mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
511 lines
18 KiB
C
511 lines
18 KiB
C
// Copyright 2020 Espressif Systems (Shanghai) PTE LTD
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/random.h>
|
|
#include <esp_log.h>
|
|
#include <esp_err.h>
|
|
#include <mbedtls/sha1.h>
|
|
#include <mbedtls/base64.h>
|
|
|
|
#include <esp_http_server.h>
|
|
#include "esp_httpd_priv.h"
|
|
|
|
#ifdef CONFIG_HTTPD_WS_SUPPORT
|
|
|
|
static const char *TAG="httpd_ws";
|
|
|
|
/*
|
|
* Bit masks for WebSocket frames.
|
|
* Please refer to RFC6455 Section 5.2 for more details.
|
|
*/
|
|
#define HTTPD_WS_CONTINUE 0x00U
|
|
#define HTTPD_WS_FIN_BIT 0x80U
|
|
#define HTTPD_WS_OPCODE_BITS 0x0fU
|
|
#define HTTPD_WS_MASK_BIT 0x80U
|
|
#define HTTPD_WS_LENGTH_BITS 0x7fU
|
|
|
|
/*
|
|
* The magic GUID string used for handshake
|
|
* Please refer to RFC6455 Section 1.3 for more details.
|
|
*/
|
|
static const char ws_magic_uuid[] = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
|
|
|
|
/* Checks if any subprotocols from the comma seperated list matches the supported one
|
|
*
|
|
* Returns true if the response should contain a protocol field
|
|
*/
|
|
|
|
/**
|
|
* @brief Checks if any subprotocols from the comma seperated list matches the supported one
|
|
*
|
|
* @param supported_subprotocol[in] The subprotocol supported by the URI
|
|
* @param subprotocol[in], [in]: A comma seperate list of subprotocols requested
|
|
* @param buf_len Length of the buffer
|
|
* @return true: found a matching subprotocol
|
|
* @return false
|
|
*/
|
|
static bool httpd_ws_get_response_subprotocol(const char *supported_subprotocol, char *subprotocol, size_t buf_len)
|
|
{
|
|
/* Request didnt contain any subprotocols */
|
|
if (strnlen(subprotocol, buf_len) == 0) {
|
|
return false;
|
|
}
|
|
|
|
if (supported_subprotocol == NULL) {
|
|
ESP_LOGW(TAG, "Sec-WebSocket-Protocol %s not supported, URI do not support any subprotocols", subprotocol);
|
|
return false;
|
|
}
|
|
|
|
/* Get first subprotocol from comma seperated list */
|
|
char *rest = NULL;
|
|
char *s = strtok_r(subprotocol, ", ", &rest);
|
|
do {
|
|
if (strncmp(s, supported_subprotocol, sizeof(subprotocol)) == 0) {
|
|
ESP_LOGD(TAG, "Requested subprotocol supported: %s", s);
|
|
return true;
|
|
}
|
|
} while ((s = strtok_r(NULL, ", ", &rest)) != NULL);
|
|
|
|
ESP_LOGW(TAG, "Sec-WebSocket-Protocol %s not supported, supported subprotocol is %s", subprotocol, supported_subprotocol);
|
|
|
|
/* No matches */
|
|
return false;
|
|
|
|
}
|
|
|
|
esp_err_t httpd_ws_respond_server_handshake(httpd_req_t *req, const char *supported_subprotocol)
|
|
{
|
|
/* Probe if input parameters are valid or not */
|
|
if (!req || !req->aux) {
|
|
ESP_LOGW(TAG, LOG_FMT("Argument is invalid"));
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
/* Detect handshake - reject if handshake was ALREADY performed */
|
|
struct httpd_req_aux *req_aux = req->aux;
|
|
if (req_aux->sd->ws_handshake_done) {
|
|
ESP_LOGW(TAG, LOG_FMT("State is invalid - Handshake has been performed"));
|
|
return ESP_ERR_INVALID_STATE;
|
|
}
|
|
|
|
/* Detect WS version existence */
|
|
char version_val[3] = { '\0' };
|
|
if (httpd_req_get_hdr_value_str(req, "Sec-WebSocket-Version", version_val, sizeof(version_val)) != ESP_OK) {
|
|
ESP_LOGW(TAG, LOG_FMT("\"Sec-WebSocket-Version\" is not found"));
|
|
return ESP_ERR_NOT_FOUND;
|
|
}
|
|
|
|
/* Detect if WS version is "13" or not.
