fork a new process that asynchronously handles
112calling this service in a loop. In that case you are happy if this
113call blocks your thread until it needs to take care of something and
114would call it with a large nonzero timeout. Your loop then takes no
115CPU while there is nothing happening.
116<p>
117If you are calling it in a single-threaded app, you don't want it to
118wait around blocking other things in your loop from happening, so you
119would call it with a timeout_ms of 0, so it returns immediately if
120nothing is pending, or as soon as it services whatever was pending.
121</blockquote>
122<hr>
Andy Green32375b72011-02-19 08:32:53 +0000123<h2>libwebsocket_callback_on_writable - Request a callback when this socket becomes able to be written to without blocking</h2>
Andy Green90c7cbc2011-01-27 06:26:52 +0000124<i>int</i>
125<b>libwebsocket_callback_on_writable</b>
Peter Hinz56885f32011-03-02 22:03:47 +0000126(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green62c54d22011-02-14 09:14:25 +0000127<i>struct libwebsocket *</i> <b>wsi</b>)
Andy Green90c7cbc2011-01-27 06:26:52 +0000128<h3>Arguments</h3>
129<dl>
Peter Hinz56885f32011-03-02 22:03:47 +0000130<dt><b>context</b>
Andy Green32375b72011-02-19 08:32:53 +0000131<dd>libwebsockets context
Andy Green90c7cbc2011-01-27 06:26:52 +0000132<dt><b>wsi</b>
133<dd>Websocket connection instance to get callback for
134</dl>
135<hr>
136<h2>libwebsocket_callback_on_writable_all_protocol - Request a callback for all connections using the given protocol when it becomes possible to write to each socket without blocking in turn.</h2>
137<i>int</i>
138<b>libwebsocket_callback_on_writable_all_protocol</b>
139(<i>const struct libwebsocket_protocols *</i> <b>protocol</b>)
140<h3>Arguments</h3>
141<dl>
142<dt><b>protocol</b>
143<dd>Protocol whose connections will get callbacks
144</dl>
145<hr>
Andy Greenbe93fef2011-02-14 20:25:43 +0000146<h2>libwebsocket_set_timeout - marks the wsi as subject to a timeout</h2>
147<i>void</i>
148<b>libwebsocket_set_timeout</b>
149(<i>struct libwebsocket *</i> <b>wsi</b>,
150<i>enum pending_timeout</i> <b>reason</b>,
151<i>int</i> <b>secs</b>)
152<h3>Arguments</h3>
153<dl>
154<dt><b>wsi</b>
155<dd>Websocket connection instance
156<dt><b>reason</b>
157<dd>timeout reason
158<dt><b>secs</b>
159<dd>how many seconds
160</dl>
161<h3>Description</h3>
162<blockquote>
163<p>
164You will not need this unless you are doing something special
165</blockquote>
166<hr>
Andy Greena6cbece2011-01-27 20:06:03 +0000167<h2>libwebsocket_get_socket_fd - returns the socket file descriptor</h2>
168<i>int</i>
169<b>libwebsocket_get_socket_fd</b>
170(<i>struct libwebsocket *</i> <b>wsi</b>)
171<h3>Arguments</h3>
172<dl>
173<dt><b>wsi</b>
174<dd>Websocket connection instance
175</dl>
176<h3>Description</h3>
177<blockquote>
178<p>
179You will not need this unless you are doing something special
180</blockquote>
181<hr>
Andy Green90c7cbc2011-01-27 06:26:52 +0000182<h2>libwebsocket_rx_flow_control - Enable and disable socket servicing for receieved packets.</h2>
183<i>int</i>
184<b>libwebsocket_rx_flow_control</b>
185(<i>struct libwebsocket *</i> <b>wsi</b>,
186<i>int</i> <b>enable</b>)
187<h3>Arguments</h3>
188<dl>
189<dt><b>wsi</b>
190<dd>Websocket connection instance to get callback for
191<dt><b>enable</b>
192<dd>0 = disable read servicing for this connection, 1 = enable
193</dl>
194<h3>Description</h3>
195<blockquote>
196<p>
197If the output side of a server process becomes choked, this allows flow
198control for the input side.
199</blockquote>
200<hr>
Andy Green2ac5a6f2011-01-28 10:00:18 +0000201<h2>libwebsocket_canonical_hostname - returns this host's hostname</h2>
202<i>const char *</i>
203<b>libwebsocket_canonical_hostname</b>
Peter Hinz56885f32011-03-02 22:03:47 +0000204(<i>struct libwebsocket_context *</i> <b>context</b>)
Andy Green2ac5a6f2011-01-28 10:00:18 +0000205<h3>Arguments</h3>
206<dl>
Peter Hinz56885f32011-03-02 22:03:47 +0000207<dt><b>context</b>
Andy Green2ac5a6f2011-01-28 10:00:18 +0000208<dd>Websocket context
209</dl>
210<h3>Description</h3>
211<blockquote>
212<p>
213This is typically used by client code to fill in the host parameter
214when making a client connection. You can only call it after the context
215has been created.
