1 <h2>libwebsockets_hangup_on_client - Server calls to terminate client connection</h2>
3 <b>libwebsockets_hangup_on_client</b>
4 (<i>struct libwebsocket_context *</i> <b>context</b>,
9 <dd>libwebsockets context
11 <dd>Connection socket descriptor
14 <h2>libwebsockets_get_peer_addresses - Get client address information</h2>
16 <b>libwebsockets_get_peer_addresses</b>
17 (<i>int</i> <b>fd</b>,
18 <i>char *</i> <b>name</b>,
19 <i>int</i> <b>name_len</b>,
20 <i>char *</i> <b>rip</b>,
21 <i>int</i> <b>rip_len</b>)
25 <dd>Connection socket descriptor
27 <dd>Buffer to take client address name
29 <dd>Length of client address name buffer
31 <dd>Buffer to take client address IP qotted quad
33 <dd>Length of client address IP buffer
37 This function fills in <tt><b>name</b></tt> and <tt><b>rip</b></tt> with the name and IP of
38 the client connected with socket descriptor <tt><b>fd</b></tt>. Names may be
39 truncated if there is not enough room. If either cannot be
40 determined, they will be returned as valid zero-length strings.
43 <h2>libwebsocket_service_fd - Service polled socket with something waiting</h2>
45 <b>libwebsocket_service_fd</b>
46 (<i>struct libwebsocket_context *</i> <b>context</b>,
47 <i>struct pollfd *</i> <b>pollfd</b>)
53 <dd>The pollfd entry describing the socket fd and which events
58 This function closes any active connections and then frees the
59 context. After calling this, any further use of the context is
63 <h2>libwebsocket_context_destroy - Destroy the websocket context</h2>
65 <b>libwebsocket_context_destroy</b>
66 (<i>struct libwebsocket_context *</i> <b>context</b>)
74 This function closes any active connections and then frees the
75 context. After calling this, any further use of the context is
79 <h2>libwebsocket_service - Service any pending websocket activity</h2>
81 <b>libwebsocket_service</b>
82 (<i>struct libwebsocket_context *</i> <b>context</b>,
83 <i>int</i> <b>timeout_ms</b>)
89 <dd>Timeout for poll; 0 means return immediately if nothing needed
90 service otherwise block and service immediately, returning
91 after the timeout if nothing needed service.
95 This function deals with any pending websocket traffic, for three
96 kinds of event. It handles these events on both server and client
97 types of connection the same.
99 1) Accept new connections to our context's server
101 2) Perform pending broadcast writes initiated from other forked
102 processes (effectively serializing asynchronous broadcasts)
104 3) Call the receive callback for incoming frame data received by
105 server or client connections.
107 You need to call this service function periodically to all the above
108 functions to happen; if your application is single-threaded you can
109 just call it in your main event loop.
111 Alternatively you can fork a new process that asynchronously handles
112 calling this service in a loop. In that case you are happy if this
113 call blocks your thread until it needs to take care of something and
114 would call it with a large nonzero timeout. Your loop then takes no
115 CPU while there is nothing happening.
117 If you are calling it in a single-threaded app, you don't want it to
118 wait around blocking other things in your loop from happening, so you
119 would call it with a timeout_ms of 0, so it returns immediately if
120 nothing is pending, or as soon as it services whatever was pending.
