blob: 676d50e7b04924d455ebf47ecb904048adf2093b [file] [log] [blame]
Andy Greena0da8a82010-11-08 17:12:19 +00001/*
2 * libwebsockets - small server side websockets and web server implementation
Andy Greene77ddd82010-11-13 10:03:47 +00003 *
Andy Green7b405452013-02-01 10:50:15 +08004 * Copyright (C) 2010-2013 Andy Green <andy@warmcat.com>
Andy Greena0da8a82010-11-08 17:12:19 +00005 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation:
9 * version 2.1 of the License.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
19 * MA 02110-1301 USA
20 */
21
Markus Elfring75212332013-10-26 20:23:00 +080022#ifndef LIBWEBSOCKET_H_3060898B846849FF9F88F5DB59B5950C
23#define LIBWEBSOCKET_H_3060898B846849FF9F88F5DB59B5950C
Andy Greenab990e42010-10-31 12:42:52 +000024
Andy Greena11fe942011-09-25 10:30:26 +010025#ifdef __cplusplus
26extern "C" {
Paulo Roberto Urio4144e832012-06-04 09:04:33 +080027#include <cstddef>
Andy Greena11fe942011-09-25 10:30:26 +010028#endif
29
Andreas Pakulat68bd4bd2013-10-28 15:18:04 +010030#if defined(WIN32) || defined(_WIN32)
Peter Hinz56885f32011-03-02 22:03:47 +000031
32#ifndef WIN32_LEAN_AND_MEAN
33#define WIN32_LEAN_AND_MEAN
34#endif
35#include <winsock2.h>
36#include <ws2tcpip.h>
Paulo Roberto Urio4144e832012-06-04 09:04:33 +080037#include <stddef.h>
pmcdona0a0a7eb2013-12-18 10:17:25 +080038#include <basetsd.h>
Andreas Pakulatfe8589c2013-10-16 17:57:17 +020039#include "websock-w32.h"
Peter Hinz56885f32011-03-02 22:03:47 +000040
Andreas Pakulatfe8589c2013-10-16 17:57:17 +020041#include "gettimeofday.h"
Michel Archambault03bec392011-05-24 17:15:25 +010042
Oleg Golosovskiy2ef75052011-10-04 20:20:14 +080043#define strcasecmp stricmp
Andy Greendfb23042013-01-17 12:26:48 +080044#define getdtablesize() 30000
Oleg Golosovskiy2ef75052011-10-04 20:20:14 +080045
Andy Greenac1ebba2014-02-15 12:46:33 +080046#ifdef __MINGW64__
47#else
48#ifdef __MINGW32__
49#else
50
James Chen4ebedc22013-12-14 11:35:01 +080051#ifndef __SSIZE_T
52#define __SSIZE_T
53
54typedef SSIZE_T ssize_t;
55
56#endif // __SSIZE_T
Andy Greenac1ebba2014-02-15 12:46:33 +080057#endif
58#endif
David Brooks06fbcee2012-05-02 06:02:45 +080059
Andy Green3661d7b2013-04-26 07:37:16 +080060#define LWS_VISIBLE
61
David Galeano9454e212011-09-26 12:17:20 +010062#ifdef LWS_DLL
63#ifdef LWS_INTERNAL
64#define LWS_EXTERN extern __declspec(dllexport)
65#else
66#define LWS_EXTERN extern __declspec(dllimport)
67#endif
Andy Green3661d7b2013-04-26 07:37:16 +080068#else
69#define LWS_EXTERN
David Galeano9454e212011-09-26 12:17:20 +010070#endif
71
Joakim Soderbergf272cb02013-02-13 09:29:26 +080072#else // NOT WIN32
Andy Green3b3fa9e2013-12-25 16:34:37 +080073
74/* to get ppoll() */
Michael Haberlereca0e492014-01-10 23:40:14 +010075#ifndef _GNU_SOURCE
76#define _GNU_SOURCE
77#endif
Andy Green9f990342011-02-12 11:57:45 +000078#include <poll.h>
Andy Greendfb23042013-01-17 12:26:48 +080079#include <unistd.h>
Peter Pentchev9a4fef72013-03-30 09:52:21 +080080
81#if defined(__GNUC__)
82#define LWS_VISIBLE __attribute__((visibility("default")))
83#else
84#define LWS_VISIBLE
85#endif
86
Peter Hinz56885f32011-03-02 22:03:47 +000087#endif
Andy Green9f990342011-02-12 11:57:45 +000088
Peter Young27b32372013-01-17 10:10:10 +080089#include <assert.h>
90
David Galeano9454e212011-09-26 12:17:20 +010091#ifndef LWS_EXTERN
92#define LWS_EXTERN extern
93#endif
94
Andy Green4739e5c2011-01-22 12:51:57 +000095#define CONTEXT_PORT_NO_LISTEN 0
Andy Greena41314f2011-05-23 10:00:03 +010096#define MAX_MUX_RECURSION 2
Andy Greenbfb051f2011-02-09 08:49:14 +000097
Andy Green43db0452013-01-10 19:50:35 +080098enum lws_log_levels {
99 LLL_ERR = 1 << 0,
100 LLL_WARN = 1 << 1,
Andy Green7c19c342013-01-19 12:18:07 +0800101 LLL_NOTICE = 1 << 2,
102 LLL_INFO = 1 << 3,
103 LLL_DEBUG = 1 << 4,
104 LLL_PARSER = 1 << 5,
105 LLL_HEADER = 1 << 6,
106 LLL_EXT = 1 << 7,
107 LLL_CLIENT = 1 << 8,
Andy Greend636e352013-01-29 12:36:17 +0800108 LLL_LATENCY = 1 << 9,
Andy Green43db0452013-01-10 19:50:35 +0800109
Andy Greend636e352013-01-29 12:36:17 +0800110 LLL_COUNT = 10 /* set to count of valid flags */
Andy Green43db0452013-01-10 19:50:35 +0800111};
112
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800113LWS_VISIBLE LWS_EXTERN void _lws_log(int filter, const char *format, ...);
Andy Green69e43642013-01-19 11:58:07 +0800114
Andy Greend636e352013-01-29 12:36:17 +0800115/* notice, warn and log are always compiled in */
Andy Green69e43642013-01-19 11:58:07 +0800116#define lwsl_notice(...) _lws_log(LLL_NOTICE, __VA_ARGS__)
117#define lwsl_warn(...) _lws_log(LLL_WARN, __VA_ARGS__)
118#define lwsl_err(...) _lws_log(LLL_ERR, __VA_ARGS__)
Andy Green69e43642013-01-19 11:58:07 +0800119/*
Andy Greend636e352013-01-29 12:36:17 +0800120 * weaker logging can be deselected at configure time using --disable-debug
Andy Green69e43642013-01-19 11:58:07 +0800121 * that gets rid of the overhead of checking while keeping _warn and _err
122 * active
123 */
124#ifdef _DEBUG
Andy Greend636e352013-01-29 12:36:17 +0800125
Andy Green69e43642013-01-19 11:58:07 +0800126#define lwsl_info(...) _lws_log(LLL_INFO, __VA_ARGS__)
127#define lwsl_debug(...) _lws_log(LLL_DEBUG, __VA_ARGS__)
128#define lwsl_parser(...) _lws_log(LLL_PARSER, __VA_ARGS__)
129#define lwsl_header(...) _lws_log(LLL_HEADER, __VA_ARGS__)
Andy Greend636e352013-01-29 12:36:17 +0800130#define lwsl_ext(...) _lws_log(LLL_EXT, __VA_ARGS__)
Andy Green69e43642013-01-19 11:58:07 +0800131#define lwsl_client(...) _lws_log(LLL_CLIENT, __VA_ARGS__)
Andy Greend636e352013-01-29 12:36:17 +0800132#define lwsl_latency(...) _lws_log(LLL_LATENCY, __VA_ARGS__)
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800133LWS_VISIBLE LWS_EXTERN void lwsl_hexdump(void *buf, size_t len);
Andy Greend636e352013-01-29 12:36:17 +0800134
Andy Green69e43642013-01-19 11:58:07 +0800135#else /* no debug */
Andy Greend636e352013-01-29 12:36:17 +0800136
Andy Green69e43642013-01-19 11:58:07 +0800137#define lwsl_info(...)
138#define lwsl_debug(...)
139#define lwsl_parser(...)
140#define lwsl_header(...)
141#define lwsl_ext(...)
142#define lwsl_client(...)
Andy Greend636e352013-01-29 12:36:17 +0800143#define lwsl_latency(...)