216</blockquote>
217<hr>
Andy Green4739e5c2011-01-22 12:51:57 +0000218<h2>libwebsocket_create_context - Create the websocket handler</h2>
Andy Greene92cd172011-01-19 13:11:55 +0000219<i>struct libwebsocket_context *</i>
Andy Green4739e5c2011-01-22 12:51:57 +0000220<b>libwebsocket_create_context</b>
Andy Green62a12932010-11-03 11:19:23 +0000221(<i>int</i> <b>port</b>,
Peter Hinz56885f32011-03-02 22:03:47 +0000222<i>const char *</i> <b>interf</b>,
Andy Greenb45993c2010-12-18 15:13:50 +0000223<i>struct libwebsocket_protocols *</i> <b>protocols</b>,
Andy Greend6e09112011-03-05 16:12:15 +0000224<i>struct libwebsocket_extension *</i> <b>extensions</b>,
Andy Green3faa9c72010-11-08 17:03:03 +0000225<i>const char *</i> <b>ssl_cert_filepath</b>,
226<i>const char *</i> <b>ssl_private_key_filepath</b>,
David Galeano2f82be82013-01-09 16:25:54 +0800227<i>const char *</i> <b>ssl_ca_filepath</b>,
Andy Green3faa9c72010-11-08 17:03:03 +0000228<i>int</i> <b>gid</b>,
Andy Green8014b292011-01-30 20:57:25 +0000229<i>int</i> <b>uid</b>,
Alon Levy0291eb32012-10-19 11:21:56 +0200230<i>unsigned int</i> <b>options</b>,
231<i>void *</i> <b>user</b>)
Andy Green62a12932010-11-03 11:19:23 +0000232<h3>Arguments</h3>
233<dl>
234<dt><b>port</b>
Andy Green4739e5c2011-01-22 12:51:57 +0000235<dd>Port to listen on... you can use 0 to suppress listening on
236any port, that's what you want if you are not running a
237websocket server at all but just using it as a client
Peter Hinz56885f32011-03-02 22:03:47 +0000238<dt><b>interf</b>
Andy Green32375b72011-02-19 08:32:53 +0000239<dd>NULL to bind the listen socket to all interfaces, or the
240interface name, eg, "eth2"
Andy Green4f3943a2010-11-12 10:44:16 +0000241<dt><b>protocols</b>
242<dd>Array of structures listing supported protocols and a protocol-
243specific callback for each one. The list is ended with an
244entry that has a NULL callback pointer.
Andy Greenb45993c2010-12-18 15:13:50 +0000245It's not const because we write the owning_server member
Andy Greenc5114822011-03-06 10:29:35 +0000246<dt><b>extensions</b>
247<dd>NULL or array of libwebsocket_extension structs listing the
248extensions this context supports
Andy Green3faa9c72010-11-08 17:03:03 +0000249<dt><b>ssl_cert_filepath</b>
250<dd>If libwebsockets was compiled to use ssl, and you want
251to listen using SSL, set to the filepath to fetch the
252server cert from, otherwise NULL for unencrypted
253<dt><b>ssl_private_key_filepath</b>
254<dd>filepath to private key if wanting SSL mode,
255else ignored
David Galeano2f82be82013-01-09 16:25:54 +0800256<dt><b>ssl_ca_filepath</b>
Andy Green988bd982013-01-10 12:26:13 +0800257<dd>CA certificate filepath or NULL
Andy Green3faa9c72010-11-08 17:03:03 +0000258<dt><b>gid</b>
259<dd>group id to change to after setting listen socket, or -1.
260<dt><b>uid</b>
261<dd>user id to change to after setting listen socket, or -1.
Andy Greenbfb051f2011-02-09 08:49:14 +0000262<dt><b>options</b>
263<dd>0, or LWS_SERVER_OPTION_DEFEAT_CLIENT_MASK
Andy Green788c4a82012-10-22 12:29:57 +0100264<dt><b>user</b>
265<dd>optional user pointer that can be recovered via the context
266pointer using libwebsocket_context_user
Andy Green62a12932010-11-03 11:19:23 +0000267</dl>
268<h3>Description</h3>
269<blockquote>
Andy Green47943ae2010-11-12 11:15:49 +0000270This function creates the listening socket and takes care
Andy Green62a12932010-11-03 11:19:23 +0000271of all initialization in one step.
272<p>
Andy Greene92cd172011-01-19 13:11:55 +0000273After initialization, it returns a struct libwebsocket_context * that
274represents this server. After calling, user code needs to take care
275of calling <b>libwebsocket_service</b> with the context pointer to get the
276server's sockets serviced. This can be done in the same process context
277or a forked process, or another thread,
Andy Green47943ae2010-11-12 11:15:49 +0000278<p>
279The protocol callback functions are called for a handful of events
280including http requests coming in, websocket connections becoming
Andy Green62a12932010-11-03 11:19:23 +0000281established, and data arriving; it's also called periodically to allow
282async transmission.
283<p>
Andy Green47943ae2010-11-12 11:15:49 +0000284HTTP requests are sent always to the FIRST protocol in <tt><b>protocol</b></tt>, since
285at that time websocket protocol has not been negotiated. Other
286protocols after the first one never see any HTTP callack activity.
287<p>
Andy Green62a12932010-11-03 11:19:23 +0000288The server created is a simple http server by default; part of the
289websocket standard is upgrading this http connection to a websocket one.
290<p>
291This allows the same server to provide files like scripts and favicon /
292images or whatever over http and dynamic data over websockets all in
293one place; they're all handled in the user callback.
