blob: d907e9b749c665fd51cbf2e814dcd4fc91618cd8 [file] [log] [blame]
Andy Greenf7ee5492011-02-13 09:04:21 +00001<h2>libwebsockets_hangup_on_client - Server calls to terminate client connection</h2>
2<i>void</i>
3<b>libwebsockets_hangup_on_client</b>
Peter Hinz56885f32011-03-02 22:03:47 +00004(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Greenf7ee5492011-02-13 09:04:21 +00005<i>int</i> <b>fd</b>)
6<h3>Arguments</h3>
7<dl>
Peter Hinz56885f32011-03-02 22:03:47 +00008<dt><b>context</b>
Andy Greenf7ee5492011-02-13 09:04:21 +00009<dd>libwebsockets context
10<dt><b>fd</b>
11<dd>Connection socket descriptor
12</dl>
13<hr>
Andy Green07034092011-02-13 08:37:12 +000014<h2>libwebsockets_get_peer_addresses - Get client address information</h2>
15<i>void</i>
16<b>libwebsockets_get_peer_addresses</b>
17(<i>int</i> <b>fd</b>,
18<i>char *</i> <b>name</b>,
19<i>int</i> <b>name_len</b>,
20<i>char *</i> <b>rip</b>,
21<i>int</i> <b>rip_len</b>)
22<h3>Arguments</h3>
23<dl>
24<dt><b>fd</b>
25<dd>Connection socket descriptor
26<dt><b>name</b>
27<dd>Buffer to take client address name
28<dt><b>name_len</b>
29<dd>Length of client address name buffer
30<dt><b>rip</b>
31<dd>Buffer to take client address IP qotted quad
32<dt><b>rip_len</b>
33<dd>Length of client address IP buffer
34</dl>
35<h3>Description</h3>
36<blockquote>
37This function fills in <tt><b>name</b></tt> and <tt><b>rip</b></tt> with the name and IP of
38the client connected with socket descriptor <tt><b>fd</b></tt>. Names may be
39truncated if there is not enough room. If either cannot be
40determined, they will be returned as valid zero-length strings.
41</blockquote>
42<hr>
Andy Green9f990342011-02-12 11:57:45 +000043<h2>libwebsocket_service_fd - Service polled socket with something waiting</h2>
44<i>int</i>
45<b>libwebsocket_service_fd</b>
Peter Hinz56885f32011-03-02 22:03:47 +000046(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green9f990342011-02-12 11:57:45 +000047<i>struct pollfd *</i> <b>pollfd</b>)
48<h3>Arguments</h3>
49<dl>
Peter Hinz56885f32011-03-02 22:03:47 +000050<dt><b>context</b>
Andy Green9f990342011-02-12 11:57:45 +000051<dd>Websocket context
52<dt><b>pollfd</b>
53<dd>The pollfd entry describing the socket fd and which events
54happened.
55</dl>
56<h3>Description</h3>
57<blockquote>
58This function closes any active connections and then frees the
59context. After calling this, any further use of the context is
60undefined.
61</blockquote>
62<hr>
Andy Green6964bb52011-01-23 16:50:33 +000063<h2>libwebsocket_context_destroy - Destroy the websocket context</h2>
64<i>void</i>
65<b>libwebsocket_context_destroy</b>
Peter Hinz56885f32011-03-02 22:03:47 +000066(<i>struct libwebsocket_context *</i> <b>context</b>)
Andy Green6964bb52011-01-23 16:50:33 +000067<h3>Arguments</h3>
68<dl>
Peter Hinz56885f32011-03-02 22:03:47 +000069<dt><b>context</b>
Andy Green6964bb52011-01-23 16:50:33 +000070<dd>Websocket context
71</dl>
72<h3>Description</h3>
73<blockquote>
74This function closes any active connections and then frees the
75context. After calling this, any further use of the context is
76undefined.
77</blockquote>
78<hr>
79<h2>libwebsocket_service - Service any pending websocket activity</h2>
80<i>int</i>
81<b>libwebsocket_service</b>
Peter Hinz56885f32011-03-02 22:03:47 +000082(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green6964bb52011-01-23 16:50:33 +000083<i>int</i> <b>timeout_ms</b>)
84<h3>Arguments</h3>
85<dl>
Peter Hinz56885f32011-03-02 22:03:47 +000086<dt><b>context</b>
Andy Green6964bb52011-01-23 16:50:33 +000087<dd>Websocket context
88<dt><b>timeout_ms</b>
89<dd>Timeout for poll; 0 means return immediately if nothing needed
90service otherwise block and service immediately, returning
91after the timeout if nothing needed service.
92</dl>
93<h3>Description</h3>
94<blockquote>
95This function deals with any pending websocket traffic, for three
96kinds of event. It handles these events on both server and client
97types of connection the same.
98<p>
991) Accept new connections to our context's server
100<p>
1012) Perform pending broadcast writes initiated from other forked
102processes (effectively serializing asynchronous broadcasts)
103<p>
1043) Call the receive callback for incoming frame data received by
105server or client connections.
106<p>
107You need to call this service function periodically to all the above
108functions to happen; if your application is single-threaded you can
109just call it in your main event loop.
110<p>
111Alternatively you can fork a new process that asynchronously handles
112calling this service in a loop. In that case you are happy if this
113call blocks your thread until it needs to take care of something and
114would call it with a large nonzero timeout. Your loop then takes no
115CPU while there is nothing happening.
116<p>
117If you are calling it in a single-threaded app, you don't want it to
118wait around blocking other things in your loop from happening, so you
119would call it with a timeout_ms of 0, so it returns immediately if
120nothing is pending, or as soon as it services whatever was pending.