Andy Green69e43642013-01-19 11:58:07 +0800144#define lwsl_hexdump(a, b)
Andy Greend636e352013-01-29 12:36:17 +0800145
Andy Green69e43642013-01-19 11:58:07 +0800146#endif
147
Andy Green4e7a1332013-11-11 07:30:33 +0800148#define ARRAY_SIZE(x) (sizeof(x) / sizeof(x[0]))
149
Andy Greenbfb051f2011-02-09 08:49:14 +0000150enum libwebsocket_context_options {
Andy Greenc6bf2c22011-02-20 11:10:47 +0000151 LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT = 2,
Andy Green788c4a82012-10-22 12:29:57 +0100152 LWS_SERVER_OPTION_SKIP_SERVER_CANONICAL_NAME = 4,
James Devine5b34c972013-12-14 11:41:29 +0800153 LWS_SERVER_OPTION_ALLOW_NON_SSL_ON_SSL_PORT = 8
Andy Greenbfb051f2011-02-09 08:49:14 +0000154};
Andy Green8014b292011-01-30 20:57:25 +0000155
Andy Green775c0dd2010-10-29 14:15:22 +0100156enum libwebsocket_callback_reasons {
157 LWS_CALLBACK_ESTABLISHED,
David Brooks80a44972012-04-20 12:18:47 +0800158 LWS_CALLBACK_CLIENT_CONNECTION_ERROR,
Andy Green2b57a342013-02-06 15:15:25 +0900159 LWS_CALLBACK_CLIENT_FILTER_PRE_ESTABLISH,
Andy Green90c7cbc2011-01-27 06:26:52 +0000160 LWS_CALLBACK_CLIENT_ESTABLISHED,
Andy Green775c0dd2010-10-29 14:15:22 +0100161 LWS_CALLBACK_CLOSED,
Andy Green0c9563b2013-06-10 22:54:40 +0800162 LWS_CALLBACK_CLOSED_HTTP,
Andy Green775c0dd2010-10-29 14:15:22 +0100163 LWS_CALLBACK_RECEIVE,
Andy Green4739e5c2011-01-22 12:51:57 +0000164 LWS_CALLBACK_CLIENT_RECEIVE,
Andy Greena6cbece2011-01-27 20:06:03 +0000165 LWS_CALLBACK_CLIENT_RECEIVE_PONG,
Andy Green90c7cbc2011-01-27 06:26:52 +0000166 LWS_CALLBACK_CLIENT_WRITEABLE,
Andy Green9e4c2b62011-03-07 20:47:39 +0000167 LWS_CALLBACK_SERVER_WRITEABLE,
Andy Greena2b0ab02010-11-11 12:28:29 +0000168 LWS_CALLBACK_HTTP,
kapejodce64fb02013-11-19 13:38:16 +0100169 LWS_CALLBACK_HTTP_BODY,
170 LWS_CALLBACK_HTTP_BODY_COMPLETION,
Andy Greend280b6e2013-01-15 13:40:23 +0800171 LWS_CALLBACK_HTTP_FILE_COMPLETION,
Andy Green54cb3462013-02-14 22:23:54 +0800172 LWS_CALLBACK_HTTP_WRITEABLE,
Andy Green07034092011-02-13 08:37:12 +0000173 LWS_CALLBACK_FILTER_NETWORK_CONNECTION,
Andy Green19895bc2013-11-09 11:59:56 +0800174 LWS_CALLBACK_FILTER_HTTP_CONNECTION,
Alexandre Erwin Ittnerd578f572014-02-06 23:15:51 -0200175 LWS_CALLBACK_SERVER_NEW_CLIENT_INSTANTIATED,
Andy Greenc85619d2011-02-13 08:25:26 +0000176 LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION,
Andy Green0894bda2011-02-19 09:09:11 +0000177 LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS,
Andy Greenc6bf2c22011-02-20 11:10:47 +0000178 LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS,
Andy Green6901cb32011-02-21 08:06:47 +0000179 LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION,
Andy Green385e7ad2011-03-01 21:06:02 +0000180 LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER,
Andy Greenc5114822011-03-06 10:29:35 +0000181 LWS_CALLBACK_CONFIRM_EXTENSION_OKAY,
Andy Greenc6517fa2011-03-06 13:15:29 +0000182 LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED,
Andy Greena7109e62013-02-11 12:05:54 +0800183 LWS_CALLBACK_PROTOCOL_INIT,
184 LWS_CALLBACK_PROTOCOL_DESTROY,
Andy Green3b3fa9e2013-12-25 16:34:37 +0800185 LWS_CALLBACK_GET_THREAD_ID,
186
Andy Green3221f922011-02-12 13:14:11 +0000187 /* external poll() management support */
188 LWS_CALLBACK_ADD_POLL_FD,
189 LWS_CALLBACK_DEL_POLL_FD,
190 LWS_CALLBACK_SET_MODE_POLL_FD,
191 LWS_CALLBACK_CLEAR_MODE_POLL_FD,
Andy Green7a132792013-12-18 09:48:26 +0800192 LWS_CALLBACK_LOCK_POLL,
193 LWS_CALLBACK_UNLOCK_POLL,
Andy Green5fd8a5e2010-10-31 11:57:17 +0000194};
195
Andy Green3182ece2013-01-20 17:08:31 +0800196#ifndef LWS_NO_EXTENSIONS
Andy Greenc5114822011-03-06 10:29:35 +0000197enum libwebsocket_extension_callback_reasons {
Andy Greena41314f2011-05-23 10:00:03 +0100198 LWS_EXT_CALLBACK_SERVER_CONTEXT_CONSTRUCT,
199 LWS_EXT_CALLBACK_CLIENT_CONTEXT_CONSTRUCT,
200 LWS_EXT_CALLBACK_SERVER_CONTEXT_DESTRUCT,
201 LWS_EXT_CALLBACK_CLIENT_CONTEXT_DESTRUCT,
Andy Greenc5114822011-03-06 10:29:35 +0000202 LWS_EXT_CALLBACK_CONSTRUCT,
Andy Green2366b1c2011-03-06 13:15:31 +0000203 LWS_EXT_CALLBACK_CLIENT_CONSTRUCT,
Andy Green68b45042011-05-25 21:41:57 +0100204 LWS_EXT_CALLBACK_CHECK_OK_TO_REALLY_CLOSE,
Andy Green09226502011-05-28 10:19:19 +0100205 LWS_EXT_CALLBACK_CHECK_OK_TO_PROPOSE_EXTENSION,
Andy Greenc5114822011-03-06 10:29:35 +0000206 LWS_EXT_CALLBACK_DESTROY,
Andy Greena41314f2011-05-23 10:00:03 +0100207 LWS_EXT_CALLBACK_DESTROY_ANY_WSI_CLOSING,
208 LWS_EXT_CALLBACK_ANY_WSI_ESTABLISHED,
Andy Green98a717c2011-03-06 13:14:15 +0000209 LWS_EXT_CALLBACK_PACKET_RX_PREPARSE,
Andy Green3b84c002011-03-06 13:14:42 +0000210 LWS_EXT_CALLBACK_PACKET_TX_PRESEND,
Andy Greena41314f2011-05-23 10:00:03 +0100211 LWS_EXT_CALLBACK_PACKET_TX_DO_SEND,
212 LWS_EXT_CALLBACK_HANDSHAKE_REPLY_TX,
Andy Greenc44159f2011-03-07 07:08:18 +0000213 LWS_EXT_CALLBACK_FLUSH_PENDING_TX,
Andy Greena41314f2011-05-23 10:00:03 +0100214 LWS_EXT_CALLBACK_EXTENDED_PAYLOAD_RX,
215 LWS_EXT_CALLBACK_CAN_PROXY_CLIENT_CONNECTION,
216 LWS_EXT_CALLBACK_1HZ,
217 LWS_EXT_CALLBACK_REQUEST_ON_WRITEABLE,
218 LWS_EXT_CALLBACK_IS_WRITEABLE,
David Galeanoe2cf9922013-01-09 18:06:55 +0800219 LWS_EXT_CALLBACK_PAYLOAD_TX,
220 LWS_EXT_CALLBACK_PAYLOAD_RX,
Andy Greenc5114822011-03-06 10:29:35 +0000221};
Andy Green3182ece2013-01-20 17:08:31 +0800222#endif
Andy Greenc5114822011-03-06 10:29:35 +0000223
Andy Green5fd8a5e2010-10-31 11:57:17 +0000224enum libwebsocket_write_protocol {
225 LWS_WRITE_TEXT,
226 LWS_WRITE_BINARY,
Andy Green5d9d94b2011-03-07 20:47:41 +0000227 LWS_WRITE_CONTINUATION,
Andy Green38e57bb2011-01-19 12:20:27 +0000228 LWS_WRITE_HTTP,
229
Andy Green5e1fa172011-02-10 09:07:05 +0000230 /* special 04+ opcodes */
Andy Green38e57bb2011-01-19 12:20:27 +0000231
232 LWS_WRITE_CLOSE,
233 LWS_WRITE_PING,
Andy Green90c7cbc2011-01-27 06:26:52 +0000234 LWS_WRITE_PONG,
235
Andy Greenbd96d802011-01-30 08:24:31 +0000236 /* flags */
237
238 LWS_WRITE_NO_FIN = 0x40,
239 /*
240 * client packet payload goes out on wire unmunged
241 * only useful for security tests since normal servers cannot
242 * decode the content if used
243 */
244 LWS_WRITE_CLIENT_IGNORE_XOR_MASK = 0x80
Andy Greenff95d7a2010-10-28 22:36:01 +0100245};
246
Andy Greenc85619d2011-02-13 08:25:26 +0000247/*
248 * you need these to look at headers that have been parsed if using the
249 * LWS_CALLBACK_FILTER_CONNECTION callback. If a header from the enum
250 * list below is absent, .token = NULL and token_len = 0. Otherwise .token
251 * points to .token_len chars containing that header content.
