Dear Evgeny,
> The best what MHD could do with "upgraded" sockets - is
> to forward data to application and back to remote.
Yes - as much as data until the socket blocks. And it
should hide everything else from the application, e.g.
"sha1('Sec-WebSocket-Accept')".
Is is easy to figure out, whether the the data contains
half of a request or multiple requests.
I don't know about others, but we need only the server-side
counterpart to the javascript "new WebSocket(url)".
Thanks a lot!
Markus

Am Montag, den 14.11.2016, 15:35 +0300 schrieb Evgeny Grin:
> Dear Markus,
> 
> It's clear how to use this logic for HTTP connections.
> But application may use any arbitrary protocol for "upgraded" sockets
> so
> MHD doesn't know what should be interpreted as "request"(if word
> "request" is applicable for protocol). The best what MHD could do
> with
> "upgraded" sockets - is to forward data to application and back to
> remote.
> That's implemented currently. For TLS connections, MHD hides all
> TLS-related machinery and provides plain socket for application.
> 
> Not sure that I get idea about "pipe() on TLS". Could you explain it
> a
> little?
> 

Reply via email to