|
|
* WS version must be 13 for now. Please refer to RFC6455 Section 4.1, Page 18 for more details. */
|
|
if (strcasecmp(version_val, "13") != 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("\"Sec-WebSocket-Version\" is not \"13\", it is: %s"), version_val);
|
|
return ESP_ERR_INVALID_VERSION;
|
|
}
|
|
|
|
/* Grab Sec-WebSocket-Key (client key) from the header */
|
|
/* Size of base64 coded string is equal '((input_size * 4) / 3) + (input_size / 96) + 6' including Z-term */
|
|
char sec_key_encoded[28] = { '\0' };
|
|
if (httpd_req_get_hdr_value_str(req, "Sec-WebSocket-Key", sec_key_encoded, sizeof(sec_key_encoded)) != ESP_OK) {
|
|
ESP_LOGW(TAG, LOG_FMT("Cannot find client key"));
|
|
return ESP_ERR_NOT_FOUND;
|
|
}
|
|
|
|
/* Prepare server key (Sec-WebSocket-Accept), concat the string */
|
|
char server_key_encoded[33] = { '\0' };
|
|
uint8_t server_key_hash[20] = { 0 };
|
|
char server_raw_text[sizeof(sec_key_encoded) + sizeof(ws_magic_uuid) + 1] = { '\0' };
|
|
|
|
strcpy(server_raw_text, sec_key_encoded);
|
|
strcat(server_raw_text, ws_magic_uuid);
|
|
|
|
ESP_LOGD(TAG, LOG_FMT("Server key before encoding: %s"), server_raw_text);
|
|
|
|
/* Generate SHA-1 first and then encode to Base64 */
|
|
size_t key_len = strlen(server_raw_text);
|
|
mbedtls_sha1_ret((uint8_t *)server_raw_text, key_len, server_key_hash);
|
|
|
|
size_t encoded_len = 0;
|
|
mbedtls_base64_encode((uint8_t *)server_key_encoded, sizeof(server_key_encoded), &encoded_len,
|
|
server_key_hash, sizeof(server_key_hash));
|
|
|
|
ESP_LOGD(TAG, LOG_FMT("Generated server key: %s"), server_key_encoded);
|
|
|
|
char subprotocol[50] = { '\0' };
|
|
if (httpd_req_get_hdr_value_str(req, "Sec-WebSocket-Protocol", subprotocol, sizeof(subprotocol) - 1) == ESP_ERR_HTTPD_RESULT_TRUNC) {
|
|
ESP_LOGW(TAG, "Sec-WebSocket-Protocol length exceeded buffer size of %d, was trunctated", sizeof(subprotocol));
|
|
}
|
|
|
|
|
|
/* Prepare the Switching Protocol response */
|
|
char tx_buf[192] = { '\0' };
|
|
int fmt_len = snprintf(tx_buf, sizeof(tx_buf),
|
|
"HTTP/1.1 101 Switching Protocols\r\n"
|
|
"Upgrade: websocket\r\n"
|
|
"Connection: Upgrade\r\n"
|
|
"Sec-WebSocket-Accept: %s\r\n", server_key_encoded);
|
|
|
|
if (fmt_len < 0 || fmt_len > sizeof(tx_buf)) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to prepare Tx buffer"));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
if ( httpd_ws_get_response_subprotocol(supported_subprotocol, subprotocol, sizeof(subprotocol))) {
|
|
ESP_LOGD(TAG, "subprotocol: %s", subprotocol);
|
|
int r = snprintf(tx_buf + fmt_len, sizeof(tx_buf) - fmt_len, "Sec-WebSocket-Protocol: %s\r\n", supported_subprotocol);
|
|
if (r <= 0) {
|
|
ESP_LOGE(TAG, "Error in response generation"
|
|
"(snprintf of subprotocol returned %d, buffer size: %d", r, sizeof(tx_buf));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
fmt_len += r;
|
|
|
|
if (fmt_len >= sizeof(tx_buf)) {