252 */
253
254struct lws_tokens {
255 char *token;
256 int token_len;
257};
258
259enum lws_token_indexes {
260 WSI_TOKEN_GET_URI,
kapejodce64fb02013-11-19 13:38:16 +0100261 WSI_TOKEN_POST_URI,
Andy Greenc85619d2011-02-13 08:25:26 +0000262 WSI_TOKEN_HOST,
263 WSI_TOKEN_CONNECTION,
264 WSI_TOKEN_KEY1,
265 WSI_TOKEN_KEY2,
266 WSI_TOKEN_PROTOCOL,
267 WSI_TOKEN_UPGRADE,
268 WSI_TOKEN_ORIGIN,
269 WSI_TOKEN_DRAFT,
270 WSI_TOKEN_CHALLENGE,
271
272 /* new for 04 */
273 WSI_TOKEN_KEY,
274 WSI_TOKEN_VERSION,
275 WSI_TOKEN_SWORIGIN,
276
277 /* new for 05 */
278 WSI_TOKEN_EXTENSIONS,
279
280 /* client receives these */
281 WSI_TOKEN_ACCEPT,
282 WSI_TOKEN_NONCE,
283 WSI_TOKEN_HTTP,
Andy Greencc13c6f2013-11-09 10:09:09 +0800284
285 /* http-related */
286 WSI_TOKEN_HTTP_ACCEPT,
287 WSI_TOKEN_HTTP_IF_MODIFIED_SINCE,
288 WSI_TOKEN_HTTP_ACCEPT_ENCODING,
289 WSI_TOKEN_HTTP_ACCEPT_LANGUAGE,
290 WSI_TOKEN_HTTP_PRAGMA,
291 WSI_TOKEN_HTTP_CACHE_CONTROL,
292 WSI_TOKEN_HTTP_AUTHORIZATION,
293 WSI_TOKEN_HTTP_COOKIE,
kapejodce64fb02013-11-19 13:38:16 +0100294 WSI_TOKEN_HTTP_CONTENT_LENGTH,
Andy Greencc13c6f2013-11-09 10:09:09 +0800295 WSI_TOKEN_HTTP_CONTENT_TYPE,
296 WSI_TOKEN_HTTP_DATE,
297 WSI_TOKEN_HTTP_RANGE,
298 WSI_TOKEN_HTTP_REFERER,
Andy Green1e3f7b82013-11-13 07:45:17 +0800299 WSI_TOKEN_HTTP_URI_ARGS,
Andy Greencc13c6f2013-11-09 10:09:09 +0800300
301
Andy Greena41314f2011-05-23 10:00:03 +0100302 WSI_TOKEN_MUXURL,
Andy Greenc85619d2011-02-13 08:25:26 +0000303
Andy Greene77fb802013-02-11 13:04:45 +0800304 /* use token storage to stash these */
305
306 _WSI_TOKEN_CLIENT_SENT_PROTOCOLS,
307 _WSI_TOKEN_CLIENT_PEER_ADDRESS,
308 _WSI_TOKEN_CLIENT_URI,
309 _WSI_TOKEN_CLIENT_HOST,
310 _WSI_TOKEN_CLIENT_ORIGIN,
311
Andy Greenc85619d2011-02-13 08:25:26 +0000312 /* always last real token index*/
313 WSI_TOKEN_COUNT,
314 /* parser state additions */
315 WSI_TOKEN_NAME_PART,
316 WSI_TOKEN_SKIPPING,
317 WSI_TOKEN_SKIPPING_SAW_CR,
Andy Greena41314f2011-05-23 10:00:03 +0100318 WSI_PARSING_COMPLETE,
319 WSI_INIT_TOKEN_MUXURL,
Andy Greenc85619d2011-02-13 08:25:26 +0000320};
321
Andy Green687b0182011-02-26 11:04:01 +0000322/*
David Galeano2915a802013-01-09 15:26:08 +0800323 * From RFC 6455
Andy Green687b0182011-02-26 11:04:01 +0000324 1000
325
David Galeano2915a802013-01-09 15:26:08 +0800326 1000 indicates a normal closure, meaning that the purpose for
327 which the connection was established has been fulfilled.
Andy Green687b0182011-02-26 11:04:01 +0000328
329 1001
330
331 1001 indicates that an endpoint is "going away", such as a server
David Galeano2915a802013-01-09 15:26:08 +0800332 going down or a browser having navigated away from a page.
Andy Green687b0182011-02-26 11:04:01 +0000333
334 1002
335
336 1002 indicates that an endpoint is terminating the connection due
337 to a protocol error.
338
339 1003
340
341 1003 indicates that an endpoint is terminating the connection
David Galeano2915a802013-01-09 15:26:08 +0800342 because it has received a type of data it cannot accept (e.g., an
343 endpoint that understands only text data MAY send this if it
344 receives a binary message).
Andy Green687b0182011-02-26 11:04:01 +0000345
346 1004
347
David Galeano2915a802013-01-09 15:26:08 +0800348 Reserved. The specific meaning might be defined in the future.
349
350 1005
351
352 1005 is a reserved value and MUST NOT be set as a status code in a
353 Close control frame by an endpoint. It is designated for use in
354 applications expecting a status code to indicate that no status
355 code was actually present.
356
357 1006
358
359 1006 is a reserved value and MUST NOT be set as a status code in a
360 Close control frame by an endpoint. It is designated for use in
361 applications expecting a status code to indicate that the
362 connection was closed abnormally, e.g., without sending or
363 receiving a Close control frame.
364
365 1007
366
367 1007 indicates that an endpoint is terminating the connection
368 because it has received data within a message that was not
369 consistent with the type of the message (e.g., non-UTF-8 [RFC3629]
370 data within a text message).
371
372 1008
373
374 1008 indicates that an endpoint is terminating the connection
375 because it has received a message that violates its policy. This
376 is a generic status code that can be returned when there is no
377 other more suitable status code (e.g., 1003 or 1009) or if there
378 is a need to hide specific details about the policy.
379
380 1009
381
382 1009 indicates that an endpoint is terminating the connection
383 because it has received a message that is too big for it to
384 process.
385
386 1010
387
388 1010 indicates that an endpoint (client) is terminating the
389 connection because it has expected the server to negotiate one or
390 more extension, but the server didn't return them in the response
391 message of the WebSocket handshake. The list of extensions that
392 are needed SHOULD appear in the /reason/ part of the Close frame.
393 Note that this status code is not used by the server, because it
394 can fail the WebSocket handshake instead.
395
396 1011
397
398 1011 indicates that a server is terminating the connection because
399 it encountered an unexpected condition that prevented it from
400 fulfilling the request.
401
402 1015
403
404 1015 is a reserved value and MUST NOT be set as a status code in a
405 Close control frame by an endpoint. It is designated for use in
406 applications expecting a status code to indicate that the
407 connection was closed due to a failure to perform a TLS handshake
408 (e.g., the server certificate can't be verified).
Andy Green687b0182011-02-26 11:04:01 +0000409*/
410
411enum lws_close_status {
412 LWS_CLOSE_STATUS_NOSTATUS = 0,
413 LWS_CLOSE_STATUS_NORMAL = 1000,
414 LWS_CLOSE_STATUS_GOINGAWAY = 1001,
415 LWS_CLOSE_STATUS_PROTOCOL_ERR = 1002,
416 LWS_CLOSE_STATUS_UNACCEPTABLE_OPCODE = 1003,
David Galeano2915a802013-01-09 15:26:08 +0800417 LWS_CLOSE_STATUS_RESERVED = 1004,
418 LWS_CLOSE_STATUS_NO_STATUS = 1005,
419 LWS_CLOSE_STATUS_ABNORMAL_CLOSE = 1006,
420 LWS_CLOSE_STATUS_INVALID_PAYLOAD = 1007,
421 LWS_CLOSE_STATUS_POLICY_VIOLATION = 1008,
422 LWS_CLOSE_STATUS_MESSAGE_TOO_LARGE = 1009,
423 LWS_CLOSE_STATUS_EXTENSION_REQUIRED = 1010,
Andy Greenb5b23192013-02-11 17:13:32 +0800424 LWS_CLOSE_STATUS_UNEXPECTED_CONDITION = 1011,
425 LWS_CLOSE_STATUS_TLS_FAILURE = 1015,
Andy Green687b0182011-02-26 11:04:01 +0000426};
427
Andy Green4e7a1332013-11-11 07:30:33 +0800428enum http_status {
kapejodce64fb02013-11-19 13:38:16 +0100429 HTTP_STATUS_OK = 200,
430
Andy Green4e7a1332013-11-11 07:30:33 +0800431 HTTP_STATUS_BAD_REQUEST = 400,
432 HTTP_STATUS_UNAUTHORIZED,
433 HTTP_STATUS_PAYMENT_REQUIRED,
434 HTTP_STATUS_FORBIDDEN,
435 HTTP_STATUS_NOT_FOUND,
436 HTTP_STATUS_METHOD_NOT_ALLOWED,
437 HTTP_STATUS_NOT_ACCEPTABLE,
438 HTTP_STATUS_PROXY_AUTH_REQUIRED,
439 HTTP_STATUS_REQUEST_TIMEOUT,
440 HTTP_STATUS_CONFLICT,
441 HTTP_STATUS_GONE,
442 HTTP_STATUS_LENGTH_REQUIRED,
443 HTTP_STATUS_PRECONDITION_FAILED,
444 HTTP_STATUS_REQ_ENTITY_TOO_LARGE,
445 HTTP_STATUS_REQ_URI_TOO_LONG,
446 HTTP_STATUS_UNSUPPORTED_MEDIA_TYPE,
447 HTTP_STATUS_REQ_RANGE_NOT_SATISFIABLE,
448 HTTP_STATUS_EXPECTATION_FAILED,
449
450 HTTP_STATUS_INTERNAL_SERVER_ERROR = 500,
451 HTTP_STATUS_NOT_IMPLEMENTED,
452 HTTP_STATUS_BAD_GATEWAY,
453 HTTP_STATUS_SERVICE_UNAVAILABLE,
454 HTTP_STATUS_GATEWAY_TIMEOUT,
455 HTTP_STATUS_HTTP_VERSION_NOT_SUPPORTED,
456};
457
Andy Green775c0dd2010-10-29 14:15:22 +0100458struct libwebsocket;
Andy Greenb45993c2010-12-18 15:13:50 +0000459struct libwebsocket_context;
Andy Green3182ece2013-01-20 17:08:31 +0800460/* needed even with extensions disabled for create context */
Andy Green46c2ea02011-03-22 09:04:01 +0000461struct libwebsocket_extension;
Andy Greenff95d7a2010-10-28 22:36:01 +0100462
Andy Green8f037e42010-12-19 22:13:26 +0000463/**
David Brooks6c6a3d32012-04-20 12:13:50 +0800464 * callback_function() - User server actions
Andy Green32375b72011-02-19 08:32:53 +0000465 * @context: Websockets context
Andy Green8f037e42010-12-19 22:13:26 +0000466 * @wsi: Opaque websocket instance pointer
467 * @reason: The reason for the call
468 * @user: Pointer to per-session user data allocated by library
469 * @in: Pointer used for some callback reasons
470 * @len: Length set for some callback reasons
471 *
472 * This callback is the way the user controls what is served. All the
473 * protocol detail is hidden and handled by the library.