121</blockquote>
122<hr>
Andy Green32375b72011-02-19 08:32:53 +0000123<h2>libwebsocket_callback_on_writable - Request a callback when this socket becomes able to be written to without blocking</h2>
Andy Green90c7cbc2011-01-27 06:26:52 +0000124<i>int</i>
125<b>libwebsocket_callback_on_writable</b>
Peter Hinz56885f32011-03-02 22:03:47 +0000126(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green62c54d22011-02-14 09:14:25 +0000127<i>struct libwebsocket *</i> <b>wsi</b>)
Andy Green90c7cbc2011-01-27 06:26:52 +0000128<h3>Arguments</h3>
129<dl>
Peter Hinz56885f32011-03-02 22:03:47 +0000130<dt><b>context</b>
Andy Green32375b72011-02-19 08:32:53 +0000131<dd>libwebsockets context
Andy Green90c7cbc2011-01-27 06:26:52 +0000132<dt><b>wsi</b>
133<dd>Websocket connection instance to get callback for
134</dl>
135<hr>
136<h2>libwebsocket_callback_on_writable_all_protocol - Request a callback for all connections using the given protocol when it becomes possible to write to each socket without blocking in turn.</h2>
137<i>int</i>
138<b>libwebsocket_callback_on_writable_all_protocol</b>
139(<i>const struct libwebsocket_protocols *</i> <b>protocol</b>)
140<h3>Arguments</h3>
141<dl>
142<dt><b>protocol</b>
143<dd>Protocol whose connections will get callbacks
144</dl>
145<hr>
Andy Greenbe93fef2011-02-14 20:25:43 +0000146<h2>libwebsocket_set_timeout - marks the wsi as subject to a timeout</h2>
147<i>void</i>
148<b>libwebsocket_set_timeout</b>
149(<i>struct libwebsocket *</i> <b>wsi</b>,
150<i>enum pending_timeout</i> <b>reason</b>,
151<i>int</i> <b>secs</b>)
152<h3>Arguments</h3>
153<dl>
154<dt><b>wsi</b>
155<dd>Websocket connection instance
156<dt><b>reason</b>
157<dd>timeout reason
158<dt><b>secs</b>
159<dd>how many seconds
160</dl>
161<h3>Description</h3>
162<blockquote>
163<p>
164You will not need this unless you are doing something special
165</blockquote>
166<hr>
Andy Greena6cbece2011-01-27 20:06:03 +0000167<h2>libwebsocket_get_socket_fd - returns the socket file descriptor</h2>
168<i>int</i>
169<b>libwebsocket_get_socket_fd</b>
170(<i>struct libwebsocket *</i> <b>wsi</b>)
171<h3>Arguments</h3>
172<dl>
173<dt><b>wsi</b>
174<dd>Websocket connection instance
175</dl>
176<h3>Description</h3>
177<blockquote>
178<p>
179You will not need this unless you are doing something special
180</blockquote>
181<hr>
Andy Green90c7cbc2011-01-27 06:26:52 +0000182<h2>libwebsocket_rx_flow_control - Enable and disable socket servicing for receieved packets.</h2>
183<i>int</i>
184<b>libwebsocket_rx_flow_control</b>
185(<i>struct libwebsocket *</i> <b>wsi</b>,
186<i>int</i> <b>enable</b>)
187<h3>Arguments</h3>
188<dl>
189<dt><b>wsi</b>
190<dd>Websocket connection instance to get callback for
191<dt><b>enable</b>
192<dd>0 = disable read servicing for this connection, 1 = enable
193</dl>
194<h3>Description</h3>
195<blockquote>
196<p>
197If the output side of a server process becomes choked, this allows flow
198control for the input side.
199</blockquote>
200<hr>
Andy Green2ac5a6f2011-01-28 10:00:18 +0000201<h2>libwebsocket_canonical_hostname - returns this host's hostname</h2>
202<i>const char *</i>
203<b>libwebsocket_canonical_hostname</b>
Peter Hinz56885f32011-03-02 22:03:47 +0000204(<i>struct libwebsocket_context *</i> <b>context</b>)
Andy Green2ac5a6f2011-01-28 10:00:18 +0000205<h3>Arguments</h3>
206<dl>
Peter Hinz56885f32011-03-02 22:03:47 +0000207<dt><b>context</b>
Andy Green2ac5a6f2011-01-28 10:00:18 +0000208<dd>Websocket context
209</dl>
210<h3>Description</h3>
211<blockquote>
212<p>
213This is typically used by client code to fill in the host parameter
214when making a client connection. You can only call it after the context
215has been created.
216</blockquote>
217<hr>
Andy Green4739e5c2011-01-22 12:51:57 +0000218<h2>libwebsocket_create_context - Create the websocket handler</h2>
Andy Greene92cd172011-01-19 13:11:55 +0000219<i>struct libwebsocket_context *</i>
Andy Green4739e5c2011-01-22 12:51:57 +0000220<b>libwebsocket_create_context</b>
Andy Green62a12932010-11-03 11:19:23 +0000221(<i>int</i> <b>port</b>,
Peter Hinz56885f32011-03-02 22:03:47 +0000222<i>const char *</i> <b>interf</b>,
Andy Greenb45993c2010-12-18 15:13:50 +0000223<i>struct libwebsocket_protocols *</i> <b>protocols</b>,
Andy Greend6e09112011-03-05 16:12:15 +0000224<i>struct libwebsocket_extension *</i> <b>extensions</b>,
Andy Green3faa9c72010-11-08 17:03:03 +0000225<i>const char *</i> <b>ssl_cert_filepath</b>,
226<i>const char *</i> <b>ssl_private_key_filepath</b>,
David Galeano2f82be82013-01-09 16:25:54 +0800227<i>const char *</i> <b>ssl_ca_filepath</b>,
Andy Green3faa9c72010-11-08 17:03:03 +0000228<i>int</i> <b>gid</b>,
Andy Green8014b292011-01-30 20:57:25 +0000229<i>int</i> <b>uid</b>,
Alon Levy0291eb32012-10-19 11:21:56 +0200230<i>unsigned int</i> <b>options</b>,
231<i>void *</i> <b>user</b>)
Andy Green62a12932010-11-03 11:19:23 +0000232<h3>Arguments</h3>
233<dl>
234<dt><b>port</b>
Andy Green4739e5c2011-01-22 12:51:57 +0000235<dd>Port to listen on... you can use 0 to suppress listening on
236any port, that's what you want if you are not running a
237websocket server at all but just using it as a client
Peter Hinz56885f32011-03-02 22:03:47 +0000238<dt><b>interf</b>
Andy Green32375b72011-02-19 08:32:53 +0000239<dd>NULL to bind the listen socket to all interfaces, or the
240interface name, eg, "eth2"
Andy Green4f3943a2010-11-12 10:44:16 +0000241<dt><b>protocols</b>
242<dd>Array of structures listing supported protocols and a protocol-
243specific callback for each one. The list is ended with an
244entry that has a NULL callback pointer.