123 <h2>libwebsocket_callback_on_writable - Request a callback when this socket becomes able to be written to without blocking</h2>
125 <b>libwebsocket_callback_on_writable</b>
126 (<i>struct libwebsocket_context *</i> <b>context</b>,
127 <i>struct libwebsocket *</i> <b>wsi</b>)
131 <dd>libwebsockets context
133 <dd>Websocket connection instance to get callback for
136 <h2>libwebsocket_callback_on_writable_all_protocol - Request a callback for all connections using the given protocol when it becomes possible to write to each socket without blocking in turn.</h2>
138 <b>libwebsocket_callback_on_writable_all_protocol</b>
139 (<i>const struct libwebsocket_protocols *</i> <b>protocol</b>)
143 <dd>Protocol whose connections will get callbacks
146 <h2>libwebsocket_set_timeout - marks the wsi as subject to a timeout</h2>
148 <b>libwebsocket_set_timeout</b>
149 (<i>struct libwebsocket *</i> <b>wsi</b>,
150 <i>enum pending_timeout</i> <b>reason</b>,
151 <i>int</i> <b>secs</b>)
155 <dd>Websocket connection instance
164 You will not need this unless you are doing something special
167 <h2>libwebsocket_get_socket_fd - returns the socket file descriptor</h2>
169 <b>libwebsocket_get_socket_fd</b>
170 (<i>struct libwebsocket *</i> <b>wsi</b>)
174 <dd>Websocket connection instance
179 You will not need this unless you are doing something special
182 <h2>libwebsocket_rx_flow_control - Enable and disable socket servicing for receieved packets.</h2>
184 <b>libwebsocket_rx_flow_control</b>
185 (<i>struct libwebsocket *</i> <b>wsi</b>,
186 <i>int</i> <b>enable</b>)
190 <dd>Websocket connection instance to get callback for
192 <dd>0 = disable read servicing for this connection, 1 = enable
197 If the output side of a server process becomes choked, this allows flow
198 control for the input side.
201 <h2>libwebsocket_canonical_hostname - returns this host's hostname</h2>
203 <b>libwebsocket_canonical_hostname</b>
204 (<i>struct libwebsocket_context *</i> <b>context</b>)
208 <dd>Websocket context
213 This is typically used by client code to fill in the host parameter
214 when making a client connection. You can only call it after the context
218 <h2>libwebsocket_create_context - Create the websocket handler</h2>
219 <i>struct libwebsocket_context *</i>
220 <b>libwebsocket_create_context</b>
221 (<i>int</i> <b>port</b>,
222 <i>const char *</i> <b>interf</b>,
223 <i>struct libwebsocket_protocols *</i> <b>protocols</b>,
224 <i>struct libwebsocket_extension *</i> <b>extensions</b>,
225 <i>const char *</i> <b>ssl_cert_filepath</b>,
226 <i>const char *</i> <b>ssl_private_key_filepath</b>,
227 <i>int</i> <b>gid</b>,
228 <i>int</i> <b>uid</b>,
229 <i>unsigned int</i> <b>options</b>)
233 <dd>Port to listen on... you can use 0 to suppress listening on
234 any port, that's what you want if you are not running a
235 websocket server at all but just using it as a client
237 <dd>NULL to bind the listen socket to all interfaces, or the
238 interface name, eg, "eth2"
240 <dd>Array of structures listing supported protocols and a protocol-
241 specific callback for each one. The list is ended with an
242 entry that has a NULL callback pointer.
243 It's not const because we write the owning_server member
244 <dt><b>extensions</b>
245 <dd>NULL or array of libwebsocket_extension structs listing the
246 extensions this context supports
247 <dt><b>ssl_cert_filepath</b>
248 <dd>If libwebsockets was compiled to use ssl, and you want
249 to listen using SSL, set to the filepath to fetch the
250 server cert from, otherwise NULL for unencrypted
251 <dt><b>ssl_private_key_filepath</b>
252 <dd>filepath to private key if wanting SSL mode,
255 <dd>group id to change to after setting listen socket, or -1.
257 <dd>user id to change to after setting listen socket, or -1.
259 <dd>0, or LWS_SERVER_OPTION_DEFEAT_CLIENT_MASK
263 This function creates the listening socket and takes care
264 of all initialization in one step.
266 After initialization, it returns a struct libwebsocket_context * that
267 represents this server. After calling, user code needs to take care
268 of calling <b>libwebsocket_service</b> with the context pointer to get the
269 server's sockets serviced. This can be done in the same process context
270 or a forked process, or another thread,
272 The protocol callback functions are called for a handful of events
273 including http requests coming in, websocket connections becoming
274 established, and data arriving; it's also called periodically to allow
277 HTTP requests are sent always to the FIRST protocol in <tt><b>protocol</b></tt>, since
278 at that time websocket protocol has not been negotiated. Other
279 protocols after the first one never see any HTTP callack activity.