Andy Green6964bb52011-01-23 16:50:33 +0000474 *
Andy Green8f037e42010-12-19 22:13:26 +0000475 * For each connection / session there is user data allocated that is
476 * pointed to by "user". You set the size of this user data area when
477 * the library is initialized with libwebsocket_create_server.
Andy Green6964bb52011-01-23 16:50:33 +0000478 *
Andy Green8f037e42010-12-19 22:13:26 +0000479 * You get an opportunity to initialize user data when called back with
480 * LWS_CALLBACK_ESTABLISHED reason.
481 *
Andy Green2b57a342013-02-06 15:15:25 +0900482 * LWS_CALLBACK_ESTABLISHED: after the server completes a handshake with
Andy Green90c7cbc2011-01-27 06:26:52 +0000483 * an incoming client
484 *
David Brooks80a44972012-04-20 12:18:47 +0800485 * LWS_CALLBACK_CLIENT_CONNECTION_ERROR: the request client connection has
486 * been unable to complete a handshake with the remote server
487 *
Andy Green2b57a342013-02-06 15:15:25 +0900488 * LWS_CALLBACK_CLIENT_FILTER_PRE_ESTABLISH: this is the last chance for the
Andy Greenb5b23192013-02-11 17:13:32 +0800489 * client user code to examine the http headers
490 * and decide to reject the connection. If the
491 * content in the headers is interesting to the
492 * client (url, etc) it needs to copy it out at
493 * this point since it will be destroyed before
494 * the CLIENT_ESTABLISHED call
Andy Green2b57a342013-02-06 15:15:25 +0900495 *
David Brooks80a44972012-04-20 12:18:47 +0800496 * LWS_CALLBACK_CLIENT_ESTABLISHED: after your client connection completed
Andy Green90c7cbc2011-01-27 06:26:52 +0000497 * a handshake with the remote server
Andy Green8f037e42010-12-19 22:13:26 +0000498 *
499 * LWS_CALLBACK_CLOSED: when the websocket session ends
500 *
Andy Green0c9563b2013-06-10 22:54:40 +0800501 * LWS_CALLBACK_CLOSED_HTTP: when a HTTP (non-websocket) session ends
502 *
Andy Green90c7cbc2011-01-27 06:26:52 +0000503 * LWS_CALLBACK_RECEIVE: data has appeared for this server endpoint from a
504 * remote client, it can be found at *in and is
505 * len bytes long
506 *
Andy Greena6cbece2011-01-27 20:06:03 +0000507 * LWS_CALLBACK_CLIENT_RECEIVE_PONG: if you elected to see PONG packets,
508 * they appear with this callback reason. PONG
509 * packets only exist in 04+ protocol
510 *
Andy Green90c7cbc2011-01-27 06:26:52 +0000511 * LWS_CALLBACK_CLIENT_RECEIVE: data has appeared from the server for the
512 * client connection, it can be found at *in and
513 * is len bytes long
Andy Green8f037e42010-12-19 22:13:26 +0000514 *
Andy Green6964bb52011-01-23 16:50:33 +0000515 * LWS_CALLBACK_HTTP: an http request has come from a client that is not
Andy Green8f037e42010-12-19 22:13:26 +0000516 * asking to upgrade the connection to a websocket
517 * one. This is a chance to serve http content,
518 * for example, to send a script to the client
519 * which will then open the websockets connection.
Andy Green6964bb52011-01-23 16:50:33 +0000520 * @in points to the URI path requested and
Andy Green8f037e42010-12-19 22:13:26 +0000521 * libwebsockets_serve_http_file() makes it very
522 * simple to send back a file to the client.
Andy Green24b588b2013-01-13 09:53:18 +0800523 * Normally after sending the file you are done
524 * with the http connection, since the rest of the
525 * activity will come by websockets from the script
526 * that was delivered by http, so you will want to
527 * return 1; to close and free up the connection.
528 * That's important because it uses a slot in the
529 * total number of client connections allowed set
530 * by MAX_CLIENTS.
Andy Green90c7cbc2011-01-27 06:26:52 +0000531 *
kapejodce64fb02013-11-19 13:38:16 +0100532 * LWS_CALLBACK_HTTP_BODY: the next @len bytes data from the http
533 * request body HTTP connection is now available in @in.
534 *
535 * LWS_CALLBACK_HTTP_BODY_COMPLETION: the expected amount of http request
536 * body has been delivered
537 *
Andy Green54cb3462013-02-14 22:23:54 +0800538 * LWS_CALLBACK_HTTP_WRITEABLE: you can write more down the http protocol
539 * link now.
540 *
Andy Greend280b6e2013-01-15 13:40:23 +0800541 * LWS_CALLBACK_HTTP_FILE_COMPLETION: a file requested to be send down
542 * http link has completed.
543 *
Andy Green9e4c2b62011-03-07 20:47:39 +0000544 * LWS_CALLBACK_CLIENT_WRITEABLE:
545 * LWS_CALLBACK_SERVER_WRITEABLE: If you call
Andy Green90c7cbc2011-01-27 06:26:52 +0000546 * libwebsocket_callback_on_writable() on a connection, you will
Andy Green9e4c2b62011-03-07 20:47:39 +0000547 * get one of these callbacks coming when the connection socket
548 * is able to accept another write packet without blocking.
549 * If it already was able to take another packet without blocking,
550 * you'll get this callback at the next call to the service loop
551 * function. Notice that CLIENTs get LWS_CALLBACK_CLIENT_WRITEABLE
552 * and servers get LWS_CALLBACK_SERVER_WRITEABLE.
Andy Greene7981dc2011-02-12 21:24:03 +0000553 *
Andy Green07034092011-02-13 08:37:12 +0000554 * LWS_CALLBACK_FILTER_NETWORK_CONNECTION: called when a client connects to
555 * the server at network level; the connection is accepted but then
556 * passed to this callback to decide whether to hang up immediately
Edwin van den Oetelaar8c8a8e12013-02-20 20:56:59 +0800557 * or not, based on the client IP. @in contains the connection
Alexandre Erwin Ittnerd578f572014-02-06 23:15:51 -0200558 * socket's descriptor. Since the client connection information is
559 * not available yet, @wsi still pointing to the main server socket.
560 * Return non-zero to terminate the connection before sending or
561 * receiving anything. Because this happens immediately after the
562 * network connection from the client, there's no websocket protocol
563 * selected yet so this callback is issued only to protocol 0.
Andy Green19895bc2013-11-09 11:59:56 +0800564 *
Alexandre Erwin Ittnerd578f572014-02-06 23:15:51 -0200565 * LWS_CALLBACK_SERVER_NEW_CLIENT_INSTANTIATED: A new client just had
566 * been connected, accepted, and instantiated into the pool. This
567 * callback allows setting any relevant property to it. Because this
568 * happens immediately after the instantiation of a new client,
569 * there's no websocket protocol selected yet so this callback is
570 * issued only to protocol 0. Only @wsi is defined, pointing to the
571 * new client, and the return value is ignored.
572 *
Andy Green19895bc2013-11-09 11:59:56 +0800573 * LWS_CALLBACK_FILTER_HTTP_CONNECTION: called when the request has
574 * been received and parsed from the client, but the response is
575 * not sent yet. Return non-zero to disallow the connection.
576 * @user is a pointer to the connection user space allocation,
577 * @in is the URI, eg, "/"
578 * In your handler you can use the public APIs
579 * lws_hdr_total_length() / lws_hdr_copy() to access all of the
580 * headers using the header enums lws_token_indexes from
581 * libwebsockets.h to check for and read the supported header
582 * presence and content before deciding to allow the http
583 * connection to proceed or to kill the connection.
Andy Green07034092011-02-13 08:37:12 +0000584 *
Andy Greenb5b23192013-02-11 17:13:32 +0800585 * LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION: called when the handshake has
586 * been received and parsed from the client, but the response is
587 * not sent yet. Return non-zero to disallow the connection.
Andy Green96d48fd2013-09-18 08:32:55 +0800588 * @user is a pointer to the connection user space allocation,
589 * @in is the requested protocol name
590 * In your handler you can use the public APIs
591 * lws_hdr_total_length() / lws_hdr_copy() to access all of the
592 * headers using the header enums lws_token_indexes from
593 * libwebsockets.h to check for and read the supported header
594 * presence and content before deciding to allow the handshake
595 * to proceed or to kill the connection.