Andy Greenb45993c2010-12-18 15:13:50 +0000245It's not const because we write the owning_server member
Andy Greenc5114822011-03-06 10:29:35 +0000246<dt><b>extensions</b>
247<dd>NULL or array of libwebsocket_extension structs listing the
Andy Green3182ece2013-01-20 17:08:31 +0800248extensions this context supports. If you configured with
249--without-extensions, you should give NULL here.
Andy Green3faa9c72010-11-08 17:03:03 +0000250<dt><b>ssl_cert_filepath</b>
251<dd>If libwebsockets was compiled to use ssl, and you want
252to listen using SSL, set to the filepath to fetch the
253server cert from, otherwise NULL for unencrypted
254<dt><b>ssl_private_key_filepath</b>
255<dd>filepath to private key if wanting SSL mode,
256else ignored
David Galeano2f82be82013-01-09 16:25:54 +0800257<dt><b>ssl_ca_filepath</b>
Andy Green988bd982013-01-10 12:26:13 +0800258<dd>CA certificate filepath or NULL
Andy Green3faa9c72010-11-08 17:03:03 +0000259<dt><b>gid</b>
260<dd>group id to change to after setting listen socket, or -1.
261<dt><b>uid</b>
262<dd>user id to change to after setting listen socket, or -1.
Andy Greenbfb051f2011-02-09 08:49:14 +0000263<dt><b>options</b>
264<dd>0, or LWS_SERVER_OPTION_DEFEAT_CLIENT_MASK
Andy Green788c4a82012-10-22 12:29:57 +0100265<dt><b>user</b>
266<dd>optional user pointer that can be recovered via the context
267pointer using libwebsocket_context_user
Andy Green62a12932010-11-03 11:19:23 +0000268</dl>
269<h3>Description</h3>
270<blockquote>
Andy Green47943ae2010-11-12 11:15:49 +0000271This function creates the listening socket and takes care
Andy Green62a12932010-11-03 11:19:23 +0000272of all initialization in one step.
273<p>
Andy Greene92cd172011-01-19 13:11:55 +0000274After initialization, it returns a struct libwebsocket_context * that
275represents this server. After calling, user code needs to take care
276of calling <b>libwebsocket_service</b> with the context pointer to get the
277server's sockets serviced. This can be done in the same process context
278or a forked process, or another thread,
Andy Green47943ae2010-11-12 11:15:49 +0000279<p>
280The protocol callback functions are called for a handful of events
281including http requests coming in, websocket connections becoming
Andy Green62a12932010-11-03 11:19:23 +0000282established, and data arriving; it's also called periodically to allow
283async transmission.
284<p>
Andy Green47943ae2010-11-12 11:15:49 +0000285HTTP requests are sent always to the FIRST protocol in <tt><b>protocol</b></tt>, since
286at that time websocket protocol has not been negotiated. Other
287protocols after the first one never see any HTTP callack activity.
288<p>
Andy Green62a12932010-11-03 11:19:23 +0000289The server created is a simple http server by default; part of the
290websocket standard is upgrading this http connection to a websocket one.
291<p>
292This allows the same server to provide files like scripts and favicon /
293images or whatever over http and dynamic data over websockets all in
294one place; they're all handled in the user callback.
295</blockquote>
296<hr>
Andy Greene92cd172011-01-19 13:11:55 +0000297<h2>libwebsockets_fork_service_loop - Optional helper function forks off a process for the websocket server loop. You don't have to use this but if not, you have to make sure you are calling libwebsocket_service periodically to service the websocket traffic</h2>
298<i>int</i>
299<b>libwebsockets_fork_service_loop</b>
Peter Hinz56885f32011-03-02 22:03:47 +0000300(<i>struct libwebsocket_context *</i> <b>context</b>)
Andy Greene92cd172011-01-19 13:11:55 +0000301<h3>Arguments</h3>
302<dl>
Peter Hinz56885f32011-03-02 22:03:47 +0000303<dt><b>context</b>
Andy Greene92cd172011-01-19 13:11:55 +0000304<dd>server context returned by creation function
305</dl>
306<hr>
Andy Greenb45993c2010-12-18 15:13:50 +0000307<h2>libwebsockets_get_protocol - Returns a protocol pointer from a websocket connection.</h2>
308<i>const struct libwebsocket_protocols *</i>
309<b>libwebsockets_get_protocol</b>
310(<i>struct libwebsocket *</i> <b>wsi</b>)
311<h3>Arguments</h3>
312<dl>
313<dt><b>wsi</b>
314<dd>pointer to struct websocket you want to know the protocol of
315</dl>
316<h3>Description</h3>
317<blockquote>
318<p>
319This is useful to get the protocol to broadcast back to from inside
320the callback.
321</blockquote>
322<hr>
Andy Greene92cd172011-01-19 13:11:55 +0000323<h2>libwebsockets_broadcast - Sends a buffer to the callback for all active connections of the given protocol.</h2>
Andy Greenb45993c2010-12-18 15:13:50 +0000324<i>int</i>
325<b>libwebsockets_broadcast</b>
326(<i>const struct libwebsocket_protocols *</i> <b>protocol</b>,
327<i>unsigned char *</i> <b>buf</b>,
328<i>size_t</i> <b>len</b>)
329<h3>Arguments</h3>
330<dl>
331<dt><b>protocol</b>
332<dd>pointer to the protocol you will broadcast to all members of
333<dt><b>buf</b>
334<dd>buffer containing the data to be broadcase. NOTE: this has to be
335allocated with LWS_SEND_BUFFER_PRE_PADDING valid bytes before
336the pointer and LWS_SEND_BUFFER_POST_PADDING afterwards in the
337case you are calling this function from callback context.
338<dt><b>len</b>
339<dd>length of payload data in buf, starting from buf.