|
|
ESP_LOGE(TAG, "Error in response generation"
|
|
"(snprintf of subprotocol returned %d, desired response len: %d, buffer size: %d", r, fmt_len, sizeof(tx_buf));
|
|
return ESP_FAIL;
|
|
}
|
|
}
|
|
|
|
int r = snprintf(tx_buf + fmt_len, sizeof(tx_buf) - fmt_len, "\r\n");
|
|
if (r <= 0) {
|
|
ESP_LOGE(TAG, "Error in response generation"
|
|
"(snprintf of subprotocol returned %d, buffer size: %d", r, sizeof(tx_buf));
|
|
return ESP_FAIL;
|
|
}
|
|
fmt_len += r;
|
|
if (fmt_len >= sizeof(tx_buf)) {
|
|
ESP_LOGE(TAG, "Error in response generation"
|
|
"(snprintf of header terminal returned %d, desired response len: %d, buffer size: %d", r, fmt_len, sizeof(tx_buf));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
/* Send off the response */
|
|
if (httpd_send(req, tx_buf, fmt_len) < 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to send the response"));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
return ESP_OK;
|
|
}
|
|
|
|
static esp_err_t httpd_ws_check_req(httpd_req_t *req)
|
|
{
|
|
/* Probe if input parameters are valid or not */
|
|
if (!req || !req->aux) {
|
|
ESP_LOGW(TAG, LOG_FMT("Argument is null"));
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
/* Detect handshake - reject if handshake was NOT YET performed */
|
|
struct httpd_req_aux *req_aux = req->aux;
|
|
if (!req_aux->sd->ws_handshake_done) {
|
|
ESP_LOGW(TAG, LOG_FMT("State is invalid - No handshake performed"));
|
|
return ESP_ERR_INVALID_STATE;
|
|
}
|
|
|
|
return ESP_OK;
|
|
}
|
|
|
|
static esp_err_t httpd_ws_unmask_payload(uint8_t *payload, size_t len, const uint8_t *mask_key)
|
|
{
|
|
if (len < 1 || !payload) {
|
|
ESP_LOGW(TAG, LOG_FMT("Invalid payload provided"));
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
for (size_t idx = 0; idx < len; idx++) {
|
|
payload[idx] = (payload[idx] ^ mask_key[idx % 4]);
|
|
}
|
|
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t httpd_ws_recv_frame(httpd_req_t *req, httpd_ws_frame_t *frame, size_t max_len)
|
|
{
|
|
esp_err_t ret = httpd_ws_check_req(req);
|
|
if (ret != ESP_OK) {
|
|
return ret;
|
|
}
|
|
|
|
struct httpd_req_aux *aux = req->aux;
|
|
if (aux == NULL) {
|
|
ESP_LOGW(TAG, LOG_FMT("Invalid Aux pointer"));
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
if (!frame) {
|
|
ESP_LOGW(TAG, LOG_FMT("Frame pointer is invalid"));
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
/* Assign the frame info from the previous reading */
|
|
frame->type = aux->ws_type;
|
|
frame->final = aux->ws_final;
|
|
|
|
/* Grab the second byte */
|
|
uint8_t second_byte = 0;
|
|
if (httpd_recv_with_opt(req, (char *)&second_byte, sizeof(second_byte), false) <= 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to receive the second byte"));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
/* Parse the second byte */
|
|
/* Please refer to RFC6455 Section 5.2 for more details */
|
|