Andy Greenc85619d2011-02-13 08:25:26 +0000596 *
Andy Greenb5b23192013-02-11 17:13:32 +0800597 * LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS: if configured for
598 * including OpenSSL support, this callback allows your user code
599 * to perform extra SSL_CTX_load_verify_locations() or similar
Andy Green0894bda2011-02-19 09:09:11 +0000600 * calls to direct OpenSSL where to find certificates the client
601 * can use to confirm the remote server identity. @user is the
602 * OpenSSL SSL_CTX*
Andy Greenc85619d2011-02-13 08:25:26 +0000603 *
Andy Greenc6bf2c22011-02-20 11:10:47 +0000604 * LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS: if configured for
605 * including OpenSSL support, this callback allows your user code
606 * to load extra certifcates into the server which allow it to
607 * verify the validity of certificates returned by clients. @user
608 * is the server's OpenSSL SSL_CTX*
609 *
Andy Green6901cb32011-02-21 08:06:47 +0000610 * LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION: if the
611 * libwebsockets context was created with the option
612 * LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT, then this
613 * callback is generated during OpenSSL verification of the cert
614 * sent from the client. It is sent to protocol[0] callback as
615 * no protocol has been negotiated on the connection yet.
616 * Notice that the libwebsockets context and wsi are both NULL
617 * during this callback. See
618 * http://www.openssl.org/docs/ssl/SSL_CTX_set_verify.html
619 * to understand more detail about the OpenSSL callback that
620 * generates this libwebsockets callback and the meanings of the
621 * arguments passed. In this callback, @user is the x509_ctx,
622 * @in is the ssl pointer and @len is preverify_ok
623 * Notice that this callback maintains libwebsocket return
624 * conventions, return 0 to mean the cert is OK or 1 to fail it.
625 * This also means that if you don't handle this callback then
626 * the default callback action of returning 0 allows the client
627 * certificates.
628 *
Andy Green385e7ad2011-03-01 21:06:02 +0000629 * LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER: this callback happens
630 * when a client handshake is being compiled. @user is NULL,
631 * @in is a char **, it's pointing to a char * which holds the
632 * next location in the header buffer where you can add
633 * headers, and @len is the remaining space in the header buffer,
634 * which is typically some hundreds of bytes. So, to add a canned
635 * cookie, your handler code might look similar to:
636 *
637 * char **p = (char **)in;
638 *
Andy Greenb5b23192013-02-11 17:13:32 +0800639 * if (len < 100)
640 * return 1;
Andy Green385e7ad2011-03-01 21:06:02 +0000641 *
642 * *p += sprintf(*p, "Cookie: a=b\x0d\x0a");
643 *
644 * return 0;
645 *
646 * Notice if you add anything, you just have to take care about
647 * the CRLF on the line you added. Obviously this callback is
648 * optional, if you don't handle it everything is fine.
649 *
Andy Greenb5b23192013-02-11 17:13:32 +0800650 * Notice the callback is coming to protocols[0] all the time,
Andy Green385e7ad2011-03-01 21:06:02 +0000651 * because there is no specific protocol handshook yet.
652 *
Andy Greenb5b23192013-02-11 17:13:32 +0800653 * LWS_CALLBACK_CONFIRM_EXTENSION_OKAY: When the server handshake code
Andy Greenc5114822011-03-06 10:29:35 +0000654 * sees that it does support a requested extension, before
655 * accepting the extension by additing to the list sent back to
656 * the client it gives this callback just to check that it's okay
657 * to use that extension. It calls back to the requested protocol
658 * and with @in being the extension name, @len is 0 and @user is
659 * valid. Note though at this time the ESTABLISHED callback hasn't
660 * happened yet so if you initialize @user content there, @user
661 * content during this callback might not be useful for anything.
662 * Notice this callback comes to protocols[0].
663 *
Andy Greenc6517fa2011-03-06 13:15:29 +0000664 * LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED: When a client
665 * connection is being prepared to start a handshake to a server,
666 * each supported extension is checked with protocols[0] callback
667 * with this reason, giving the user code a chance to suppress the
668 * claim to support that extension by returning non-zero. If
669 * unhandled, by default 0 will be returned and the extension
670 * support included in the header to the server. Notice this
671 * callback comes to protocols[0].
672 *
Andy Greena7109e62013-02-11 12:05:54 +0800673 * LWS_CALLBACK_PROTOCOL_INIT: One-time call per protocol so it can
674 * do initial setup / allocations etc
675 *
676 * LWS_CALLBACK_PROTOCOL_DESTROY: One-time call per protocol indicating
677 * this protocol won't get used at all after this callback, the
678 * context is getting destroyed. Take the opportunity to
679 * deallocate everything that was allocated by the protocol.
680 *
Andy Greene7981dc2011-02-12 21:24:03 +0000681 * The next four reasons are optional and only need taking care of if you
Andy Greenb5b23192013-02-11 17:13:32 +0800682 * will be integrating libwebsockets sockets into an external polling
683 * array.
684 *
685 * LWS_CALLBACK_ADD_POLL_FD: libwebsocket deals with its poll() loop
686 * internally, but in the case you are integrating with another
687 * server you will need to have libwebsocket sockets share a
688 * polling array with the other server. This and the other
689 * POLL_FD related callbacks let you put your specialized
690 * poll array interface code in the callback for protocol 0, the
691 * first protocol you support, usually the HTTP protocol in the
692 * serving case. This callback happens when a socket needs to be
Andy Green50097dd2013-02-15 22:36:30 +0800693 * added to the polling loop: @in contains the fd, and
Andy Greenb5b23192013-02-11 17:13:32 +0800694 * @len is the events bitmap (like, POLLIN). If you are using the
Andy Greene7981dc2011-02-12 21:24:03 +0000695 * internal polling loop (the "service" callback), you can just
Andy Greenb5b23192013-02-11 17:13:32 +0800696 * ignore these callbacks.
Andy Greene7981dc2011-02-12 21:24:03 +0000697 *
Andy Greenb5b23192013-02-11 17:13:32 +0800698 * LWS_CALLBACK_DEL_POLL_FD: This callback happens when a socket descriptor
Andy Green50097dd2013-02-15 22:36:30 +0800699 * needs to be removed from an external polling array. @in is
Andy Greenb5b23192013-02-11 17:13:32 +0800700 * the socket desricptor. If you are using the internal polling
701 * loop, you can just ignore it.
Andy Greene7981dc2011-02-12 21:24:03 +0000702 *
Andy Greenb5b23192013-02-11 17:13:32 +0800703 * LWS_CALLBACK_SET_MODE_POLL_FD: This callback happens when libwebsockets
Andy Green50097dd2013-02-15 22:36:30 +0800704 * wants to modify the events for the socket descriptor in @in.
Andy Greene7981dc2011-02-12 21:24:03 +0000705 * The handler should OR @len on to the events member of the pollfd
Andy Greenb5b23192013-02-11 17:13:32 +0800706 * struct for this socket descriptor. If you are using the
Andy Greene7981dc2011-02-12 21:24:03 +0000707 * internal polling loop, you can just ignore it.
708 *
709 * LWS_CALLBACK_CLEAR_MODE_POLL_FD: This callback occurs when libwebsockets
Andy Green50097dd2013-02-15 22:36:30 +0800710 * wants to modify the events for the socket descriptor in @in.
Andy Greene7981dc2011-02-12 21:24:03 +0000711 * The handler should AND ~@len on to the events member of the
Andy Greenb5b23192013-02-11 17:13:32 +0800712 * pollfd struct for this socket descriptor. If you are using the
Andy Greene7981dc2011-02-12 21:24:03 +0000713 * internal polling loop, you can just ignore it.
Andy Green8f037e42010-12-19 22:13:26 +0000714 */
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800715LWS_VISIBLE LWS_EXTERN int callback(struct libwebsocket_context *context,
Andy Green62c54d22011-02-14 09:14:25 +0000716 struct libwebsocket *wsi,
Andy Green6964bb52011-01-23 16:50:33 +0000717 enum libwebsocket_callback_reasons reason, void *user,
Andy Green8f037e42010-12-19 22:13:26 +0000718 void *in, size_t len);
719
Andy Greenb5b23192013-02-11 17:13:32 +0800720typedef int (callback_function)(struct libwebsocket_context *context,
David Brooks6c6a3d32012-04-20 12:13:50 +0800721 struct libwebsocket *wsi,
722 enum libwebsocket_callback_reasons reason, void *user,
723 void *in, size_t len);
724
Andy Green3182ece2013-01-20 17:08:31 +0800725#ifndef LWS_NO_EXTENSIONS
Andy Green57b4e9a2011-03-06 13:14:46 +0000726/**
David Brooks6c6a3d32012-04-20 12:13:50 +0800727 * extension_callback_function() - Hooks to allow extensions to operate
Andy Green57b4e9a2011-03-06 13:14:46 +0000728 * @context: Websockets context
Andy Green46c2ea02011-03-22 09:04:01 +0000729 * @ext: This extension
Andy Green57b4e9a2011-03-06 13:14:46 +0000730 * @wsi: Opaque websocket instance pointer
731 * @reason: The reason for the call
732 * @user: Pointer to per-session user data allocated by library
733 * @in: Pointer used for some callback reasons
734 * @len: Length set for some callback reasons
735 *
736 * Each extension that is active on a particular connection receives
737 * callbacks during the connection lifetime to allow the extension to
738 * operate on websocket data and manage itself.