340</dl>
341<h3>Description</h3>
342<blockquote>
343This function allows bulk sending of a packet to every connection using
344the given protocol. It does not send the data directly; instead it calls
345the callback with a reason type of LWS_CALLBACK_BROADCAST. If the callback
346wants to actually send the data for that connection, the callback itself
347should call <b>libwebsocket_write</b>.
348<p>
349<b>libwebsockets_broadcast</b> can be called from another fork context without
350having to take any care about data visibility between the processes, it'll
351"just work".
352</blockquote>
353<hr>
Andy Greenacbaee62013-01-18 22:00:22 +0800354<h2>lws_confirm_legit_wsi - </h2>
355<i>int</i>
356<b>lws_confirm_legit_wsi</b>
357(<i>struct libwebsocket *</i> <b>wsi</b>)
358<h3>Arguments</h3>
359<dl>
360<dt><b>wsi</b>
361<dd>struct libwebsocket to assess
362</dl>
363<h3>Description</h3>
364<blockquote>
365Performs consistecy checks on what the wsi claims and what the
366polling arrays hold. This'll catch a closed wsi still in use.
367Don't try to use on the listen (nonconnection) wsi as it will
368fail it. Otherwise 0 return == wsi seems consistent.
369</blockquote>
370<hr>
Andy Green43db0452013-01-10 19:50:35 +0800371<h2>lws_set_log_level - Set the logging bitfield</h2>
372<i>void</i>
373<b>lws_set_log_level</b>
Andy Greende8f27a2013-01-12 09:17:42 +0800374(<i>int</i> <b>level</b>,
Andy Green058ba812013-01-19 11:32:18 +0800375<i>void (*</i><b>log_emit_function</b>) <i>(int level, const char *line)</i>)
Andy Green43db0452013-01-10 19:50:35 +0800376<h3>Arguments</h3>
377<dl>
378<dt><b>level</b>
379<dd>OR together the LLL_ debug contexts you want output from
Andy Greende8f27a2013-01-12 09:17:42 +0800380<dt><b>log_emit_function</b>
381<dd>NULL to leave it as it is, or a user-supplied
382function to perform log string emission instead of
383the default stderr one.
Andy Green43db0452013-01-10 19:50:35 +0800384</dl>
385<h3>Description</h3>
386<blockquote>
Andy Greende8f27a2013-01-12 09:17:42 +0800387log level defaults to "err" and "warn" contexts enabled only and
388emission on stderr.
Andy Green43db0452013-01-10 19:50:35 +0800389</blockquote>
390<hr>
Andy Green2fd3f2f2013-01-18 09:49:20 +0800391<h2>lws_frame_is_binary - </h2>
392<i>int</i>
393<b>lws_frame_is_binary</b>
394(<i>struct libwebsocket *</i> <b>wsi</b>)
395<h3>Arguments</h3>
396<dl>
397<dt><b>wsi</b>
398<dd>the connection we are inquiring about
399</dl>
400<h3>Description</h3>
401<blockquote>
402This is intended to be called from the LWS_CALLBACK_RECEIVE callback if
403it's interested to see if the frame it's dealing with was sent in binary
404mode.
405</blockquote>
406<hr>
Andy Green38e57bb2011-01-19 12:20:27 +0000407<h2>libwebsockets_remaining_packet_payload - Bytes to come before "overall" rx packet is complete</h2>
408<i>size_t</i>
409<b>libwebsockets_remaining_packet_payload</b>
410(<i>struct libwebsocket *</i> <b>wsi</b>)
411<h3>Arguments</h3>
412<dl>
413<dt><b>wsi</b>
414<dd>Websocket instance (available from user callback)
415</dl>
416<h3>Description</h3>
417<blockquote>
418This function is intended to be called from the callback if the
419user code is interested in "complete packets" from the client.
420libwebsockets just passes through payload as it comes and issues a buffer
421additionally when it hits a built-in limit. The LWS_CALLBACK_RECEIVE
422callback handler can use this API to find out if the buffer it has just
423been given is the last piece of a "complete packet" from the client --
424when that is the case <b>libwebsockets_remaining_packet_payload</b> will return
4250.
426<p>
427Many protocols won't care becuse their packets are always small.
428</blockquote>
429<hr>
Andy Green90c7cbc2011-01-27 06:26:52 +0000430<h2>libwebsocket_client_connect - Connect to another websocket server</h2>
431<i>struct libwebsocket *</i>
432<b>libwebsocket_client_connect</b>
Peter Hinz56885f32011-03-02 22:03:47 +0000433(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green90c7cbc2011-01-27 06:26:52 +0000434<i>const char *</i> <b>address</b>,
435<i>int</i> <b>port</b>,
436<i>int</i> <b>ssl_connection</b>,
437<i>const char *</i> <b>path</b>,
438<i>const char *</i> <b>host</b>,
439<i>const char *</i> <b>origin</b>,
Andy Greenbfb051f2011-02-09 08:49:14 +0000440<i>const char *</i> <b>protocol</b>,
441<i>int</i> <b>ietf_version_or_minus_one</b>)
Andy Green90c7cbc2011-01-27 06:26:52 +0000442<h3>Arguments</h3>
443<dl>
Peter Hinz56885f32011-03-02 22:03:47 +0000444<dt><b>context</b>
Andy Green90c7cbc2011-01-27 06:26:52 +0000445<dd>Websocket context
446<dt><b>address</b>
447<dd>Remote server address, eg, "myserver.com"
448<dt><b>port</b>
449<dd>Port to connect to on the remote server, eg, 80
450<dt><b>ssl_connection</b>
451<dd>0 = ws://, 1 = wss:// encrypted, 2 = wss:// allow self
452signed certs
453<dt><b>path</b>
454<dd>Websocket path on server
455<dt><b>host</b>
456<dd>Hostname on server
457<dt><b>origin</b>
458<dd>Socket origin name
459<dt><b>protocol</b>
460<dd>Comma-separated list of protocols being asked for from
461the server, or just one. The server will pick the one it
462likes best.