294</blockquote>
295<hr>
Andy Greene92cd172011-01-19 13:11:55 +0000296<h2>libwebsockets_fork_service_loop - Optional helper function forks off a process for the websocket server loop. You don't have to use this but if not, you have to make sure you are calling libwebsocket_service periodically to service the websocket traffic</h2>
297<i>int</i>
298<b>libwebsockets_fork_service_loop</b>
Peter Hinz56885f32011-03-02 22:03:47 +0000299(<i>struct libwebsocket_context *</i> <b>context</b>)
Andy Greene92cd172011-01-19 13:11:55 +0000300<h3>Arguments</h3>
301<dl>
Peter Hinz56885f32011-03-02 22:03:47 +0000302<dt><b>context</b>
Andy Greene92cd172011-01-19 13:11:55 +0000303<dd>server context returned by creation function
304</dl>
305<hr>
Andy Greenb45993c2010-12-18 15:13:50 +0000306<h2>libwebsockets_get_protocol - Returns a protocol pointer from a websocket connection.</h2>
307<i>const struct libwebsocket_protocols *</i>
308<b>libwebsockets_get_protocol</b>
309(<i>struct libwebsocket *</i> <b>wsi</b>)
310<h3>Arguments</h3>
311<dl>
312<dt><b>wsi</b>
313<dd>pointer to struct websocket you want to know the protocol of
314</dl>
315<h3>Description</h3>
316<blockquote>
317<p>
318This is useful to get the protocol to broadcast back to from inside
319the callback.
320</blockquote>
321<hr>
Andy Greene92cd172011-01-19 13:11:55 +0000322<h2>libwebsockets_broadcast - Sends a buffer to the callback for all active connections of the given protocol.</h2>
Andy Greenb45993c2010-12-18 15:13:50 +0000323<i>int</i>
324<b>libwebsockets_broadcast</b>
325(<i>const struct libwebsocket_protocols *</i> <b>protocol</b>,
326<i>unsigned char *</i> <b>buf</b>,
327<i>size_t</i> <b>len</b>)
328<h3>Arguments</h3>
329<dl>
330<dt><b>protocol</b>
331<dd>pointer to the protocol you will broadcast to all members of
332<dt><b>buf</b>
333<dd>buffer containing the data to be broadcase. NOTE: this has to be
334allocated with LWS_SEND_BUFFER_PRE_PADDING valid bytes before
335the pointer and LWS_SEND_BUFFER_POST_PADDING afterwards in the
336case you are calling this function from callback context.
337<dt><b>len</b>
338<dd>length of payload data in buf, starting from buf.
339</dl>
340<h3>Description</h3>
341<blockquote>
342This function allows bulk sending of a packet to every connection using
343the given protocol. It does not send the data directly; instead it calls
344the callback with a reason type of LWS_CALLBACK_BROADCAST. If the callback
345wants to actually send the data for that connection, the callback itself
346should call <b>libwebsocket_write</b>.
347<p>
348<b>libwebsockets_broadcast</b> can be called from another fork context without
349having to take any care about data visibility between the processes, it'll
350"just work".
351</blockquote>
352<hr>
Andy Green43db0452013-01-10 19:50:35 +0800353<h2>lws_set_log_level - Set the logging bitfield</h2>
354<i>void</i>
355<b>lws_set_log_level</b>
Andy Greende8f27a2013-01-12 09:17:42 +0800356(<i>int</i> <b>level</b>,
357<i>void (*</i><b>log_emit_function</b>) <i>(const char *line)</i>)
Andy Green43db0452013-01-10 19:50:35 +0800358<h3>Arguments</h3>
359<dl>
360<dt><b>level</b>
361<dd>OR together the LLL_ debug contexts you want output from
Andy Greende8f27a2013-01-12 09:17:42 +0800362<dt><b>log_emit_function</b>
363<dd>NULL to leave it as it is, or a user-supplied
364function to perform log string emission instead of
365the default stderr one.
Andy Green43db0452013-01-10 19:50:35 +0800366</dl>
367<h3>Description</h3>
368<blockquote>
Andy Greende8f27a2013-01-12 09:17:42 +0800369log level defaults to "err" and "warn" contexts enabled only and
370emission on stderr.
Andy Green43db0452013-01-10 19:50:35 +0800371</blockquote>
372<hr>
Andy Green62a12932010-11-03 11:19:23 +0000373<h2>libwebsocket_write - Apply protocol then write data to client</h2>
374<i>int</i>
375<b>libwebsocket_write</b>
376(<i>struct libwebsocket *</i> <b>wsi</b>,
377<i>unsigned char *</i> <b>buf</b>,
378<i>size_t</i> <b>len</b>,
379<i>enum libwebsocket_write_protocol</i> <b>protocol</b>)
380<h3>Arguments</h3>
381<dl>
382<dt><b>wsi</b>
383<dd>Websocket instance (available from user callback)
384<dt><b>buf</b>
385<dd>The data to send. For data being sent on a websocket
386connection (ie, not default http), this buffer MUST have
387LWS_SEND_BUFFER_PRE_PADDING bytes valid BEFORE the pointer
388and an additional LWS_SEND_BUFFER_POST_PADDING bytes valid
389in the buffer after (buf + len). This is so the protocol
390header and trailer data can be added in-situ.
391<dt><b>len</b>
392<dd>Count of the data bytes in the payload starting from buf
393<dt><b>protocol</b>
394<dd>Use LWS_WRITE_HTTP to reply to an http connection, and one
395of LWS_WRITE_BINARY or LWS_WRITE_TEXT to send appropriate
396data on a websockets connection. Remember to allow the extra
397bytes before and after buf if LWS_WRITE_BINARY or LWS_WRITE_TEXT
398are used.
399</dl>
400<h3>Description</h3>
401<blockquote>
402This function provides the way to issue data back to the client
403for both http and websocket protocols.
404<p>
405In the case of sending using websocket protocol, be sure to allocate
406valid storage before and after buf as explained above. This scheme
407allows maximum efficiency of sending data and protocol in a single
408packet while not burdening the user code with any protocol knowledge.