739 *
740 * Libwebsockets takes care of allocating and freeing "user" memory for
741 * each active extension on each connection. That is what is pointed to
742 * by the @user parameter.
743 *
744 * LWS_EXT_CALLBACK_CONSTRUCT: called when the server has decided to
745 * select this extension from the list provided by the client,
746 * just before the server will send back the handshake accepting
747 * the connection with this extension active. This gives the
748 * extension a chance to initialize its connection context found
749 * in @user.
750 *
Andy Greenb5b23192013-02-11 17:13:32 +0800751 * LWS_EXT_CALLBACK_CLIENT_CONSTRUCT: same as LWS_EXT_CALLBACK_CONSTRUCT
Andy Green2366b1c2011-03-06 13:15:31 +0000752 * but called when client is instantiating this extension. Some
753 * extensions will work the same on client and server side and then
754 * you can just merge handlers for both CONSTRUCTS.
755 *
Andy Green57b4e9a2011-03-06 13:14:46 +0000756 * LWS_EXT_CALLBACK_DESTROY: called when the connection the extension was
757 * being used on is about to be closed and deallocated. It's the
758 * last chance for the extension to deallocate anything it has
759 * allocated in the user data (pointed to by @user) before the
Andy Green2366b1c2011-03-06 13:15:31 +0000760 * user data is deleted. This same callback is used whether you
761 * are in client or server instantiation context.
Andy Green57b4e9a2011-03-06 13:14:46 +0000762 *
763 * LWS_EXT_CALLBACK_PACKET_RX_PREPARSE: when this extension was active on
764 * a connection, and a packet of data arrived at the connection,
765 * it is passed to this callback to give the extension a chance to
766 * change the data, eg, decompress it. @user is pointing to the
767 * extension's private connection context data, @in is pointing
768 * to an lws_tokens struct, it consists of a char * pointer called
769 * token, and an int called token_len. At entry, these are
770 * set to point to the received buffer and set to the content
771 * length. If the extension will grow the content, it should use
772 * a new buffer allocated in its private user context data and
773 * set the pointed-to lws_tokens members to point to its buffer.
774 *
775 * LWS_EXT_CALLBACK_PACKET_TX_PRESEND: this works the same way as
776 * LWS_EXT_CALLBACK_PACKET_RX_PREPARSE above, except it gives the
777 * extension a chance to change websocket data just before it will
778 * be sent out. Using the same lws_token pointer scheme in @in,
779 * the extension can change the buffer and the length to be
780 * transmitted how it likes. Again if it wants to grow the
781 * buffer safely, it should copy the data into its own buffer and
782 * set the lws_tokens token pointer to it.
783 */
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800784LWS_VISIBLE LWS_EXTERN int extension_callback(struct libwebsocket_context *context,
Andy Green46c2ea02011-03-22 09:04:01 +0000785 struct libwebsocket_extension *ext,
Andy Green57b4e9a2011-03-06 13:14:46 +0000786 struct libwebsocket *wsi,
Andy Greenb5b23192013-02-11 17:13:32 +0800787 enum libwebsocket_extension_callback_reasons reason,
788 void *user, void *in, size_t len);
Andy Green57b4e9a2011-03-06 13:14:46 +0000789
Andy Greenb5b23192013-02-11 17:13:32 +0800790typedef int (extension_callback_function)(struct libwebsocket_context *context,
David Brooks6c6a3d32012-04-20 12:13:50 +0800791 struct libwebsocket_extension *ext,
792 struct libwebsocket *wsi,
Andy Greenb5b23192013-02-11 17:13:32 +0800793 enum libwebsocket_extension_callback_reasons reason,
794 void *user, void *in, size_t len);
Andy Green3182ece2013-01-20 17:08:31 +0800795#endif
Andy Green57b4e9a2011-03-06 13:14:46 +0000796
Andy Green4f3943a2010-11-12 10:44:16 +0000797/**
Andy Green6964bb52011-01-23 16:50:33 +0000798 * struct libwebsocket_protocols - List of protocols and handlers server
799 * supports.
Andy Green4f3943a2010-11-12 10:44:16 +0000800 * @name: Protocol name that must match the one given in the client
Andy Green6964bb52011-01-23 16:50:33 +0000801 * Javascript new WebSocket(url, 'protocol') name
Andy Green4f3943a2010-11-12 10:44:16 +0000802 * @callback: The service callback used for this protocol. It allows the
Andy Green6964bb52011-01-23 16:50:33 +0000803 * service action for an entire protocol to be encapsulated in
804 * the protocol-specific callback
Andy Green4f3943a2010-11-12 10:44:16 +0000805 * @per_session_data_size: Each new connection using this protocol gets
Andy Green6964bb52011-01-23 16:50:33 +0000806 * this much memory allocated on connection establishment and
807 * freed on connection takedown. A pointer to this per-connection
808 * allocation is passed into the callback in the 'user' parameter
Andy Green54495112013-02-06 21:10:16 +0900809 * @rx_buffer_size: if you want atomic frames delivered to the callback, you
Andy Greenb5b23192013-02-11 17:13:32 +0800810 * should set this to the size of the biggest legal frame that
811 * you support. If the frame size is exceeded, there is no
812 * error, but the buffer will spill to the user callback when
813 * full, which you can detect by using
814 * libwebsockets_remaining_packet_payload(). Notice that you
815 * just talk about frame size here, the LWS_SEND_BUFFER_PRE_PADDING
816 * and post-padding are automatically also allocated on top.
Andy Green1f4267b2013-10-17 08:09:19 +0800817 * @no_buffer_all_partial_tx: Leave at zero if you want the library to take
818 * care of all partial tx for you. It's useful if you only have
819 * small tx packets and the chance of any truncated send is small
820 * enough any additional malloc / buffering overhead is less
821 * painful than writing the code to deal with partial sends. For
822 * protocols where you stream big blocks, set to nonzero and use
823 * the return value from libwebsocket_write() to manage how much
824 * got send yourself.
Andy Greenb45993c2010-12-18 15:13:50 +0000825 * @owning_server: the server init call fills in this opaque pointer when
Andy Green6964bb52011-01-23 16:50:33 +0000826 * registering this protocol with the server.
Andy Greenb45993c2010-12-18 15:13:50 +0000827 * @protocol_index: which protocol we are starting from zero
Andy Greene77ddd82010-11-13 10:03:47 +0000828 *
Andy Green6964bb52011-01-23 16:50:33 +0000829 * This structure represents one protocol supported by the server. An
830 * array of these structures is passed to libwebsocket_create_server()
831 * allows as many protocols as you like to be handled by one server.
Andy Green4f3943a2010-11-12 10:44:16 +0000832 */
833
834struct libwebsocket_protocols {
835 const char *name;
David Brooks6c6a3d32012-04-20 12:13:50 +0800836 callback_function *callback;
Andy Green4f3943a2010-11-12 10:44:16 +0000837 size_t per_session_data_size;
Andy Green54495112013-02-06 21:10:16 +0900838 size_t rx_buffer_size;
Andy Green1f4267b2013-10-17 08:09:19 +0800839 int no_buffer_all_partial_tx;
Andy Greenb45993c2010-12-18 15:13:50 +0000840
841 /*
842 * below are filled in on server init and can be left uninitialized,
843 * no need for user to use them directly either
844 */
Andy Green6964bb52011-01-23 16:50:33 +0000845
Andy Greenb45993c2010-12-18 15:13:50 +0000846 struct libwebsocket_context *owning_server;
Andy Greenb45993c2010-12-18 15:13:50 +0000847 int protocol_index;
Andy Green4f3943a2010-11-12 10:44:16 +0000848};
849
Andy Green3182ece2013-01-20 17:08:31 +0800850#ifndef LWS_NO_EXTENSIONS
Andy Greend6e09112011-03-05 16:12:15 +0000851/**
852 * struct libwebsocket_extension - An extension we know how to cope with
853 *
854 * @name: Formal extension name, eg, "deflate-stream"
855 * @callback: Service callback
Andy Greenb5b23192013-02-11 17:13:32 +0800856 * @per_session_data_size: Libwebsockets will auto-malloc this much
857 * memory for the use of the extension, a pointer
Andy Greend6e09112011-03-05 16:12:15 +0000858 * to it comes in the @user callback parameter
Peter Pentchevc74964e2013-02-07 16:17:13 +0200859 * @per_context_private_data: Optional storage for this extension that
Andy Greenb5b23192013-02-11 17:13:32 +0800860 * is per-context, so it can track stuff across
861 * all sessions, etc, if it wants
Andy Greend6e09112011-03-05 16:12:15 +0000862 */
863
864struct libwebsocket_extension {
865 const char *name;
David Brooks6c6a3d32012-04-20 12:13:50 +0800866 extension_callback_function *callback;
Andy Greend6e09112011-03-05 16:12:15 +0000867 size_t per_session_data_size;
Andy Greenb5b23192013-02-11 17:13:32 +0800868 void *per_context_private_data;
Andy Greend6e09112011-03-05 16:12:15 +0000869};
Andy Green3182ece2013-01-20 17:08:31 +0800870#endif
Andy Greend6e09112011-03-05 16:12:15 +0000871
Andy Green1b265272013-02-09 14:01:09 +0800872/**
873 * struct lws_context_creation_info: parameters to create context with
874 *
875 * @port: Port to listen on... you can use 0 to suppress listening on
876 * any port, that's what you want if you are not running a
877 * websocket server at all but just using it as a client
Andy Green7a506ba2013-02-12 10:13:02 +0800878 * @iface: NULL to bind the listen socket to all interfaces, or the
Andy Green1b265272013-02-09 14:01:09 +0800879 * interface name, eg, "eth2"
880 * @protocols: Array of structures listing supported protocols and a protocol-
881 * specific callback for each one. The list is ended with an
882 * entry that has a NULL callback pointer.