Andy Greenbfb051f2011-02-09 08:49:14 +0000463<dt><b>ietf_version_or_minus_one</b>
464<dd>-1 to ask to connect using the default, latest
465protocol supported, or the specific protocol ordinal
Andy Green90c7cbc2011-01-27 06:26:52 +0000466</dl>
467<h3>Description</h3>
468<blockquote>
469This function creates a connection to a remote server
470</blockquote>
471<hr>
David Brooks2c60d952012-04-20 12:19:01 +0800472<h2>libwebsocket_client_connect_extended - Connect to another websocket server</h2>
473<i>struct libwebsocket *</i>
474<b>libwebsocket_client_connect_extended</b>
475(<i>struct libwebsocket_context *</i> <b>context</b>,
476<i>const char *</i> <b>address</b>,
477<i>int</i> <b>port</b>,
478<i>int</i> <b>ssl_connection</b>,
479<i>const char *</i> <b>path</b>,
480<i>const char *</i> <b>host</b>,
481<i>const char *</i> <b>origin</b>,
482<i>const char *</i> <b>protocol</b>,
483<i>int</i> <b>ietf_version_or_minus_one</b>,
484<i>void *</i> <b>userdata</b>)
485<h3>Arguments</h3>
486<dl>
487<dt><b>context</b>
488<dd>Websocket context
489<dt><b>address</b>
490<dd>Remote server address, eg, "myserver.com"
491<dt><b>port</b>
492<dd>Port to connect to on the remote server, eg, 80
493<dt><b>ssl_connection</b>
494<dd>0 = ws://, 1 = wss:// encrypted, 2 = wss:// allow self
495signed certs
496<dt><b>path</b>
497<dd>Websocket path on server
498<dt><b>host</b>
499<dd>Hostname on server
500<dt><b>origin</b>
501<dd>Socket origin name
502<dt><b>protocol</b>
503<dd>Comma-separated list of protocols being asked for from
504the server, or just one. The server will pick the one it
505likes best.
506<dt><b>ietf_version_or_minus_one</b>
507<dd>-1 to ask to connect using the default, latest
508protocol supported, or the specific protocol ordinal
509<dt><b>userdata</b>
510<dd>Pre-allocated user data
511</dl>
512<h3>Description</h3>
513<blockquote>
514This function creates a connection to a remote server
515</blockquote>
516<hr>
Andy Green8f037e42010-12-19 22:13:26 +0000517<h2>callback - User server actions</h2>
Andy Green07b56e62011-10-03 19:30:22 +0800518<i>LWS_EXTERN int</i>
Andy Green8f037e42010-12-19 22:13:26 +0000519<b>callback</b>
Darin Willitsc19456f2011-02-14 17:52:39 +0000520(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green62c54d22011-02-14 09:14:25 +0000521<i>struct libwebsocket *</i> <b>wsi</b>,
Andy Green8f037e42010-12-19 22:13:26 +0000522<i>enum libwebsocket_callback_reasons</i> <b>reason</b>,
523<i>void *</i> <b>user</b>,
524<i>void *</i> <b>in</b>,
525<i>size_t</i> <b>len</b>)
526<h3>Arguments</h3>
527<dl>
Andy Green32375b72011-02-19 08:32:53 +0000528<dt><b>context</b>
529<dd>Websockets context
Andy Green8f037e42010-12-19 22:13:26 +0000530<dt><b>wsi</b>
531<dd>Opaque websocket instance pointer
532<dt><b>reason</b>
533<dd>The reason for the call
534<dt><b>user</b>
535<dd>Pointer to per-session user data allocated by library
536<dt><b>in</b>
537<dd>Pointer used for some callback reasons
538<dt><b>len</b>
539<dd>Length set for some callback reasons
540</dl>
541<h3>Description</h3>
542<blockquote>
543This callback is the way the user controls what is served. All the
544protocol detail is hidden and handled by the library.
545<p>
546For each connection / session there is user data allocated that is
547pointed to by "user". You set the size of this user data area when
548the library is initialized with libwebsocket_create_server.
549<p>
550You get an opportunity to initialize user data when called back with
551LWS_CALLBACK_ESTABLISHED reason.
552</blockquote>
553<h3>LWS_CALLBACK_ESTABLISHED</h3>
554<blockquote>
Andy Green90c7cbc2011-01-27 06:26:52 +0000555after the server completes a handshake with
556an incoming client
557</blockquote>
David Brooks2c60d952012-04-20 12:19:01 +0800558<h3>LWS_CALLBACK_CLIENT_CONNECTION_ERROR</h3>
559<blockquote>
560the request client connection has
561been unable to complete a handshake with the remote server
562</blockquote>
Andy Green90c7cbc2011-01-27 06:26:52 +0000563<h3>LWS_CALLBACK_CLIENT_ESTABLISHED</h3>
564<blockquote>
565after your client connection completed
566a handshake with the remote server
Andy Green8f037e42010-12-19 22:13:26 +0000567</blockquote>
568<h3>LWS_CALLBACK_CLOSED</h3>
569<blockquote>
570when the websocket session ends
571</blockquote>
572<h3>LWS_CALLBACK_BROADCAST</h3>
573<blockquote>
574signal to send to client (you would use
575<b>libwebsocket_write</b> taking care about the
576special buffer requirements
577</blockquote>
578<h3>LWS_CALLBACK_RECEIVE</h3>
579<blockquote>
Andy Green90c7cbc2011-01-27 06:26:52 +0000580data has appeared for this server endpoint from a
581remote client, it can be found at *in and is
582len bytes long
583</blockquote>
Andy Greena6cbece2011-01-27 20:06:03 +0000584<h3>LWS_CALLBACK_CLIENT_RECEIVE_PONG</h3>
585<blockquote>
586if you elected to see PONG packets,
587they appear with this callback reason. PONG
588packets only exist in 04+ protocol
589</blockquote>
Andy Green90c7cbc2011-01-27 06:26:52 +0000590<h3>LWS_CALLBACK_CLIENT_RECEIVE</h3>
591<blockquote>
592data has appeared from the server for the
593client connection, it can be found at *in and
594is len bytes long
Andy Green8f037e42010-12-19 22:13:26 +0000595</blockquote>
596<h3>LWS_CALLBACK_HTTP</h3>
597<blockquote>
598an http request has come from a client that is not
599asking to upgrade the connection to a websocket
600one. This is a chance to serve http content,
601for example, to send a script to the client
602which will then open the websockets connection.