409</blockquote>
410<hr>
411<h2>libwebsockets_serve_http_file - Send a file back to the client using http</h2>
412<i>int</i>
413<b>libwebsockets_serve_http_file</b>
414(<i>struct libwebsocket *</i> <b>wsi</b>,
415<i>const char *</i> <b>file</b>,
416<i>const char *</i> <b>content_type</b>)
417<h3>Arguments</h3>
418<dl>
419<dt><b>wsi</b>
420<dd>Websocket instance (available from user callback)
421<dt><b>file</b>
422<dd>The file to issue over http
423<dt><b>content_type</b>
424<dd>The http content type, eg, text/html
425</dl>
426<h3>Description</h3>
427<blockquote>
428This function is intended to be called from the callback in response
429to http requests from the client. It allows the callback to issue
430local files down the http link in a single step.
431</blockquote>
432<hr>
Andy Green38e57bb2011-01-19 12:20:27 +0000433<h2>libwebsockets_remaining_packet_payload - Bytes to come before "overall" rx packet is complete</h2>
434<i>size_t</i>
435<b>libwebsockets_remaining_packet_payload</b>
436(<i>struct libwebsocket *</i> <b>wsi</b>)
437<h3>Arguments</h3>
438<dl>
439<dt><b>wsi</b>
440<dd>Websocket instance (available from user callback)
441</dl>
442<h3>Description</h3>
443<blockquote>
444This function is intended to be called from the callback if the
445user code is interested in "complete packets" from the client.
446libwebsockets just passes through payload as it comes and issues a buffer
447additionally when it hits a built-in limit. The LWS_CALLBACK_RECEIVE
448callback handler can use this API to find out if the buffer it has just
449been given is the last piece of a "complete packet" from the client --
450when that is the case <b>libwebsockets_remaining_packet_payload</b> will return
4510.
452<p>
453Many protocols won't care becuse their packets are always small.
454</blockquote>
455<hr>
Andy Green90c7cbc2011-01-27 06:26:52 +0000456<h2>libwebsocket_client_connect - Connect to another websocket server</h2>
457<i>struct libwebsocket *</i>
458<b>libwebsocket_client_connect</b>
Peter Hinz56885f32011-03-02 22:03:47 +0000459(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green90c7cbc2011-01-27 06:26:52 +0000460<i>const char *</i> <b>address</b>,
461<i>int</i> <b>port</b>,
462<i>int</i> <b>ssl_connection</b>,
463<i>const char *</i> <b>path</b>,
464<i>const char *</i> <b>host</b>,
465<i>const char *</i> <b>origin</b>,
Andy Greenbfb051f2011-02-09 08:49:14 +0000466<i>const char *</i> <b>protocol</b>,
467<i>int</i> <b>ietf_version_or_minus_one</b>)
Andy Green90c7cbc2011-01-27 06:26:52 +0000468<h3>Arguments</h3>
469<dl>
Peter Hinz56885f32011-03-02 22:03:47 +0000470<dt><b>context</b>
Andy Green90c7cbc2011-01-27 06:26:52 +0000471<dd>Websocket context
472<dt><b>address</b>
473<dd>Remote server address, eg, "myserver.com"
474<dt><b>port</b>
475<dd>Port to connect to on the remote server, eg, 80
476<dt><b>ssl_connection</b>
477<dd>0 = ws://, 1 = wss:// encrypted, 2 = wss:// allow self
478signed certs
479<dt><b>path</b>
480<dd>Websocket path on server
481<dt><b>host</b>
482<dd>Hostname on server
483<dt><b>origin</b>
484<dd>Socket origin name
485<dt><b>protocol</b>
486<dd>Comma-separated list of protocols being asked for from
487the server, or just one. The server will pick the one it
488likes best.
Andy Greenbfb051f2011-02-09 08:49:14 +0000489<dt><b>ietf_version_or_minus_one</b>
490<dd>-1 to ask to connect using the default, latest
491protocol supported, or the specific protocol ordinal
Andy Green90c7cbc2011-01-27 06:26:52 +0000492</dl>
493<h3>Description</h3>
494<blockquote>
495This function creates a connection to a remote server
496</blockquote>
497<hr>
David Brooks2c60d952012-04-20 12:19:01 +0800498<h2>libwebsocket_client_connect_extended - Connect to another websocket server</h2>
499<i>struct libwebsocket *</i>
500<b>libwebsocket_client_connect_extended</b>
501(<i>struct libwebsocket_context *</i> <b>context</b>,
502<i>const char *</i> <b>address</b>,
503<i>int</i> <b>port</b>,
504<i>int</i> <b>ssl_connection</b>,
505<i>const char *</i> <b>path</b>,
506<i>const char *</i> <b>host</b>,
507<i>const char *</i> <b>origin</b>,
508<i>const char *</i> <b>protocol</b>,
509<i>int</i> <b>ietf_version_or_minus_one</b>,
510<i>void *</i> <b>userdata</b>)
511<h3>Arguments</h3>
512<dl>
513<dt><b>context</b>
514<dd>Websocket context
515<dt><b>address</b>
516<dd>Remote server address, eg, "myserver.com"
517<dt><b>port</b>
518<dd>Port to connect to on the remote server, eg, 80
519<dt><b>ssl_connection</b>
520<dd>0 = ws://, 1 = wss:// encrypted, 2 = wss:// allow self
521signed certs
522<dt><b>path</b>
523<dd>Websocket path on server
524<dt><b>host</b>
525<dd>Hostname on server
526<dt><b>origin</b>
527<dd>Socket origin name
528<dt><b>protocol</b>
529<dd>Comma-separated list of protocols being asked for from
530the server, or just one. The server will pick the one it
531likes best.