883 * It's not const because we write the owning_server member
884 * @extensions: NULL or array of libwebsocket_extension structs listing the
885 * extensions this context supports. If you configured with
886 * --without-extensions, you should give NULL here.
887 * @ssl_cert_filepath: If libwebsockets was compiled to use ssl, and you want
888 * to listen using SSL, set to the filepath to fetch the
889 * server cert from, otherwise NULL for unencrypted
890 * @ssl_private_key_filepath: filepath to private key if wanting SSL mode,
891 * else ignored
892 * @ssl_ca_filepath: CA certificate filepath or NULL
Andy Green2672fb22013-02-22 09:54:35 +0800893 * @ssl_cipher_list: List of valid ciphers to use (eg,
894 * "RC4-MD5:RC4-SHA:AES128-SHA:AES256-SHA:HIGH:!DSS:!aNULL"
895 * or you can leave it as NULL to get "DEFAULT"
Andy Green1b265272013-02-09 14:01:09 +0800896 * @gid: group id to change to after setting listen socket, or -1.
897 * @uid: user id to change to after setting listen socket, or -1.
898 * @options: 0, or LWS_SERVER_OPTION_DEFEAT_CLIENT_MASK
899 * @user: optional user pointer that can be recovered via the context
Andy Greenb5b23192013-02-11 17:13:32 +0800900 * pointer using libwebsocket_context_user
Andy Greena690cd02013-02-09 12:25:31 +0800901 * @ka_time: 0 for no keepalive, otherwise apply this keepalive timeout to
902 * all libwebsocket sockets, client or server
903 * @ka_probes: if ka_time was nonzero, after the timeout expires how many
904 * times to try to get a response from the peer before giving up
905 * and killing the connection
906 * @ka_interval: if ka_time was nonzero, how long to wait before each ka_probes
907 * attempt
Andy Green1b265272013-02-09 14:01:09 +0800908 */
909
910struct lws_context_creation_info {
911 int port;
Joakim Soderberg63ff1202013-02-11 17:52:23 +0100912 const char *iface;
Andy Green1b265272013-02-09 14:01:09 +0800913 struct libwebsocket_protocols *protocols;
914 struct libwebsocket_extension *extensions;
915 const char *ssl_cert_filepath;
916 const char *ssl_private_key_filepath;
917 const char *ssl_ca_filepath;
Andy Green2672fb22013-02-22 09:54:35 +0800918 const char *ssl_cipher_list;
Andy Green1b265272013-02-09 14:01:09 +0800919 int gid;
920 int uid;
921 unsigned int options;
922 void *user;
Andy Greena690cd02013-02-09 12:25:31 +0800923 int ka_time;
924 int ka_probes;
925 int ka_interval;
926
Andy Green1b265272013-02-09 14:01:09 +0800927};
928
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800929LWS_VISIBLE LWS_EXTERN
Andy Greenb5b23192013-02-11 17:13:32 +0800930void lws_set_log_level(int level,
931 void (*log_emit_function)(int level, const char *line));
Andy Greend6e09112011-03-05 16:12:15 +0000932
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800933LWS_VISIBLE LWS_EXTERN void
Andy Greenc11db202013-01-19 11:12:16 +0800934lwsl_emit_syslog(int level, const char *line);
935
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800936LWS_VISIBLE LWS_EXTERN struct libwebsocket_context *
Andy Green1b265272013-02-09 14:01:09 +0800937libwebsocket_create_context(struct lws_context_creation_info *info);
shysb4e800e2013-10-24 22:12:03 +0800938
939LWS_VISIBLE LWS_EXTERN int
940libwebsocket_set_proxy(struct libwebsocket_context *context, const char *proxy);
Andy Greenff95d7a2010-10-28 22:36:01 +0100941
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800942LWS_VISIBLE LWS_EXTERN void
Darin Willitsc19456f2011-02-14 17:52:39 +0000943libwebsocket_context_destroy(struct libwebsocket_context *context);
Andy Green6964bb52011-01-23 16:50:33 +0000944
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800945LWS_VISIBLE LWS_EXTERN int
Darin Willitsc19456f2011-02-14 17:52:39 +0000946libwebsocket_service(struct libwebsocket_context *context, int timeout_ms);
Andy Greene92cd172011-01-19 13:11:55 +0000947
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800948LWS_VISIBLE LWS_EXTERN int
Darin Willitsc19456f2011-02-14 17:52:39 +0000949libwebsocket_service_fd(struct libwebsocket_context *context,
Andy Green9f990342011-02-12 11:57:45 +0000950 struct pollfd *pollfd);
951
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800952LWS_VISIBLE LWS_EXTERN void *
Alon Levy0291eb32012-10-19 11:21:56 +0200953libwebsocket_context_user(struct libwebsocket_context *context);
954
Andy Green9beedc12013-09-18 08:47:15 +0800955enum pending_timeout {
956 NO_PENDING_TIMEOUT = 0,
957 PENDING_TIMEOUT_AWAITING_PROXY_RESPONSE,
Andy Green5dc62ea2013-09-20 20:26:12 +0800958 PENDING_TIMEOUT_AWAITING_CONNECT_RESPONSE,
Andy Green9beedc12013-09-18 08:47:15 +0800959 PENDING_TIMEOUT_ESTABLISH_WITH_SERVER,
960 PENDING_TIMEOUT_AWAITING_SERVER_RESPONSE,
961 PENDING_TIMEOUT_AWAITING_PING,
962 PENDING_TIMEOUT_CLOSE_ACK,
963 PENDING_TIMEOUT_AWAITING_EXTENSION_CONNECT_RESPONSE,
964 PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE,
965 PENDING_TIMEOUT_SSL_ACCEPT,
kapejodce64fb02013-11-19 13:38:16 +0100966 PENDING_TIMEOUT_HTTP_CONTENT,
Andy Green9beedc12013-09-18 08:47:15 +0800967};
968
969LWS_EXTERN void
970libwebsocket_set_timeout(struct libwebsocket *wsi,
971 enum pending_timeout reason, int secs);
972
Andy Green4ea60062010-10-30 12:15:07 +0100973/*
974 * IMPORTANT NOTICE!
Andy Greene77ddd82010-11-13 10:03:47 +0000975 *
Andy Green5fd8a5e2010-10-31 11:57:17 +0000976 * When sending with websocket protocol (LWS_WRITE_TEXT or LWS_WRITE_BINARY)
977 * the send buffer has to have LWS_SEND_BUFFER_PRE_PADDING bytes valid BEFORE
Andy Green4ea60062010-10-30 12:15:07 +0100978 * buf, and LWS_SEND_BUFFER_POST_PADDING bytes valid AFTER (buf + len).
Andy Greene77ddd82010-11-13 10:03:47 +0000979 *
Andy Green4ea60062010-10-30 12:15:07 +0100980 * This allows us to add protocol info before and after the data, and send as
981 * one packet on the network without payload copying, for maximum efficiency.
Andy Greene77ddd82010-11-13 10:03:47 +0000982 *
Andy Green4ea60062010-10-30 12:15:07 +0100983 * So for example you need this kind of code to use libwebsocket_write with a
Andy Greene77ddd82010-11-13 10:03:47 +0000984 * 128-byte payload
985 *
Andy Greenab990e42010-10-31 12:42:52 +0000986 * char buf[LWS_SEND_BUFFER_PRE_PADDING + 128 + LWS_SEND_BUFFER_POST_PADDING];
Andy Greene77ddd82010-11-13 10:03:47 +0000987 *
Andy Greenab990e42010-10-31 12:42:52 +0000988 * // fill your part of the buffer... for example here it's all zeros
989 * memset(&buf[LWS_SEND_BUFFER_PRE_PADDING], 0, 128);
Andy Greene77ddd82010-11-13 10:03:47 +0000990 *
Alex Rhatushnyak9f2246e2013-03-09 12:01:47 +0800991 * libwebsocket_write(wsi, &buf[LWS_SEND_BUFFER_PRE_PADDING], 128,
992 * LWS_WRITE_TEXT);
Andy Greene77ddd82010-11-13 10:03:47 +0000993 *
Andy Green5fd8a5e2010-10-31 11:57:17 +0000994 * When sending LWS_WRITE_HTTP, there is no protocol addition and you can just
995 * use the whole buffer without taking care of the above.