Andy Green7619c472011-01-23 17:47:08 +0000603<tt><b>in</b></tt> points to the URI path requested and
Andy Green8f037e42010-12-19 22:13:26 +0000604<b>libwebsockets_serve_http_file</b> makes it very
605simple to send back a file to the client.
Andy Green24b588b2013-01-13 09:53:18 +0800606Normally after sending the file you are done
607with the http connection, since the rest of the
608activity will come by websockets from the script
609that was delivered by http, so you will want to
610return 1; to close and free up the connection.
611That's important because it uses a slot in the
612total number of client connections allowed set
613by MAX_CLIENTS.
Andy Green8f037e42010-12-19 22:13:26 +0000614</blockquote>
Andy Greend280b6e2013-01-15 13:40:23 +0800615<h3>LWS_CALLBACK_HTTP_FILE_COMPLETION</h3>
616<blockquote>
617a file requested to be send down
618http link has completed.
619</blockquote>
Andy Greene9739ed2011-03-07 21:40:59 +0000620<h3>LWS_CALLBACK_SERVER_WRITEABLE</h3>
Andy Green90c7cbc2011-01-27 06:26:52 +0000621<blockquote>
Andy Greene9739ed2011-03-07 21:40:59 +0000622If you call
Andy Green90c7cbc2011-01-27 06:26:52 +0000623<b>libwebsocket_callback_on_writable</b> on a connection, you will
Andy Greene9739ed2011-03-07 21:40:59 +0000624get one of these callbacks coming when the connection socket
625is able to accept another write packet without blocking.
626If it already was able to take another packet without blocking,
627you'll get this callback at the next call to the service loop
628function. Notice that CLIENTs get LWS_CALLBACK_CLIENT_WRITEABLE
629and servers get LWS_CALLBACK_SERVER_WRITEABLE.
Andy Green90c7cbc2011-01-27 06:26:52 +0000630</blockquote>
Andy Green07034092011-02-13 08:37:12 +0000631<h3>LWS_CALLBACK_FILTER_NETWORK_CONNECTION</h3>
632<blockquote>
633called when a client connects to
634the server at network level; the connection is accepted but then
635passed to this callback to decide whether to hang up immediately
636or not, based on the client IP. <tt><b>user</b></tt> contains the connection
637socket's descriptor. Return non-zero to terminate
638the connection before sending or receiving anything.
639Because this happens immediately after the network connection
640from the client, there's no websocket protocol selected yet so
641this callback is issued only to protocol 0.
642</blockquote>
Andy Greenc85619d2011-02-13 08:25:26 +0000643<h3>LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION</h3>
644<blockquote>
645called when the handshake has
646been received and parsed from the client, but the response is
647not sent yet. Return non-zero to disallow the connection.
Andy Green07034092011-02-13 08:37:12 +0000648<tt><b>user</b></tt> is a pointer to an array of struct lws_tokens, you can
649use the header enums lws_token_indexes from libwebsockets.h
650to check for and read the supported header presence and
651content before deciding to allow the handshake to proceed or
652to kill the connection.
Andy Green0894bda2011-02-19 09:09:11 +0000653</blockquote>
654<h3>LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS</h3>
655<blockquote>
Andy Green6901cb32011-02-21 08:06:47 +0000656if configured for
Andy Green0894bda2011-02-19 09:09:11 +0000657including OpenSSL support, this callback allows your user code
658to perform extra <b>SSL_CTX_load_verify_locations</b> or similar
659calls to direct OpenSSL where to find certificates the client
660can use to confirm the remote server identity. <tt><b>user</b></tt> is the
661OpenSSL SSL_CTX*
Andy Green6901cb32011-02-21 08:06:47 +0000662</blockquote>
663<h3>LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS</h3>
664<blockquote>
665if configured for
666including OpenSSL support, this callback allows your user code
667to load extra certifcates into the server which allow it to
668verify the validity of certificates returned by clients. <tt><b>user</b></tt>
669is the server's OpenSSL SSL_CTX*
670</blockquote>
671<h3>LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION</h3>
672<blockquote>
673if the
674libwebsockets context was created with the option
675LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT, then this
676callback is generated during OpenSSL verification of the cert
677sent from the client. It is sent to protocol[0] callback as
678no protocol has been negotiated on the connection yet.
679Notice that the libwebsockets context and wsi are both NULL
680during this callback. See
681</blockquote>
682<h3>http</h3>
683<blockquote>
684//www.openssl.org/docs/ssl/SSL_CTX_set_verify.html
685to understand more detail about the OpenSSL callback that
686generates this libwebsockets callback and the meanings of the
687arguments passed. In this callback, <tt><b>user</b></tt> is the x509_ctx,
688<tt><b>in</b></tt> is the ssl pointer and <tt><b>len</b></tt> is preverify_ok
689Notice that this callback maintains libwebsocket return
690conventions, return 0 to mean the cert is OK or 1 to fail it.
691This also means that if you don't handle this callback then
692the default callback action of returning 0 allows the client
693certificates.
Andy Green385e7ad2011-03-01 21:06:02 +0000694</blockquote>
695<h3>LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER</h3>
696<blockquote>
697this callback happens
698when a client handshake is being compiled. <tt><b>user</b></tt> is NULL,
699<tt><b>in</b></tt> is a char **, it's pointing to a char * which holds the
700next location in the header buffer where you can add
701headers, and <tt><b>len</b></tt> is the remaining space in the header buffer,
702which is typically some hundreds of bytes. So, to add a canned
703cookie, your handler code might look similar to:
704<p>
705char **p = (char **)in;
706<p>
707if (len &lt; 100)
708return 1;
709<p>
710*p += sprintf(*p, "Cookie: a=b\x0d\x0a");
711<p>
712return 0;
713<p>
714Notice if you add anything, you just have to take care about
715the CRLF on the line you added. Obviously this callback is
716optional, if you don't handle it everything is fine.
717<p>
718Notice the callback is coming to protocols[0] all the time,
719because there is no specific protocol handshook yet.