532<dt><b>ietf_version_or_minus_one</b>
533<dd>-1 to ask to connect using the default, latest
534protocol supported, or the specific protocol ordinal
535<dt><b>userdata</b>
536<dd>Pre-allocated user data
537</dl>
538<h3>Description</h3>
539<blockquote>
540This function creates a connection to a remote server
541</blockquote>
542<hr>
Andy Green8f037e42010-12-19 22:13:26 +0000543<h2>callback - User server actions</h2>
Andy Green07b56e62011-10-03 19:30:22 +0800544<i>LWS_EXTERN int</i>
Andy Green8f037e42010-12-19 22:13:26 +0000545<b>callback</b>
Darin Willitsc19456f2011-02-14 17:52:39 +0000546(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green62c54d22011-02-14 09:14:25 +0000547<i>struct libwebsocket *</i> <b>wsi</b>,
Andy Green8f037e42010-12-19 22:13:26 +0000548<i>enum libwebsocket_callback_reasons</i> <b>reason</b>,
549<i>void *</i> <b>user</b>,
550<i>void *</i> <b>in</b>,
551<i>size_t</i> <b>len</b>)
552<h3>Arguments</h3>
553<dl>
Andy Green32375b72011-02-19 08:32:53 +0000554<dt><b>context</b>
555<dd>Websockets context
Andy Green8f037e42010-12-19 22:13:26 +0000556<dt><b>wsi</b>
557<dd>Opaque websocket instance pointer
558<dt><b>reason</b>
559<dd>The reason for the call
560<dt><b>user</b>
561<dd>Pointer to per-session user data allocated by library
562<dt><b>in</b>
563<dd>Pointer used for some callback reasons
564<dt><b>len</b>
565<dd>Length set for some callback reasons
566</dl>
567<h3>Description</h3>
568<blockquote>
569This callback is the way the user controls what is served. All the
570protocol detail is hidden and handled by the library.
571<p>
572For each connection / session there is user data allocated that is
573pointed to by "user". You set the size of this user data area when
574the library is initialized with libwebsocket_create_server.
575<p>
576You get an opportunity to initialize user data when called back with
577LWS_CALLBACK_ESTABLISHED reason.
578</blockquote>
579<h3>LWS_CALLBACK_ESTABLISHED</h3>
580<blockquote>
Andy Green90c7cbc2011-01-27 06:26:52 +0000581after the server completes a handshake with
582an incoming client
583</blockquote>
David Brooks2c60d952012-04-20 12:19:01 +0800584<h3>LWS_CALLBACK_CLIENT_CONNECTION_ERROR</h3>
585<blockquote>
586the request client connection has
587been unable to complete a handshake with the remote server
588</blockquote>
Andy Green90c7cbc2011-01-27 06:26:52 +0000589<h3>LWS_CALLBACK_CLIENT_ESTABLISHED</h3>
590<blockquote>
591after your client connection completed
592a handshake with the remote server
Andy Green8f037e42010-12-19 22:13:26 +0000593</blockquote>
594<h3>LWS_CALLBACK_CLOSED</h3>
595<blockquote>
596when the websocket session ends
597</blockquote>
598<h3>LWS_CALLBACK_BROADCAST</h3>
599<blockquote>
600signal to send to client (you would use
601<b>libwebsocket_write</b> taking care about the
602special buffer requirements
603</blockquote>
604<h3>LWS_CALLBACK_RECEIVE</h3>
605<blockquote>
Andy Green90c7cbc2011-01-27 06:26:52 +0000606data has appeared for this server endpoint from a
607remote client, it can be found at *in and is
608len bytes long
609</blockquote>
Andy Greena6cbece2011-01-27 20:06:03 +0000610<h3>LWS_CALLBACK_CLIENT_RECEIVE_PONG</h3>
611<blockquote>
612if you elected to see PONG packets,
613they appear with this callback reason. PONG
614packets only exist in 04+ protocol
615</blockquote>
Andy Green90c7cbc2011-01-27 06:26:52 +0000616<h3>LWS_CALLBACK_CLIENT_RECEIVE</h3>
617<blockquote>
618data has appeared from the server for the
619client connection, it can be found at *in and
620is len bytes long
Andy Green8f037e42010-12-19 22:13:26 +0000621</blockquote>
622<h3>LWS_CALLBACK_HTTP</h3>
623<blockquote>
624an http request has come from a client that is not
625asking to upgrade the connection to a websocket
626one. This is a chance to serve http content,
627for example, to send a script to the client
628which will then open the websockets connection.
Andy Green7619c472011-01-23 17:47:08 +0000629<tt><b>in</b></tt> points to the URI path requested and
Andy Green8f037e42010-12-19 22:13:26 +0000630<b>libwebsockets_serve_http_file</b> makes it very
631simple to send back a file to the client.
Andy Green24b588b2013-01-13 09:53:18 +0800632Normally after sending the file you are done
633with the http connection, since the rest of the
634activity will come by websockets from the script
635that was delivered by http, so you will want to
636return 1; to close and free up the connection.
637That's important because it uses a slot in the
638total number of client connections allowed set
639by MAX_CLIENTS.
Andy Green8f037e42010-12-19 22:13:26 +0000640</blockquote>
Andy Greene9739ed2011-03-07 21:40:59 +0000641<h3>LWS_CALLBACK_SERVER_WRITEABLE</h3>
Andy Green90c7cbc2011-01-27 06:26:52 +0000642<blockquote>
Andy Greene9739ed2011-03-07 21:40:59 +0000643If you call
Andy Green90c7cbc2011-01-27 06:26:52 +0000644<b>libwebsocket_callback_on_writable</b> on a connection, you will
Andy Greene9739ed2011-03-07 21:40:59 +0000645get one of these callbacks coming when the connection socket
646is able to accept another write packet without blocking.