bool masked = (second_byte & HTTPD_WS_MASK_BIT) != 0;
|
|
|
|
/* Interpret length */
|
|
uint8_t init_len = second_byte & HTTPD_WS_LENGTH_BITS;
|
|
if (init_len < 126) {
|
|
/* Case 1: If length is 0-125, then this length bit is 7 bits */
|
|
frame->len = init_len;
|
|
} else if (init_len == 126) {
|
|
/* Case 2: If length byte is 126, then this frame's length bit is 16 bits */
|
|
uint8_t length_bytes[2] = { 0 };
|
|
if (httpd_recv_with_opt(req, (char *)length_bytes, sizeof(length_bytes), false) <= 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to receive 2 bytes length"));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
frame->len = ((uint32_t)(length_bytes[0] << 8U) | (length_bytes[1]));
|
|
} else if (init_len == 127) {
|
|
/* Case 3: If length is byte 127, then this frame's length bit is 64 bits */
|
|
uint8_t length_bytes[8] = { 0 };
|
|
if (httpd_recv_with_opt(req, (char *)length_bytes, sizeof(length_bytes), false) <= 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to receive 2 bytes length"));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
frame->len = (((uint64_t)length_bytes[0] << 56U) |
|
|
((uint64_t)length_bytes[1] << 48U) |
|
|
((uint64_t)length_bytes[2] << 40U) |
|
|
((uint64_t)length_bytes[3] << 32U) |
|
|
((uint64_t)length_bytes[4] << 24U) |
|
|
((uint64_t)length_bytes[5] << 16U) |
|
|
((uint64_t)length_bytes[6] << 8U) |
|
|
((uint64_t)length_bytes[7]));
|
|
}
|
|
|
|
/* We only accept the incoming packet length that is smaller than the max_len (or it will overflow the buffer!) */
|
|
if (frame->len > max_len) {
|
|
ESP_LOGW(TAG, LOG_FMT("WS Message too long"));
|
|
return ESP_ERR_INVALID_SIZE;
|
|
}
|
|
|
|
/* If this frame is masked, dump the mask as well */
|
|
uint8_t mask_key[4] = { 0 };
|
|
if (masked) {
|
|
if (httpd_recv_with_opt(req, (char *)mask_key, sizeof(mask_key), false) <= 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to receive mask key"));
|
|
return ESP_FAIL;
|
|
}
|
|
} else {
|
|
/* If the WS frame from client to server is not masked, it should be rejected.
|
|
* Please refer to RFC6455 Section 5.2 for more details. */
|
|
ESP_LOGW(TAG, LOG_FMT("WS frame is not properly masked."));
|
|
return ESP_ERR_INVALID_STATE;
|
|
}
|
|
|
|
/* Receive buffer */
|
|
/* If there's nothing to receive, return and stop here. */
|
|
if (frame->len == 0) {
|
|
return ESP_OK;
|
|
}
|
|
|
|
if (frame->payload == NULL) {
|
|
ESP_LOGW(TAG, LOG_FMT("Payload buffer is null"));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
size_t left_len = frame->len;
|
|
size_t offset = 0;
|
|
|
|
while (left_len > 0) {
|
|
int read_len = httpd_recv_with_opt(req, (char *)frame->payload + offset, left_len, false);
|
|
if (read_len <= 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to receive payload"));
|
|
return ESP_FAIL;
|
|
}
|
|
offset += read_len;
|
|
left_len -= read_len;
|
|
|
|
ESP_LOGD(TAG, "Frame length: %d, Bytes Read: %d", frame->len, offset);
