Dear Evgeny,
> The best what MHD could do with "upgraded" sockets - is
> to forward data to application and back to remote.
Yes - as much as data until the socket blocks. And it
should hide everything else from the application, e.g.
"sha1('Sec-WebSocket-Accept')".
Is is easy to figure out, whether the the data contains
half of a request or multiple requests.
I don't know about others, but we need only the server-side
counterpart to the javascript "new WebSocket(url)".
Thanks a lot!
MarkusAm Montag, den 14.11.2016, 15:35 +0300 schrieb Evgeny Grin: > Dear Markus, > > It's clear how to use this logic for HTTP connections. > But application may use any arbitrary protocol for "upgraded" sockets > so > MHD doesn't know what should be interpreted as "request"(if word > "request" is applicable for protocol). The best what MHD could do > with > "upgraded" sockets - is to forward data to application and back to > remote. > That's implemented currently. For TLS connections, MHD hides all > TLS-related machinery and provides plain socket for application. > > Not sure that I get idea about "pipe() on TLS". Could you explain it > a > little? >