647If it already was able to take another packet without blocking,
648you'll get this callback at the next call to the service loop
649function. Notice that CLIENTs get LWS_CALLBACK_CLIENT_WRITEABLE
650and servers get LWS_CALLBACK_SERVER_WRITEABLE.
Andy Green90c7cbc2011-01-27 06:26:52 +0000651</blockquote>
Andy Green07034092011-02-13 08:37:12 +0000652<h3>LWS_CALLBACK_FILTER_NETWORK_CONNECTION</h3>
653<blockquote>
654called when a client connects to
655the server at network level; the connection is accepted but then
656passed to this callback to decide whether to hang up immediately
657or not, based on the client IP. <tt><b>user</b></tt> contains the connection
658socket's descriptor. Return non-zero to terminate
659the connection before sending or receiving anything.
660Because this happens immediately after the network connection
661from the client, there's no websocket protocol selected yet so
662this callback is issued only to protocol 0.
663</blockquote>
Andy Greenc85619d2011-02-13 08:25:26 +0000664<h3>LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION</h3>
665<blockquote>
666called when the handshake has
667been received and parsed from the client, but the response is
668not sent yet. Return non-zero to disallow the connection.
Andy Green07034092011-02-13 08:37:12 +0000669<tt><b>user</b></tt> is a pointer to an array of struct lws_tokens, you can
670use the header enums lws_token_indexes from libwebsockets.h
671to check for and read the supported header presence and
672content before deciding to allow the handshake to proceed or
673to kill the connection.
Andy Green0894bda2011-02-19 09:09:11 +0000674</blockquote>
675<h3>LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS</h3>
676<blockquote>
Andy Green6901cb32011-02-21 08:06:47 +0000677if configured for
Andy Green0894bda2011-02-19 09:09:11 +0000678including OpenSSL support, this callback allows your user code
679to perform extra <b>SSL_CTX_load_verify_locations</b> or similar
680calls to direct OpenSSL where to find certificates the client
681can use to confirm the remote server identity. <tt><b>user</b></tt> is the
682OpenSSL SSL_CTX*
Andy Green6901cb32011-02-21 08:06:47 +0000683</blockquote>
684<h3>LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS</h3>
685<blockquote>
686if configured for
687including OpenSSL support, this callback allows your user code
688to load extra certifcates into the server which allow it to
689verify the validity of certificates returned by clients. <tt><b>user</b></tt>
690is the server's OpenSSL SSL_CTX*
691</blockquote>
692<h3>LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION</h3>
693<blockquote>
694if the
695libwebsockets context was created with the option
696LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT, then this
697callback is generated during OpenSSL verification of the cert
698sent from the client. It is sent to protocol[0] callback as
699no protocol has been negotiated on the connection yet.
700Notice that the libwebsockets context and wsi are both NULL
701during this callback. See
702</blockquote>
703<h3>http</h3>
704<blockquote>
705//www.openssl.org/docs/ssl/SSL_CTX_set_verify.html
706to understand more detail about the OpenSSL callback that
707generates this libwebsockets callback and the meanings of the
708arguments passed. In this callback, <tt><b>user</b></tt> is the x509_ctx,
709<tt><b>in</b></tt> is the ssl pointer and <tt><b>len</b></tt> is preverify_ok
710Notice that this callback maintains libwebsocket return
711conventions, return 0 to mean the cert is OK or 1 to fail it.
712This also means that if you don't handle this callback then
713the default callback action of returning 0 allows the client
714certificates.
Andy Green385e7ad2011-03-01 21:06:02 +0000715</blockquote>
716<h3>LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER</h3>
717<blockquote>
718this callback happens
719when a client handshake is being compiled. <tt><b>user</b></tt> is NULL,
720<tt><b>in</b></tt> is a char **, it's pointing to a char * which holds the
721next location in the header buffer where you can add
722headers, and <tt><b>len</b></tt> is the remaining space in the header buffer,
723which is typically some hundreds of bytes. So, to add a canned
724cookie, your handler code might look similar to:
725<p>
726char **p = (char **)in;
727<p>
728if (len &lt; 100)
729return 1;
730<p>
731*p += sprintf(*p, "Cookie: a=b\x0d\x0a");
732<p>
733return 0;
734<p>
735Notice if you add anything, you just have to take care about
736the CRLF on the line you added. Obviously this callback is
737optional, if you don't handle it everything is fine.
738<p>
739Notice the callback is coming to protocols[0] all the time,
740because there is no specific protocol handshook yet.
Andy Greenc5114822011-03-06 10:29:35 +0000741</blockquote>
742<h3>LWS_CALLBACK_CONFIRM_EXTENSION_OKAY</h3>
743<blockquote>
744When the server handshake code
745sees that it does support a requested extension, before
746accepting the extension by additing to the list sent back to
747the client it gives this callback just to check that it's okay
748to use that extension. It calls back to the requested protocol
749and with <tt><b>in</b></tt> being the extension name, <tt><b>len</b></tt> is 0 and <tt><b>user</b></tt> is
750valid. Note though at this time the ESTABLISHED callback hasn't
751happened yet so if you initialize <tt><b>user</b></tt> content there, <tt><b>user</b></tt>
752content during this callback might not be useful for anything.
753Notice this callback comes to protocols[0].
Andy Greenc6517fa2011-03-06 13:15:29 +0000754</blockquote>
755<h3>LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED</h3>
756<blockquote>
757When a client
758connection is being prepared to start a handshake to a server,
759each supported extension is checked with protocols[0] callback
760with this reason, giving the user code a chance to suppress the
761claim to support that extension by returning non-zero. If
762unhandled, by default 0 will be returned and the extension
763support included in the header to the server. Notice this
764callback comes to protocols[0].