|
|
}
|
|
|
|
/* Unmask payload */
|
|
httpd_ws_unmask_payload(frame->payload, frame->len, mask_key);
|
|
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t httpd_ws_send_frame(httpd_req_t *req, httpd_ws_frame_t *frame)
|
|
{
|
|
esp_err_t ret = httpd_ws_check_req(req);
|
|
if (ret != ESP_OK) {
|
|
return ret;
|
|
}
|
|
return httpd_ws_send_frame_async(req->handle, httpd_req_to_sockfd(req), frame);
|
|
}
|
|
|
|
esp_err_t httpd_ws_send_frame_async(httpd_handle_t hd, int fd, httpd_ws_frame_t *frame)
|
|
{
|
|
if (!frame) {
|
|
ESP_LOGW(TAG, LOG_FMT("Argument is invalid"));
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
/* Prepare Tx buffer - maximum length is 14, which includes 2 bytes header, 8 bytes length, 4 bytes mask key */
|
|
uint8_t tx_len = 0;
|
|
uint8_t header_buf[10] = {0 };
|
|
/* Set the `FIN` bit by default if message is not fragmented. Else, set it as per the `final` field */
|
|
header_buf[0] |= (!frame->fragmented) ? HTTPD_WS_FIN_BIT : (frame->final? HTTPD_WS_FIN_BIT: HTTPD_WS_CONTINUE);
|
|
header_buf[0] |= frame->type; /* Type (opcode): 4 bits */
|
|
|
|
if (frame->len <= 125) {
|
|
header_buf[1] = frame->len & 0x7fU; /* Length for 7 bits */
|
|
tx_len = 2;
|
|
} else if (frame->len > 125 && frame->len < UINT16_MAX) {
|
|
header_buf[1] = 126; /* Length for 16 bits */
|
|
header_buf[2] = (frame->len >> 8U) & 0xffU;
|
|
header_buf[3] = frame->len & 0xffU;
|
|
tx_len = 4;
|
|
} else {
|
|
header_buf[1] = 127; /* Length for 64 bits */
|
|
uint8_t shift_idx = sizeof(uint64_t) - 1; /* Shift index starts at 7 */
|
|
uint64_t len64 = frame->len; /* Raise variable size to make sure we won't shift by more bits
|
|
* than the length has (to avoid undefined behaviour) */
|
|
for (int8_t idx = 2; idx <= 9; idx++) {
|
|
/* Now do shifting (be careful of endianness, i.e. when buffer index is 2, frame length shift index is 7) */
|
|
header_buf[idx] = (len64 >> (shift_idx * 8)) & 0xffU;
|
|
shift_idx--;
|
|
}
|
|
tx_len = 10;
|
|
}
|
|
|
|
/* WebSocket server does not required to mask response payload, so leave the MASK bit as 0. */
|
|
header_buf[1] &= (~HTTPD_WS_MASK_BIT);
|
|
|
|
struct sock_db *sess = httpd_sess_get(hd, fd);
|
|
if (!sess) {
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
/* Send off header */
|
|
if (sess->send_fn(hd, fd, (const char *)header_buf, tx_len, 0) < 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to send WS header"));
|
|
return ESP_FAIL;
|
|
}
|
|
|
|
/* Send off payload */
|
|
if(frame->len > 0 && frame->payload != NULL) {
|
|
if (sess->send_fn(hd, fd, (const char *)frame->payload, frame->len, 0) < 0) {
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to send WS payload"));
|
|
return ESP_FAIL;
|
|
}
|
|
}
|
|
|
|
return ESP_OK;
|
|
}
|
|
|
|
esp_err_t httpd_ws_get_frame_type(httpd_req_t *req)
|
|
{
|
|
esp_err_t ret = httpd_ws_check_req(req);
|
|
if (ret != ESP_OK) {
|
|
return ret;
|
|
}
|
|
|