281 The server created is a simple http server by default; part of the
282 websocket standard is upgrading this http connection to a websocket one.
284 This allows the same server to provide files like scripts and favicon /
285 images or whatever over http and dynamic data over websockets all in
286 one place; they're all handled in the user callback.
289 <h2>libwebsockets_fork_service_loop - Optional helper function forks off a process for the websocket server loop. You don't have to use this but if not, you have to make sure you are calling libwebsocket_service periodically to service the websocket traffic</h2>
291 <b>libwebsockets_fork_service_loop</b>
292 (<i>struct libwebsocket_context *</i> <b>context</b>)
296 <dd>server context returned by creation function
299 <h2>libwebsockets_get_protocol - Returns a protocol pointer from a websocket connection.</h2>
300 <i>const struct libwebsocket_protocols *</i>
301 <b>libwebsockets_get_protocol</b>
302 (<i>struct libwebsocket *</i> <b>wsi</b>)
306 <dd>pointer to struct websocket you want to know the protocol of
311 This is useful to get the protocol to broadcast back to from inside
315 <h2>libwebsockets_broadcast - Sends a buffer to the callback for all active connections of the given protocol.</h2>
317 <b>libwebsockets_broadcast</b>
318 (<i>const struct libwebsocket_protocols *</i> <b>protocol</b>,
319 <i>unsigned char *</i> <b>buf</b>,
320 <i>size_t</i> <b>len</b>)
324 <dd>pointer to the protocol you will broadcast to all members of
326 <dd>buffer containing the data to be broadcase. NOTE: this has to be
327 allocated with LWS_SEND_BUFFER_PRE_PADDING valid bytes before
328 the pointer and LWS_SEND_BUFFER_POST_PADDING afterwards in the
329 case you are calling this function from callback context.
331 <dd>length of payload data in buf, starting from buf.
335 This function allows bulk sending of a packet to every connection using
336 the given protocol. It does not send the data directly; instead it calls
337 the callback with a reason type of LWS_CALLBACK_BROADCAST. If the callback
338 wants to actually send the data for that connection, the callback itself
339 should call <b>libwebsocket_write</b>.
341 <b>libwebsockets_broadcast</b> can be called from another fork context without
342 having to take any care about data visibility between the processes, it'll
346 <h2>libwebsocket_write - Apply protocol then write data to client</h2>
348 <b>libwebsocket_write</b>
349 (<i>struct libwebsocket *</i> <b>wsi</b>,
350 <i>unsigned char *</i> <b>buf</b>,
351 <i>size_t</i> <b>len</b>,
352 <i>enum libwebsocket_write_protocol</i> <b>protocol</b>)
356 <dd>Websocket instance (available from user callback)
358 <dd>The data to send. For data being sent on a websocket
359 connection (ie, not default http), this buffer MUST have
360 LWS_SEND_BUFFER_PRE_PADDING bytes valid BEFORE the pointer
361 and an additional LWS_SEND_BUFFER_POST_PADDING bytes valid
362 in the buffer after (buf + len). This is so the protocol
363 header and trailer data can be added in-situ.
365 <dd>Count of the data bytes in the payload starting from buf
367 <dd>Use LWS_WRITE_HTTP to reply to an http connection, and one
368 of LWS_WRITE_BINARY or LWS_WRITE_TEXT to send appropriate
369 data on a websockets connection. Remember to allow the extra
370 bytes before and after buf if LWS_WRITE_BINARY or LWS_WRITE_TEXT
375 This function provides the way to issue data back to the client
376 for both http and websocket protocols.
378 In the case of sending using websocket protocol, be sure to allocate
379 valid storage before and after buf as explained above. This scheme
380 allows maximum efficiency of sending data and protocol in a single
381 packet while not burdening the user code with any protocol knowledge.