Andy Greenc85619d2011-02-13 08:25:26 +0000765<p>
766The next four reasons are optional and only need taking care of if you
767will be integrating libwebsockets sockets into an external polling
768array.
769</blockquote>
770<h3>LWS_CALLBACK_ADD_POLL_FD</h3>
771<blockquote>
772libwebsocket deals with its <b>poll</b> loop
773internally, but in the case you are integrating with another
774server you will need to have libwebsocket sockets share a
775polling array with the other server. This and the other
776POLL_FD related callbacks let you put your specialized
777poll array interface code in the callback for protocol 0, the
778first protocol you support, usually the HTTP protocol in the
779serving case. This callback happens when a socket needs to be
780</blockquote>
781<h3>added to the polling loop</h3>
782<blockquote>
783<tt><b>user</b></tt> contains the fd, and
784<tt><b>len</b></tt> is the events bitmap (like, POLLIN). If you are using the
785internal polling loop (the "service" callback), you can just
786ignore these callbacks.
787</blockquote>
788<h3>LWS_CALLBACK_DEL_POLL_FD</h3>
789<blockquote>
790This callback happens when a socket descriptor
791needs to be removed from an external polling array. <tt><b>user</b></tt> is
792the socket desricptor. If you are using the internal polling
793loop, you can just ignore it.
794</blockquote>
795<h3>LWS_CALLBACK_SET_MODE_POLL_FD</h3>
796<blockquote>
797This callback happens when libwebsockets
798wants to modify the events for the socket descriptor in <tt><b>user</b></tt>.
799The handler should OR <tt><b>len</b></tt> on to the events member of the pollfd
800struct for this socket descriptor. If you are using the
801internal polling loop, you can just ignore it.
802</blockquote>
803<h3>LWS_CALLBACK_CLEAR_MODE_POLL_FD</h3>
804<blockquote>
805This callback occurs when libwebsockets
806wants to modify the events for the socket descriptor in <tt><b>user</b></tt>.
807The handler should AND ~<tt><b>len</b></tt> on to the events member of the
808pollfd struct for this socket descriptor. If you are using the
809internal polling loop, you can just ignore it.
810</blockquote>
Andy Green8f037e42010-12-19 22:13:26 +0000811<hr>
Andy Green57b4e9a2011-03-06 13:14:46 +0000812<h2>extension_callback - Hooks to allow extensions to operate</h2>
Andy Green07b56e62011-10-03 19:30:22 +0800813<i>LWS_EXTERN int</i>
Andy Green57b4e9a2011-03-06 13:14:46 +0000814<b>extension_callback</b>
815(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green46c2ea02011-03-22 09:04:01 +0000816<i>struct libwebsocket_extension *</i> <b>ext</b>,
Andy Green57b4e9a2011-03-06 13:14:46 +0000817<i>struct libwebsocket *</i> <b>wsi</b>,
David Brooks2c60d952012-04-20 12:19:01 +0800818<i>enum libwebsocket_extension_callback_reasons</i> <b>reason</b>,
Andy Green57b4e9a2011-03-06 13:14:46 +0000819<i>void *</i> <b>user</b>,
820<i>void *</i> <b>in</b>,
821<i>size_t</i> <b>len</b>)
822<h3>Arguments</h3>
823<dl>
824<dt><b>context</b>
825<dd>Websockets context
Andy Green46c2ea02011-03-22 09:04:01 +0000826<dt><b>ext</b>
827<dd>This extension
Andy Green57b4e9a2011-03-06 13:14:46 +0000828<dt><b>wsi</b>
829<dd>Opaque websocket instance pointer
830<dt><b>reason</b>
831<dd>The reason for the call
832<dt><b>user</b>
833<dd>Pointer to per-session user data allocated by library
834<dt><b>in</b>
835<dd>Pointer used for some callback reasons
836<dt><b>len</b>
837<dd>Length set for some callback reasons
838</dl>
839<h3>Description</h3>
840<blockquote>
841Each extension that is active on a particular connection receives
842callbacks during the connection lifetime to allow the extension to
843operate on websocket data and manage itself.
844<p>
845Libwebsockets takes care of allocating and freeing "user" memory for
846each active extension on each connection. That is what is pointed to
847by the <tt><b>user</b></tt> parameter.
848</blockquote>
849<h3>LWS_EXT_CALLBACK_CONSTRUCT</h3>
850<blockquote>
851called when the server has decided to
852select this extension from the list provided by the client,
853just before the server will send back the handshake accepting
854the connection with this extension active. This gives the
855extension a chance to initialize its connection context found
856in <tt><b>user</b></tt>.
857</blockquote>
Andy Green2366b1c2011-03-06 13:15:31 +0000858<h3>LWS_EXT_CALLBACK_CLIENT_CONSTRUCT</h3>
859<blockquote>
860same as LWS_EXT_CALLBACK_CONSTRUCT
861but called when client is instantiating this extension. Some
862extensions will work the same on client and server side and then
863you can just merge handlers for both CONSTRUCTS.
864</blockquote>
Andy Green57b4e9a2011-03-06 13:14:46 +0000865<h3>LWS_EXT_CALLBACK_DESTROY</h3>
866<blockquote>
867called when the connection the extension was
868being used on is about to be closed and deallocated. It's the
869last chance for the extension to deallocate anything it has
870allocated in the user data (pointed to by <tt><b>user</b></tt>) before the
Andy Green2366b1c2011-03-06 13:15:31 +0000871user data is deleted. This same callback is used whether you
872are in client or server instantiation context.