|
struct httpd_req_aux *aux = req->aux;
|
|
if (aux == NULL) {
|
|
ESP_LOGW(TAG, LOG_FMT("Invalid Aux pointer"));
|
|
return ESP_ERR_INVALID_ARG;
|
|
}
|
|
|
|
/* Read the first byte from the frame to get the FIN flag and Opcode */
|
|
/* Please refer to RFC6455 Section 5.2 for more details */
|
|
uint8_t first_byte = 0;
|
|
if (httpd_recv_with_opt(req, (char *)&first_byte, sizeof(first_byte), false) <= 0) {
|
|
/* If the recv() return code is <= 0, then this socket FD is invalid (i.e. a broken connection) */
|
|
/* Here we mark it as a Close message and close it later. */
|
|
ESP_LOGW(TAG, LOG_FMT("Failed to read header byte (socket FD invalid), closing socket now"));
|
|
aux->ws_final = true;
|
|
aux->ws_type = HTTPD_WS_TYPE_CLOSE;
|
|
return ESP_OK;
|
|
}
|
|
|
|
ESP_LOGD(TAG, LOG_FMT("First byte received: 0x%02X"), first_byte);
|
|
|
|
/* Decode the FIN flag and Opcode from the byte */
|
|
aux->ws_final = (first_byte & HTTPD_WS_FIN_BIT) != 0;
|
|
aux->ws_type = (first_byte & HTTPD_WS_OPCODE_BITS);
|
|
|
|
/* Reply to PING. For PONG and CLOSE, it will be handled elsewhere. */
|
|
if(aux->ws_type == HTTPD_WS_TYPE_PING) {
|
|
ESP_LOGD(TAG, LOG_FMT("Got a WS PING frame, Replying PONG..."));
|
|
|
|
/* Read the rest of the PING frame, for PONG to reply back. */
|
|
/* Please refer to RFC6455 Section 5.5.2 for more details */
|
|
httpd_ws_frame_t frame;
|
|
uint8_t frame_buf[128] = { 0 };
|
|
memset(&frame, 0, sizeof(httpd_ws_frame_t));
|
|
frame.payload = frame_buf;
|
|
|
|
if(httpd_ws_recv_frame(req, &frame, 126) != ESP_OK) {
|
|
ESP_LOGD(TAG, LOG_FMT("Cannot receive the full PING frame"));
|
|
return ESP_ERR_INVALID_STATE;
|
|
}
|
|
|
|
/* Now turn the frame to PONG */
|
|
frame.type = HTTPD_WS_TYPE_PONG;
|
|
return httpd_ws_send_frame(req, &frame);
|
|
} else if (aux->ws_type == HTTPD_WS_TYPE_CLOSE) {
|
|
ESP_LOGD(TAG, LOG_FMT("Got a WS CLOSE frame, Replying CLOSE..."));
|
|
|
|
/* Read the rest of the CLOSE frame and response */
|
|
/* Please refer to RFC6455 Section 5.5.1 for more details */
|
|
httpd_ws_frame_t frame;
|
|
uint8_t frame_buf[128] = { 0 };
|
|
memset(&frame, 0, sizeof(httpd_ws_frame_t));
|
|
frame.payload = frame_buf;
|
|
|
|
if (httpd_ws_recv_frame(req, &frame, 126) != ESP_OK) {
|
|
ESP_LOGD(TAG, LOG_FMT("Cannot receive the full CLOSE frame"));
|
|
return ESP_ERR_INVALID_STATE;
|
|
}
|
|
|
|
frame.len = 0;
|
|
frame.type = HTTPD_WS_TYPE_CLOSE;
|
|
frame.payload = NULL;
|
|
return httpd_ws_send_frame(req, &frame);
|
|
}
|
|
|
|
return ESP_OK;
|
|
}
|
|
|
|
httpd_ws_client_info_t httpd_ws_get_fd_info(httpd_handle_t hd, int fd)
|
|
{
|
|
struct sock_db *sess = httpd_sess_get(hd, fd);
|
|
|
|
if (sess == NULL) {
|
|
return HTTPD_WS_CLIENT_INVALID;
|
|
}
|
|
bool is_active_ws = sess->ws_handshake_done && (!sess->ws_close);
|
|
return is_active_ws ? HTTPD_WS_CLIENT_WEBSOCKET : HTTPD_WS_CLIENT_HTTP;
|
|
}
|
|
|
|
#endif /* CONFIG_HTTPD_WS_SUPPORT */
|