384 <h2>libwebsockets_serve_http_file - Send a file back to the client using http</h2>
386 <b>libwebsockets_serve_http_file</b>
387 (<i>struct libwebsocket *</i> <b>wsi</b>,
388 <i>const char *</i> <b>file</b>,
389 <i>const char *</i> <b>content_type</b>)
393 <dd>Websocket instance (available from user callback)
395 <dd>The file to issue over http
396 <dt><b>content_type</b>
397 <dd>The http content type, eg, text/html
401 This function is intended to be called from the callback in response
402 to http requests from the client. It allows the callback to issue
403 local files down the http link in a single step.
406 <h2>libwebsockets_remaining_packet_payload - Bytes to come before "overall" rx packet is complete</h2>
408 <b>libwebsockets_remaining_packet_payload</b>
409 (<i>struct libwebsocket *</i> <b>wsi</b>)
413 <dd>Websocket instance (available from user callback)
417 This function is intended to be called from the callback if the
418 user code is interested in "complete packets" from the client.
419 libwebsockets just passes through payload as it comes and issues a buffer
420 additionally when it hits a built-in limit. The LWS_CALLBACK_RECEIVE
421 callback handler can use this API to find out if the buffer it has just
422 been given is the last piece of a "complete packet" from the client --
423 when that is the case <b>libwebsockets_remaining_packet_payload</b> will return
426 Many protocols won't care becuse their packets are always small.
429 <h2>libwebsocket_client_connect - Connect to another websocket server</h2>
430 <i>struct libwebsocket *</i>
431 <b>libwebsocket_client_connect</b>
432 (<i>struct libwebsocket_context *</i> <b>context</b>,
433 <i>const char *</i> <b>address</b>,
434 <i>int</i> <b>port</b>,
435 <i>int</i> <b>ssl_connection</b>,
436 <i>const char *</i> <b>path</b>,
437 <i>const char *</i> <b>host</b>,
438 <i>const char *</i> <b>origin</b>,
439 <i>const char *</i> <b>protocol</b>,
440 <i>int</i> <b>ietf_version_or_minus_one</b>)
444 <dd>Websocket context
446 <dd>Remote server address, eg, "myserver.com"
448 <dd>Port to connect to on the remote server, eg, 80
449 <dt><b>ssl_connection</b>
450 <dd>0 = ws://, 1 = wss:// encrypted, 2 = wss:// allow self
453 <dd>Websocket path on server
455 <dd>Hostname on server
457 <dd>Socket origin name
459 <dd>Comma-separated list of protocols being asked for from
460 the server, or just one. The server will pick the one it
462 <dt><b>ietf_version_or_minus_one</b>
463 <dd>-1 to ask to connect using the default, latest
464 protocol supported, or the specific protocol ordinal
468 This function creates a connection to a remote server
471 <h2>libwebsocket_client_connect_extended - Connect to another websocket server</h2>
472 <i>struct libwebsocket *</i>
473 <b>libwebsocket_client_connect_extended</b>
474 (<i>struct libwebsocket_context *</i> <b>context</b>,
475 <i>const char *</i> <b>address</b>,
476 <i>int</i> <b>port</b>,
477 <i>int</i> <b>ssl_connection</b>,
478 <i>const char *</i> <b>path</b>,
479 <i>const char *</i> <b>host</b>,
480 <i>const char *</i> <b>origin</b>,
481 <i>const char *</i> <b>protocol</b>,
482 <i>int</i> <b>ietf_version_or_minus_one</b>,
483 <i>void *</i> <b>userdata</b>)
487 <dd>Websocket context
489 <dd>Remote server address, eg, "myserver.com"
491 <dd>Port to connect to on the remote server, eg, 80
492 <dt><b>ssl_connection</b>
493 <dd>0 = ws://, 1 = wss:// encrypted, 2 = wss:// allow self
496 <dd>Websocket path on server
498 <dd>Hostname on server
500 <dd>Socket origin name
502 <dd>Comma-separated list of protocols being asked for from
503 the server, or just one. The server will pick the one it
505 <dt><b>ietf_version_or_minus_one</b>
506 <dd>-1 to ask to connect using the default, latest
507 protocol supported, or the specific protocol ordinal
509 <dd>Pre-allocated user data
513 This function creates a connection to a remote server
516 <h2>callback - User server actions</h2>
517 <i>LWS_EXTERN int</i>
519 (<i>struct libwebsocket_context *</i> <b>context</b>,
520 <i>struct libwebsocket *</i> <b>wsi</b>,
521 <i>enum libwebsocket_callback_reasons</i> <b>reason</b>,
522 <i>void *</i> <b>user</b>,
523 <i>void *</i> <b>in</b>,
524 <i>size_t</i> <b>len</b>)
528 <dd>Websockets context
530 <dd>Opaque websocket instance pointer
532 <dd>The reason for the call
534 <dd>Pointer to per-session user data allocated by library
536 <dd>Pointer used for some callback reasons
538 <dd>Length set for some callback reasons
542 This callback is the way the user controls what is served. All the
543 protocol detail is hidden and handled by the library.