Andy Green57b4e9a2011-03-06 13:14:46 +0000873</blockquote>
874<h3>LWS_EXT_CALLBACK_PACKET_RX_PREPARSE</h3>
875<blockquote>
876when this extension was active on
877a connection, and a packet of data arrived at the connection,
878it is passed to this callback to give the extension a chance to
879change the data, eg, decompress it. <tt><b>user</b></tt> is pointing to the
880extension's private connection context data, <tt><b>in</b></tt> is pointing
881to an lws_tokens struct, it consists of a char * pointer called
882token, and an int called token_len. At entry, these are
883set to point to the received buffer and set to the content
884length. If the extension will grow the content, it should use
885a new buffer allocated in its private user context data and
886set the pointed-to lws_tokens members to point to its buffer.
887</blockquote>
888<h3>LWS_EXT_CALLBACK_PACKET_TX_PRESEND</h3>
889<blockquote>
890this works the same way as
891LWS_EXT_CALLBACK_PACKET_RX_PREPARSE above, except it gives the
892extension a chance to change websocket data just before it will
893be sent out. Using the same lws_token pointer scheme in <tt><b>in</b></tt>,
894the extension can change the buffer and the length to be
895transmitted how it likes. Again if it wants to grow the
896buffer safely, it should copy the data into its own buffer and
897set the lws_tokens token pointer to it.
898</blockquote>
899<hr>
Andy Green4f3943a2010-11-12 10:44:16 +0000900<h2>struct libwebsocket_protocols - List of protocols and handlers server supports.</h2>
901<b>struct libwebsocket_protocols</b> {<br>
902&nbsp; &nbsp; <i>const char *</i> <b>name</b>;<br>
David Brooks2c60d952012-04-20 12:19:01 +0800903&nbsp; &nbsp; <i>callback_function *</i> <b>callback</b>;<br>
Andy Green4f3943a2010-11-12 10:44:16 +0000904&nbsp; &nbsp; <i>size_t</i> <b>per_session_data_size</b>;<br>
Andy Greenb45993c2010-12-18 15:13:50 +0000905&nbsp; &nbsp; <i>struct libwebsocket_context *</i> <b>owning_server</b>;<br>
906&nbsp; &nbsp; <i>int</i> <b>broadcast_socket_port</b>;<br>
907&nbsp; &nbsp; <i>int</i> <b>broadcast_socket_user_fd</b>;<br>
908&nbsp; &nbsp; <i>int</i> <b>protocol_index</b>;<br>
Andy Green4f3943a2010-11-12 10:44:16 +0000909};<br>
910<h3>Members</h3>
911<dl>
912<dt><b>name</b>
913<dd>Protocol name that must match the one given in the client
914Javascript new WebSocket(url, 'protocol') name
915<dt><b>callback</b>
916<dd>The service callback used for this protocol. It allows the
917service action for an entire protocol to be encapsulated in
918the protocol-specific callback
919<dt><b>per_session_data_size</b>
920<dd>Each new connection using this protocol gets
921this much memory allocated on connection establishment and
922freed on connection takedown. A pointer to this per-connection
923allocation is passed into the callback in the 'user' parameter
Andy Greenb45993c2010-12-18 15:13:50 +0000924<dt><b>owning_server</b>
925<dd>the server init call fills in this opaque pointer when
926registering this protocol with the server.
927<dt><b>broadcast_socket_port</b>
928<dd>the server init call fills this in with the
929localhost port number used to forward broadcasts for this
930protocol
931<dt><b>broadcast_socket_user_fd</b>
932<dd>the server init call fills this in ... the <b>main</b>
933process context can write to this socket to perform broadcasts
934(use the <b>libwebsockets_broadcast</b> api to do this instead,
935it works from any process context)
936<dt><b>protocol_index</b>
937<dd>which protocol we are starting from zero
Andy Green4f3943a2010-11-12 10:44:16 +0000938</dl>
939<h3>Description</h3>
940<blockquote>
941This structure represents one protocol supported by the server. An
942array of these structures is passed to <b>libwebsocket_create_server</b>
943allows as many protocols as you like to be handled by one server.
944</blockquote>
945<hr>
Andy Greend6e09112011-03-05 16:12:15 +0000946<h2>struct libwebsocket_extension - An extension we know how to cope with</h2>
947<b>struct libwebsocket_extension</b> {<br>
948&nbsp; &nbsp; <i>const char *</i> <b>name</b>;<br>
David Brooks2c60d952012-04-20 12:19:01 +0800949&nbsp; &nbsp; <i>extension_callback_function *</i> <b>callback</b>;<br>
Andy Greend6e09112011-03-05 16:12:15 +0000950&nbsp; &nbsp; <i>size_t</i> <b>per_session_data_size</b>;<br>
Andy Greenaa6fc442012-04-12 13:26:49 +0800951&nbsp; &nbsp; <i>void *</i> <b>per_context_private_data</b>;<br>
Andy Greend6e09112011-03-05 16:12:15 +0000952};<br>
953<h3>Members</h3>
954<dl>
955<dt><b>name</b>
956<dd>Formal extension name, eg, "deflate-stream"
957<dt><b>callback</b>
958<dd>Service callback
959<dt><b>per_session_data_size</b>
960<dd>Libwebsockets will auto-malloc this much
961memory for the use of the extension, a pointer
962to it comes in the <tt><b>user</b></tt> callback parameter
Andy Greenaa6fc442012-04-12 13:26:49 +0800963<dt><b>per_context_private_data</b>
964<dd>Optional storage for this externsion that
965is per-context, so it can track stuff across
966all sessions, etc, if it wants
Andy Greend6e09112011-03-05 16:12:15 +0000967</dl>
968<hr>