94 lines
2.7 KiB
C
94 lines
2.7 KiB
C
/*
|
|
* libwebsockets-test-server - libwebsockets test implementation
|
|
*
|
|
* Copyright (C) 2010-2016 Andy Green <andy@warmcat.com>
|
|
*
|
|
* This file is made available under the Creative Commons CC0 1.0
|
|
* Universal Public Domain Dedication.
|
|
*
|
|
* The person who associated a work with this deed has dedicated
|
|
* the work to the public domain by waiving all of his or her rights
|
|
* to the work worldwide under copyright law, including all related
|
|
* and neighboring rights, to the extent allowed by law. You can copy,
|
|
* modify, distribute and perform the work, even for commercial purposes,
|
|
* all without asking permission.
|
|
*
|
|
* The test apps are intended to be adapted for use in your code, which
|
|
* may be proprietary. So unlike the library itself, they are licensed
|
|
* Public Domain.
|
|
*/
|
|
#include "test-server.h"
|
|
|
|
/* dumb_increment protocol */
|
|
|
|
int
|
|
callback_dumb_increment(struct lws *wsi, enum lws_callback_reasons reason,
|
|
void *user, void *in, size_t len)
|
|
{
|
|
unsigned char buf[LWS_PRE + 512];
|
|
struct per_session_data__dumb_increment *pss =
|
|
(struct per_session_data__dumb_increment *)user;
|
|
unsigned char *p = &buf[LWS_PRE];
|
|
int n, m;
|
|
|
|
switch (reason) {
|
|
|
|
case LWS_CALLBACK_ESTABLISHED:
|
|
pss->number = 0;
|
|
break;
|
|
|
|
case LWS_CALLBACK_SERVER_WRITEABLE:
|
|
n = sprintf((char *)p, "%d", pss->number++);
|
|
m = lws_write(wsi, p, n, LWS_WRITE_TEXT);
|
|
if (m < n) {
|
|
lwsl_err("ERROR %d writing to di socket\n", n);
|
|
return -1;
|
|
}
|
|
if (close_testing && pss->number == 50) {
|
|
lwsl_info("close tesing limit, closing\n");
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case LWS_CALLBACK_RECEIVE:
|
|
if (len < 6)
|
|
break;
|
|
if (strcmp((const char *)in, "reset\n") == 0)
|
|
pss->number = 0;
|
|
if (strcmp((const char *)in, "closeme\n") == 0) {
|
|
lwsl_notice("dumb_inc: closing as requested\n");
|
|
lws_close_reason(wsi, LWS_CLOSE_STATUS_GOINGAWAY,
|
|
(unsigned char *)"seeya", 5);
|
|
return -1;
|
|
}
|
|
break;
|
|
/*
|
|
* this just demonstrates how to use the protocol filter. If you won't
|
|
* study and reject connections based on header content, you don't need
|
|
* to handle this callback
|
|
*/
|
|
case LWS_CALLBACK_FILTER_PROTOCOL_CONNECTION:
|
|
dump_handshake_info(wsi);
|
|
/* you could return non-zero here and kill the connection */
|
|
break;
|
|
|
|
/*
|
|
* this just demonstrates how to handle
|
|
* LWS_CALLBACK_WS_PEER_INITIATED_CLOSE and extract the peer's close
|
|
* code and auxiliary data. You can just not handle it if you don't
|
|
* have a use for this.
|
|
*/
|
|
case LWS_CALLBACK_WS_PEER_INITIATED_CLOSE:
|
|
lwsl_notice("LWS_CALLBACK_WS_PEER_INITIATED_CLOSE: len %lu\n",
|
|
(unsigned long)len);
|
|
for (n = 0; n < (int)len; n++)
|
|
lwsl_notice(" %d: 0x%02X\n", n,
|
|
((unsigned char *)in)[n]);
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|