545 For each connection / session there is user data allocated that is
546 pointed to by "user". You set the size of this user data area when
547 the library is initialized with libwebsocket_create_server.
549 You get an opportunity to initialize user data when called back with
550 LWS_CALLBACK_ESTABLISHED reason.
552 <h3>LWS_CALLBACK_ESTABLISHED</h3>
554 after the server completes a handshake with
557 <h3>LWS_CALLBACK_CLIENT_CONNECTION_ERROR</h3>
559 the request client connection has
560 been unable to complete a handshake with the remote server
562 <h3>LWS_CALLBACK_CLIENT_ESTABLISHED</h3>
564 after your client connection completed
565 a handshake with the remote server
567 <h3>LWS_CALLBACK_CLOSED</h3>
569 when the websocket session ends
571 <h3>LWS_CALLBACK_BROADCAST</h3>
573 signal to send to client (you would use
574 <b>libwebsocket_write</b> taking care about the
575 special buffer requirements
577 <h3>LWS_CALLBACK_RECEIVE</h3>
579 data has appeared for this server endpoint from a
580 remote client, it can be found at *in and is
583 <h3>LWS_CALLBACK_CLIENT_RECEIVE_PONG</h3>
585 if you elected to see PONG packets,
586 they appear with this callback reason. PONG
587 packets only exist in 04+ protocol
589 <h3>LWS_CALLBACK_CLIENT_RECEIVE</h3>
591 data has appeared from the server for the
592 client connection, it can be found at *in and
595 <h3>LWS_CALLBACK_HTTP</h3>
597 an http request has come from a client that is not
598 asking to upgrade the connection to a websocket
599 one. This is a chance to serve http content,
600 for example, to send a script to the client
601 which will then open the websockets connection.
602 <tt><b>in</b></tt> points to the URI path requested and
603 <b>libwebsockets_serve_http_file</b> makes it very
604 simple to send back a file to the client.
606 <h3>LWS_CALLBACK_SERVER_WRITEABLE</h3>
609 <b>libwebsocket_callback_on_writable</b> on a connection, you will
610 get one of these callbacks coming when the connection socket
611 is able to accept another write packet without blocking.
612 If it already was able to take another packet without blocking,
613 you'll get this callback at the next call to the service loop
614 function. Notice that CLIENTs get LWS_CALLBACK_CLIENT_WRITEABLE
615 and servers get LWS_CALLBACK_SERVER_WRITEABLE.
617 <h3>LWS_CALLBACK_FILTER_NETWORK_CONNECTION</h3>
619 called when a client connects to
620 the server at network level; the connection is accepted but then
621 passed to this callback to decide whether to hang up immediately
622 or not, based on the client IP. <tt><b>user</b></tt> contains the connection
623 socket's descriptor. Return non-zero to terminate
624 the connection before sending or receiving anything.
625 Because this happens immediately after the network connection
626 from the client, there's no websocket protocol selected yet so
627 this callback is issued only to protocol 0.