Andy Greenc5114822011-03-06 10:29:35 +0000720</blockquote>
721<h3>LWS_CALLBACK_CONFIRM_EXTENSION_OKAY</h3>
722<blockquote>
723When the server handshake code
724sees that it does support a requested extension, before
725accepting the extension by additing to the list sent back to
726the client it gives this callback just to check that it's okay
727to use that extension. It calls back to the requested protocol
728and with <tt><b>in</b></tt> being the extension name, <tt><b>len</b></tt> is 0 and <tt><b>user</b></tt> is
729valid. Note though at this time the ESTABLISHED callback hasn't
730happened yet so if you initialize <tt><b>user</b></tt> content there, <tt><b>user</b></tt>
731content during this callback might not be useful for anything.
732Notice this callback comes to protocols[0].
Andy Greenc6517fa2011-03-06 13:15:29 +0000733</blockquote>
734<h3>LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED</h3>
735<blockquote>
736When a client
737connection is being prepared to start a handshake to a server,
738each supported extension is checked with protocols[0] callback
739with this reason, giving the user code a chance to suppress the
740claim to support that extension by returning non-zero. If
741unhandled, by default 0 will be returned and the extension
742support included in the header to the server. Notice this
743callback comes to protocols[0].
Andy Greenc85619d2011-02-13 08:25:26 +0000744<p>
745The next four reasons are optional and only need taking care of if you
746will be integrating libwebsockets sockets into an external polling
747array.
748</blockquote>
749<h3>LWS_CALLBACK_ADD_POLL_FD</h3>
750<blockquote>
751libwebsocket deals with its <b>poll</b> loop
752internally, but in the case you are integrating with another
753server you will need to have libwebsocket sockets share a
754polling array with the other server. This and the other
755POLL_FD related callbacks let you put your specialized
756poll array interface code in the callback for protocol 0, the
757first protocol you support, usually the HTTP protocol in the
758serving case. This callback happens when a socket needs to be
759</blockquote>
760<h3>added to the polling loop</h3>
761<blockquote>
762<tt><b>user</b></tt> contains the fd, and
763<tt><b>len</b></tt> is the events bitmap (like, POLLIN). If you are using the
764internal polling loop (the "service" callback), you can just
765ignore these callbacks.
766</blockquote>
767<h3>LWS_CALLBACK_DEL_POLL_FD</h3>
768<blockquote>
769This callback happens when a socket descriptor
770needs to be removed from an external polling array. <tt><b>user</b></tt> is
771the socket desricptor. If you are using the internal polling
772loop, you can just ignore it.
773</blockquote>
774<h3>LWS_CALLBACK_SET_MODE_POLL_FD</h3>
775<blockquote>
776This callback happens when libwebsockets
777wants to modify the events for the socket descriptor in <tt><b>user</b></tt>.
778The handler should OR <tt><b>len</b></tt> on to the events member of the pollfd
779struct for this socket descriptor. If you are using the
780internal polling loop, you can just ignore it.
781</blockquote>
782<h3>LWS_CALLBACK_CLEAR_MODE_POLL_FD</h3>
783<blockquote>
784This callback occurs when libwebsockets
785wants to modify the events for the socket descriptor in <tt><b>user</b></tt>.
786The handler should AND ~<tt><b>len</b></tt> on to the events member of the
787pollfd struct for this socket descriptor. If you are using the
788internal polling loop, you can just ignore it.
789</blockquote>
Andy Green8f037e42010-12-19 22:13:26 +0000790<hr>
Andy Green57b4e9a2011-03-06 13:14:46 +0000791<h2>extension_callback - Hooks to allow extensions to operate</h2>
Andy Green07b56e62011-10-03 19:30:22 +0800792<i>LWS_EXTERN int</i>
Andy Green57b4e9a2011-03-06 13:14:46 +0000793<b>extension_callback</b>
794(<i>struct libwebsocket_context *</i> <b>context</b>,
Andy Green46c2ea02011-03-22 09:04:01 +0000795<i>struct libwebsocket_extension *</i> <b>ext</b>,
Andy Green57b4e9a2011-03-06 13:14:46 +0000796<i>struct libwebsocket *</i> <b>wsi</b>,
David Brooks2c60d952012-04-20 12:19:01 +0800797<i>enum libwebsocket_extension_callback_reasons</i> <b>reason</b>,
Andy Green57b4e9a2011-03-06 13:14:46 +0000798<i>void *</i> <b>user</b>,
799<i>void *</i> <b>in</b>,
800<i>size_t</i> <b>len</b>)
801<h3>Arguments</h3>
802<dl>
803<dt><b>context</b>
804<dd>Websockets context
Andy Green46c2ea02011-03-22 09:04:01 +0000805<dt><b>ext</b>
806<dd>This extension
Andy Green57b4e9a2011-03-06 13:14:46 +0000807<dt><b>wsi</b>
808<dd>Opaque websocket instance pointer
809<dt><b>reason</b>
810<dd>The reason for the call
811<dt><b>user</b>
812<dd>Pointer to per-session user data allocated by library
813<dt><b>in</b>
814<dd>Pointer used for some callback reasons
815<dt><b>len</b>
816<dd>Length set for some callback reasons
817</dl>
818<h3>Description</h3>
819<blockquote>
820Each extension that is active on a particular connection receives
821callbacks during the connection lifetime to allow the extension to
822operate on websocket data and manage itself.
823<p>
824Libwebsockets takes care of allocating and freeing "user" memory for
825each active extension on each connection. That is what is pointed to
826by the <tt><b>user</b></tt> parameter.
827</blockquote>
828<h3>LWS_EXT_CALLBACK_CONSTRUCT</h3>
829<blockquote>
830called when the server has decided to
831select this extension from the list provided by the client,
832just before the server will send back the handshake accepting
833the connection with this extension active. This gives the
834extension a chance to initialize its connection context found
835in <tt><b>user</b></tt>.
836</blockquote>
Andy Green2366b1c2011-03-06 13:15:31 +0000837<h3>LWS_EXT_CALLBACK_CLIENT_CONSTRUCT</h3>
838<blockquote>
839same as LWS_EXT_CALLBACK_CONSTRUCT
840but called when client is instantiating this extension. Some
841extensions will work the same on client and server side and then
842you can just merge handlers for both CONSTRUCTS.