Andy Green4ea60062010-10-30 12:15:07 +0100996 */
997
Andy Green687b0182011-02-26 11:04:01 +0000998/*
999 * this is the frame nonce plus two header plus 8 length
Andy Greena41314f2011-05-23 10:00:03 +01001000 * there's an additional two for mux extension per mux nesting level
Andy Green687b0182011-02-26 11:04:01 +00001001 * 2 byte prepend on close will already fit because control frames cannot use
1002 * the big length style
1003 */
Andy Green4739e5c2011-01-22 12:51:57 +00001004
Andy Greena41314f2011-05-23 10:00:03 +01001005#define LWS_SEND_BUFFER_PRE_PADDING (4 + 10 + (2 * MAX_MUX_RECURSION))
David Galeanoe2cf9922013-01-09 18:06:55 +08001006#define LWS_SEND_BUFFER_POST_PADDING 4
Andy Green4ea60062010-10-30 12:15:07 +01001007
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001008LWS_VISIBLE LWS_EXTERN int
Andy Greene77ddd82010-11-13 10:03:47 +00001009libwebsocket_write(struct libwebsocket *wsi, unsigned char *buf, size_t len,
Andy Green5fd8a5e2010-10-31 11:57:17 +00001010 enum libwebsocket_write_protocol protocol);
Andy Greena2b0ab02010-11-11 12:28:29 +00001011
Gabriel Gritsch890f8e92014-02-15 16:20:25 +08001012/* helper for case where buffer may be const */
1013static inline int
1014libwebsocket_write_http(struct libwebsocket *wsi,
1015 const unsigned char *buf, size_t len)
1016{
1017 return libwebsocket_write(wsi, (unsigned char *)buf, len,
1018 LWS_WRITE_HTTP);
1019}
1020
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001021LWS_VISIBLE LWS_EXTERN int
Andy Greend280b6e2013-01-15 13:40:23 +08001022libwebsockets_serve_http_file(struct libwebsocket_context *context,
1023 struct libwebsocket *wsi, const char *file,
Andy Green79002562013-11-09 11:04:35 +08001024 const char *content_type, const char *other_headers);
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001025LWS_VISIBLE LWS_EXTERN int
Andy Greend280b6e2013-01-15 13:40:23 +08001026libwebsockets_serve_http_file_fragment(struct libwebsocket_context *context,
1027 struct libwebsocket *wsi);
Andy Greenab990e42010-10-31 12:42:52 +00001028
Andy Green4e7a1332013-11-11 07:30:33 +08001029LWS_VISIBLE int libwebsockets_return_http_status(
1030 struct libwebsocket_context *context,
1031 struct libwebsocket *wsi, unsigned int code,
1032 const char *html_body);
1033
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001034LWS_VISIBLE LWS_EXTERN const struct libwebsocket_protocols *
Andy Greenb45993c2010-12-18 15:13:50 +00001035libwebsockets_get_protocol(struct libwebsocket *wsi);
1036
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001037LWS_VISIBLE LWS_EXTERN int
Darin Willitsc19456f2011-02-14 17:52:39 +00001038libwebsocket_callback_on_writable(struct libwebsocket_context *context,
Andy Green62c54d22011-02-14 09:14:25 +00001039 struct libwebsocket *wsi);
Andy Green90c7cbc2011-01-27 06:26:52 +00001040
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001041LWS_VISIBLE LWS_EXTERN int
Andy Green90c7cbc2011-01-27 06:26:52 +00001042libwebsocket_callback_on_writable_all_protocol(
1043 const struct libwebsocket_protocols *protocol);
1044
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001045LWS_VISIBLE LWS_EXTERN int
Andy Greena6cbece2011-01-27 20:06:03 +00001046libwebsocket_get_socket_fd(struct libwebsocket *wsi);
Andy Green90c7cbc2011-01-27 06:26:52 +00001047
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001048LWS_VISIBLE LWS_EXTERN int
Andy Green82c3d542011-03-07 21:16:31 +00001049libwebsocket_is_final_fragment(struct libwebsocket *wsi);
1050
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001051LWS_VISIBLE LWS_EXTERN unsigned char
David Galeanoe2cf9922013-01-09 18:06:55 +08001052libwebsocket_get_reserved_bits(struct libwebsocket *wsi);
1053
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001054LWS_VISIBLE LWS_EXTERN int
Andy Green90c7cbc2011-01-27 06:26:52 +00001055libwebsocket_rx_flow_control(struct libwebsocket *wsi, int enable);
1056
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001057LWS_VISIBLE LWS_EXTERN void
Andy Greenb55451c2013-03-16 12:32:27 +08001058libwebsocket_rx_flow_allow_all_protocol(
1059 const struct libwebsocket_protocols *protocol);
1060
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001061LWS_VISIBLE LWS_EXTERN size_t
Andy Green38e57bb2011-01-19 12:20:27 +00001062libwebsockets_remaining_packet_payload(struct libwebsocket *wsi);
1063
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001064LWS_VISIBLE LWS_EXTERN struct libwebsocket *
Andy Green4739e5c2011-01-22 12:51:57 +00001065libwebsocket_client_connect(struct libwebsocket_context *clients,
1066 const char *address,
1067 int port,
Andy Green90c7cbc2011-01-27 06:26:52 +00001068 int ssl_connection,
Andy Green4739e5c2011-01-22 12:51:57 +00001069 const char *path,
1070 const char *host,
1071 const char *origin,
Andy Greenbfb051f2011-02-09 08:49:14 +00001072 const char *protocol,
1073 int ietf_version_or_minus_one);
Andy Green4739e5c2011-01-22 12:51:57 +00001074
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001075LWS_VISIBLE LWS_EXTERN struct libwebsocket *
David Brooks2c60d952012-04-20 12:19:01 +08001076libwebsocket_client_connect_extended(struct libwebsocket_context *clients,
1077 const char *address,
1078 int port,
1079 int ssl_connection,
1080 const char *path,
1081 const char *host,
1082 const char *origin,
1083 const char *protocol,
1084 int ietf_version_or_minus_one,
1085 void *userdata);
1086
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001087LWS_VISIBLE LWS_EXTERN const char *
Darin Willitsc19456f2011-02-14 17:52:39 +00001088libwebsocket_canonical_hostname(struct libwebsocket_context *context);
Andy Green2ac5a6f2011-01-28 10:00:18 +00001089
Andy Green4739e5c2011-01-22 12:51:57 +00001090
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001091LWS_VISIBLE LWS_EXTERN void
Andy Greenaaf0b9f2013-01-30 08:12:20 +08001092libwebsockets_get_peer_addresses(struct libwebsocket_context *context,
1093 struct libwebsocket *wsi, int fd, char *name, int name_len,
Andy Green07034092011-02-13 08:37:12 +00001094 char *rip, int rip_len);
1095
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001096LWS_VISIBLE LWS_EXTERN int
Andy Green8acc1942011-03-07 20:47:40 +00001097libwebsockets_get_random(struct libwebsocket_context *context,
1098 void *buf, int len);
1099
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001100LWS_VISIBLE LWS_EXTERN int
Andy Green279a3032013-01-17 10:05:39 +08001101lws_daemonize(const char *_lock_path);
1102
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001103LWS_VISIBLE LWS_EXTERN int
Andy Green043a0ba2011-04-25 23:54:11 +08001104lws_send_pipe_choked(struct libwebsocket *wsi);
1105
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001106LWS_VISIBLE LWS_EXTERN int
Andy Green2fd3f2f2013-01-18 09:49:20 +08001107lws_frame_is_binary(struct libwebsocket *wsi);
1108
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001109LWS_VISIBLE LWS_EXTERN unsigned char *
Andy Green2836c642011-03-07 20:47:41 +00001110libwebsockets_SHA1(const unsigned char *d, size_t n, unsigned char *md);
1111
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001112LWS_VISIBLE LWS_EXTERN int
Andy Greenf94e0582011-05-14 15:07:56 +02001113lws_b64_encode_string(const char *in, int in_len, char *out, int out_size);
1114
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001115LWS_VISIBLE LWS_EXTERN int
Andy Greenf94e0582011-05-14 15:07:56 +02001116lws_b64_decode_string(const char *in, char *out, int out_size);
1117
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001118LWS_VISIBLE LWS_EXTERN const char *
Andy Green7b405452013-02-01 10:50:15 +08001119lws_get_library_version(void);
1120
Andy Green16ab3182013-02-10 18:02:31 +08001121/* access to headers... only valid while headers valid */
1122
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001123LWS_VISIBLE LWS_EXTERN int
Andy Green16ab3182013-02-10 18:02:31 +08001124lws_hdr_total_length(struct libwebsocket *wsi, enum lws_token_indexes h);
1125
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001126LWS_VISIBLE LWS_EXTERN int
Andy Greenb5b23192013-02-11 17:13:32 +08001127lws_hdr_copy(struct libwebsocket *wsi, char *dest, int len,
1128 enum lws_token_indexes h);
Andy Green16ab3182013-02-10 18:02:31 +08001129
Andy Greenea0642a2013-01-29 06:52:00 +08001130/*
1131 * Note: this is not normally needed as a user api. It's provided in case it is
1132 * useful when integrating with other app poll loop service code.
1133 */
1134
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001135LWS_VISIBLE LWS_EXTERN int
Andy Greenea0642a2013-01-29 06:52:00 +08001136libwebsocket_read(struct libwebsocket_context *context,
1137 struct libwebsocket *wsi,
1138 unsigned char *buf, size_t len);
1139
Andy Green3182ece2013-01-20 17:08:31 +08001140#ifndef LWS_NO_EXTENSIONS
Peter Pentchev9a4fef72013-03-30 09:52:21 +08001141LWS_VISIBLE LWS_EXTERN struct libwebsocket_extension *libwebsocket_get_internal_extensions();
Andy Green3182ece2013-01-20 17:08:31 +08001142#endif
Andy Green4cd87a02011-03-06 13:15:32 +00001143
Peter Hinz56885f32011-03-02 22:03:47 +00001144#ifdef __cplusplus
1145}
1146#endif
Andy Greena11fe942011-09-25 10:30:26 +01001147
Andy Greenab990e42010-10-31 12:42:52 +00001148#endif