629 <h3>LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION</h3>
631 called when the handshake has
632 been received and parsed from the client, but the response is
633 not sent yet. Return non-zero to disallow the connection.
634 <tt><b>user</b></tt> is a pointer to an array of struct lws_tokens, you can
635 use the header enums lws_token_indexes from libwebsockets.h
636 to check for and read the supported header presence and
637 content before deciding to allow the handshake to proceed or
638 to kill the connection.
640 <h3>LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS</h3>
643 including OpenSSL support, this callback allows your user code
644 to perform extra <b>SSL_CTX_load_verify_locations</b> or similar
645 calls to direct OpenSSL where to find certificates the client
646 can use to confirm the remote server identity. <tt><b>user</b></tt> is the
649 <h3>LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS</h3>
652 including OpenSSL support, this callback allows your user code
653 to load extra certifcates into the server which allow it to
654 verify the validity of certificates returned by clients. <tt><b>user</b></tt>
655 is the server's OpenSSL SSL_CTX*
657 <h3>LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION</h3>
660 libwebsockets context was created with the option
661 LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT, then this
662 callback is generated during OpenSSL verification of the cert
663 sent from the client. It is sent to protocol[0] callback as
664 no protocol has been negotiated on the connection yet.
665 Notice that the libwebsockets context and wsi are both NULL
666 during this callback. See
670 //www.openssl.org/docs/ssl/SSL_CTX_set_verify.html
671 to understand more detail about the OpenSSL callback that
672 generates this libwebsockets callback and the meanings of the
673 arguments passed. In this callback, <tt><b>user</b></tt> is the x509_ctx,
674 <tt><b>in</b></tt> is the ssl pointer and <tt><b>len</b></tt> is preverify_ok
675 Notice that this callback maintains libwebsocket return
676 conventions, return 0 to mean the cert is OK or 1 to fail it.
677 This also means that if you don't handle this callback then
678 the default callback action of returning 0 allows the client
681 <h3>LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER</h3>
683 this callback happens
684 when a client handshake is being compiled. <tt><b>user</b></tt> is NULL,
685 <tt><b>in</b></tt> is a char **, it's pointing to a char * which holds the
686 next location in the header buffer where you can add
687 headers, and <tt><b>len</b></tt> is the remaining space in the header buffer,
688 which is typically some hundreds of bytes. So, to add a canned
689 cookie, your handler code might look similar to:
691 char **p = (char **)in;
696 *p += sprintf(*p, "Cookie: a=b\x0d\x0a");
700 Notice if you add anything, you just have to take care about
701 the CRLF on the line you added. Obviously this callback is
702 optional, if you don't handle it everything is fine.
704 Notice the callback is coming to protocols[0] all the time,
705 because there is no specific protocol handshook yet.
707 <h3>LWS_CALLBACK_CONFIRM_EXTENSION_OKAY</h3>
709 When the server handshake code
710 sees that it does support a requested extension, before
711 accepting the extension by additing to the list sent back to
712 the client it gives this callback just to check that it's okay
713 to use that extension. It calls back to the requested protocol
714 and with <tt><b>in</b></tt> being the extension name, <tt><b>len</b></tt> is 0 and <tt><b>user</b></tt> is
715 valid. Note though at this time the ESTABLISHED callback hasn't
716 happened yet so if you initialize <tt><b>user</b></tt> content there, <tt><b>user</b></tt>
717 content during this callback might not be useful for anything.
718 Notice this callback comes to protocols[0].
720 <h3>LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED</h3>
723 connection is being prepared to start a handshake to a server,
724 each supported extension is checked with protocols[0] callback
725 with this reason, giving the user code a chance to suppress the
726 claim to support that extension by returning non-zero. If
727 unhandled, by default 0 will be returned and the extension
728 support included in the header to the server. Notice this
729 callback comes to protocols[0].