843</blockquote>
Andy Green57b4e9a2011-03-06 13:14:46 +0000844<h3>LWS_EXT_CALLBACK_DESTROY</h3>
845<blockquote>
846called when the connection the extension was
847being used on is about to be closed and deallocated. It's the
848last chance for the extension to deallocate anything it has
849allocated in the user data (pointed to by <tt><b>user</b></tt>) before the
Andy Green2366b1c2011-03-06 13:15:31 +0000850user data is deleted. This same callback is used whether you
851are in client or server instantiation context.
Andy Green57b4e9a2011-03-06 13:14:46 +0000852</blockquote>
853<h3>LWS_EXT_CALLBACK_PACKET_RX_PREPARSE</h3>
854<blockquote>
855when this extension was active on
856a connection, and a packet of data arrived at the connection,
857it is passed to this callback to give the extension a chance to
858change the data, eg, decompress it. <tt><b>user</b></tt> is pointing to the
859extension's private connection context data, <tt><b>in</b></tt> is pointing
860to an lws_tokens struct, it consists of a char * pointer called
861token, and an int called token_len. At entry, these are
862set to point to the received buffer and set to the content
863length. If the extension will grow the content, it should use
864a new buffer allocated in its private user context data and
865set the pointed-to lws_tokens members to point to its buffer.
866</blockquote>
867<h3>LWS_EXT_CALLBACK_PACKET_TX_PRESEND</h3>
868<blockquote>
869this works the same way as
870LWS_EXT_CALLBACK_PACKET_RX_PREPARSE above, except it gives the
871extension a chance to change websocket data just before it will
872be sent out. Using the same lws_token pointer scheme in <tt><b>in</b></tt>,
873the extension can change the buffer and the length to be
874transmitted how it likes. Again if it wants to grow the
875buffer safely, it should copy the data into its own buffer and
876set the lws_tokens token pointer to it.
877</blockquote>
878<hr>
Andy Green4f3943a2010-11-12 10:44:16 +0000879<h2>struct libwebsocket_protocols - List of protocols and handlers server supports.</h2>
880<b>struct libwebsocket_protocols</b> {<br>
881&nbsp; &nbsp; <i>const char *</i> <b>name</b>;<br>
David Brooks2c60d952012-04-20 12:19:01 +0800882&nbsp; &nbsp; <i>callback_function *</i> <b>callback</b>;<br>
Andy Green4f3943a2010-11-12 10:44:16 +0000883&nbsp; &nbsp; <i>size_t</i> <b>per_session_data_size</b>;<br>
Andy Greenb45993c2010-12-18 15:13:50 +0000884&nbsp; &nbsp; <i>struct libwebsocket_context *</i> <b>owning_server</b>;<br>
885&nbsp; &nbsp; <i>int</i> <b>broadcast_socket_port</b>;<br>
886&nbsp; &nbsp; <i>int</i> <b>broadcast_socket_user_fd</b>;<br>
887&nbsp; &nbsp; <i>int</i> <b>protocol_index</b>;<br>
Andy Green4f3943a2010-11-12 10:44:16 +0000888};<br>
889<h3>Members</h3>
890<dl>
891<dt><b>name</b>
892<dd>Protocol name that must match the one given in the client
893Javascript new WebSocket(url, 'protocol') name
894<dt><b>callback</b>
895<dd>The service callback used for this protocol. It allows the
896service action for an entire protocol to be encapsulated in
897the protocol-specific callback
898<dt><b>per_session_data_size</b>
899<dd>Each new connection using this protocol gets
900this much memory allocated on connection establishment and
901freed on connection takedown. A pointer to this per-connection
902allocation is passed into the callback in the 'user' parameter
Andy Greenb45993c2010-12-18 15:13:50 +0000903<dt><b>owning_server</b>
904<dd>the server init call fills in this opaque pointer when
905registering this protocol with the server.
906<dt><b>broadcast_socket_port</b>
907<dd>the server init call fills this in with the
908localhost port number used to forward broadcasts for this
909protocol
910<dt><b>broadcast_socket_user_fd</b>
911<dd>the server init call fills this in ... the <b>main</b>
912process context can write to this socket to perform broadcasts
913(use the <b>libwebsockets_broadcast</b> api to do this instead,
914it works from any process context)
915<dt><b>protocol_index</b>
916<dd>which protocol we are starting from zero
Andy Green4f3943a2010-11-12 10:44:16 +0000917</dl>
918<h3>Description</h3>
919<blockquote>
920This structure represents one protocol supported by the server. An
921array of these structures is passed to <b>libwebsocket_create_server</b>
922allows as many protocols as you like to be handled by one server.
923</blockquote>
924<hr>
Andy Greend6e09112011-03-05 16:12:15 +0000925<h2>struct libwebsocket_extension - An extension we know how to cope with</h2>
926<b>struct libwebsocket_extension</b> {<br>
927&nbsp; &nbsp; <i>const char *</i> <b>name</b>;<br>
David Brooks2c60d952012-04-20 12:19:01 +0800928&nbsp; &nbsp; <i>extension_callback_function *</i> <b>callback</b>;<br>
Andy Greend6e09112011-03-05 16:12:15 +0000929&nbsp; &nbsp; <i>size_t</i> <b>per_session_data_size</b>;<br>
Andy Greenaa6fc442012-04-12 13:26:49 +0800930&nbsp; &nbsp; <i>void *</i> <b>per_context_private_data</b>;<br>
Andy Greend6e09112011-03-05 16:12:15 +0000931};<br>
932<h3>Members</h3>
933<dl>
934<dt><b>name</b>
935<dd>Formal extension name, eg, "deflate-stream"
936<dt><b>callback</b>
937<dd>Service callback
938<dt><b>per_session_data_size</b>
939<dd>Libwebsockets will auto-malloc this much
940memory for the use of the extension, a pointer
941to it comes in the <tt><b>user</b></tt> callback parameter
Andy Greenaa6fc442012-04-12 13:26:49 +0800942<dt><b>per_context_private_data</b>
943<dd>Optional storage for this externsion that
944is per-context, so it can track stuff across
945all sessions, etc, if it wants
Andy Greend6e09112011-03-05 16:12:15 +0000946</dl>
947<hr>