731 The next four reasons are optional and only need taking care of if you
732 will be integrating libwebsockets sockets into an external polling
735 <h3>LWS_CALLBACK_ADD_POLL_FD</h3>
737 libwebsocket deals with its <b>poll</b> loop
738 internally, but in the case you are integrating with another
739 server you will need to have libwebsocket sockets share a
740 polling array with the other server. This and the other
741 POLL_FD related callbacks let you put your specialized
742 poll array interface code in the callback for protocol 0, the
743 first protocol you support, usually the HTTP protocol in the
744 serving case. This callback happens when a socket needs to be
746 <h3>added to the polling loop</h3>
748 <tt><b>user</b></tt> contains the fd, and
749 <tt><b>len</b></tt> is the events bitmap (like, POLLIN). If you are using the
750 internal polling loop (the "service" callback), you can just
751 ignore these callbacks.
753 <h3>LWS_CALLBACK_DEL_POLL_FD</h3>
755 This callback happens when a socket descriptor
756 needs to be removed from an external polling array. <tt><b>user</b></tt> is
757 the socket desricptor. If you are using the internal polling
758 loop, you can just ignore it.
760 <h3>LWS_CALLBACK_SET_MODE_POLL_FD</h3>
762 This callback happens when libwebsockets
763 wants to modify the events for the socket descriptor in <tt><b>user</b></tt>.
764 The handler should OR <tt><b>len</b></tt> on to the events member of the pollfd
765 struct for this socket descriptor. If you are using the
766 internal polling loop, you can just ignore it.
768 <h3>LWS_CALLBACK_CLEAR_MODE_POLL_FD</h3>
770 This callback occurs when libwebsockets
771 wants to modify the events for the socket descriptor in <tt><b>user</b></tt>.
772 The handler should AND ~<tt><b>len</b></tt> on to the events member of the
773 pollfd struct for this socket descriptor. If you are using the
774 internal polling loop, you can just ignore it.
777 <h2>extension_callback - Hooks to allow extensions to operate</h2>
778 <i>LWS_EXTERN int</i>
779 <b>extension_callback</b>
780 (<i>struct libwebsocket_context *</i> <b>context</b>,
781 <i>struct libwebsocket_extension *</i> <b>ext</b>,
782 <i>struct libwebsocket *</i> <b>wsi</b>,
783 <i>enum libwebsocket_extension_callback_reasons</i> <b>reason</b>,
784 <i>void *</i> <b>user</b>,
785 <i>void *</i> <b>in</b>,
786 <i>size_t</i> <b>len</b>)
790 <dd>Websockets context
794 <dd>Opaque websocket instance pointer
796 <dd>The reason for the call
798 <dd>Pointer to per-session user data allocated by library
800 <dd>Pointer used for some callback reasons
802 <dd>Length set for some callback reasons
806 Each extension that is active on a particular connection receives
807 callbacks during the connection lifetime to allow the extension to
808 operate on websocket data and manage itself.
810 Libwebsockets takes care of allocating and freeing "user" memory for
811 each active extension on each connection. That is what is pointed to
812 by the <tt><b>user</b></tt> parameter.
814 <h3>LWS_EXT_CALLBACK_CONSTRUCT</h3>
816 called when the server has decided to
817 select this extension from the list provided by the client,
818 just before the server will send back the handshake accepting
819 the connection with this extension active. This gives the
820 extension a chance to initialize its connection context found
821 in <tt><b>user</b></tt>.
823 <h3>LWS_EXT_CALLBACK_CLIENT_CONSTRUCT</h3>
825 same as LWS_EXT_CALLBACK_CONSTRUCT
826 but called when client is instantiating this extension. Some
827 extensions will work the same on client and server side and then
828 you can just merge handlers for both CONSTRUCTS.
830 <h3>LWS_EXT_CALLBACK_DESTROY</h3>
832 called when the connection the extension was
833 being used on is about to be closed and deallocated. It's the
834 last chance for the extension to deallocate anything it has
835 allocated in the user data (pointed to by <tt><b>user</b></tt>) before the
836 user data is deleted. This same callback is used whether you
837 are in client or server instantiation context.
839 <h3>LWS_EXT_CALLBACK_PACKET_RX_PREPARSE</h3>
841 when this extension was active on
842 a connection, and a packet of data arrived at the connection,
843 it is passed to this callback to give the extension a chance to
844 change the data, eg, decompress it. <tt><b>user</b></tt> is pointing to the
845 extension's private connection context data, <tt><b>in</b></tt> is pointing
846 to an lws_tokens struct, it consists of a char * pointer called
847 token, and an int called token_len. At entry, these are
848 set to point to the received buffer and set to the content
849 length. If the extension will grow the content, it should use
850 a new buffer allocated in its private user context data and
851 set the pointed-to lws_tokens members to point to its buffer.
853 <h3>LWS_EXT_CALLBACK_PACKET_TX_PRESEND</h3>
855 this works the same way as
856 LWS_EXT_CALLBACK_PACKET_RX_PREPARSE above, except it gives the
857 extension a chance to change websocket data just before it will
858 be sent out. Using the same lws_token pointer scheme in <tt><b>in</b></tt>,
859 the extension can change the buffer and the length to be
860 transmitted how it likes. Again if it wants to grow the
861 buffer safely, it should copy the data into its own buffer and
862 set the lws_tokens token pointer to it.
865 <h2>struct libwebsocket_protocols - List of protocols and handlers server supports.</h2>
866 <b>struct libwebsocket_protocols</b> {<br>
867 <i>const char *</i> <b>name</b>;<br>
868 <i>callback_function *</i> <b>callback</b>;<br>
869 <i>size_t</i> <b>per_session_data_size</b>;<br>
870 <i>struct libwebsocket_context *</i> <b>owning_server</b>;<br>
871 <i>int</i> <b>broadcast_socket_port</b>;<br>
872 <i>int</i> <b>broadcast_socket_user_fd</b>;<br>
873 <i>int</i> <b>protocol_index</b>;<br>
878 <dd>Protocol name that must match the one given in the client
879 Javascript new WebSocket(url, 'protocol') name
881 <dd>The service callback used for this protocol. It allows the
882 service action for an entire protocol to be encapsulated in
883 the protocol-specific callback
884 <dt><b>per_session_data_size</b>
885 <dd>Each new connection using this protocol gets
886 this much memory allocated on connection establishment and
887 freed on connection takedown. A pointer to this per-connection
888 allocation is passed into the callback in the 'user' parameter
889 <dt><b>owning_server</b>
890 <dd>the server init call fills in this opaque pointer when
891 registering this protocol with the server.
892 <dt><b>broadcast_socket_port</b>
893 <dd>the server init call fills this in with the
894 localhost port number used to forward broadcasts for this
896 <dt><b>broadcast_socket_user_fd</b>
897 <dd>the server init call fills this in ... the <b>main</b>
898 process context can write to this socket to perform broadcasts
899 (use the <b>libwebsockets_broadcast</b> api to do this instead,
900 it works from any process context)
901 <dt><b>protocol_index</b>
902 <dd>which protocol we are starting from zero
906 This structure represents one protocol supported by the server. An
907 array of these structures is passed to <b>libwebsocket_create_server</b>
908 allows as many protocols as you like to be handled by one server.
911 <h2>struct libwebsocket_extension - An extension we know how to cope with</h2>
912 <b>struct libwebsocket_extension</b> {<br>
913 <i>const char *</i> <b>name</b>;<br>
914 <i>extension_callback_function *</i> <b>callback</b>;<br>
915 <i>size_t</i> <b>per_session_data_size</b>;<br>
916 <i>void *</i> <b>per_context_private_data</b>;<br>
921 <dd>Formal extension name, eg, "deflate-stream"
924 <dt><b>per_session_data_size</b>
925 <dd>Libwebsockets will auto-malloc this much
926 memory for the use of the extension, a pointer
927 to it comes in the <tt><b>user</b></tt> callback parameter
928 <dt><b>per_context_private_data</b>
929 <dd>Optional storage for this externsion that
930 is per-context, so it can track stuff across
931 all sessions, etc, if it wants