public class WebSocket08FrameDecoder extends io.netty.handler.codec.ReplayingDecoder<WebSocketFrame,WebSocket08FrameDecoder.State>
| Modifier and Type | Class and Description |
|---|---|
static class |
WebSocket08FrameDecoder.State |
| Constructor and Description |
|---|
WebSocket08FrameDecoder(boolean maskedPayload,
boolean allowExtensions,
int maxFramePayloadLength)
Constructor
|
| Modifier and Type | Method and Description |
|---|---|
protected void |
checkCloseFrameBody(io.netty.channel.ChannelHandlerContext ctx,
io.netty.buffer.ByteBuf buffer) |
WebSocketFrame |
decode(io.netty.channel.ChannelHandlerContext ctx,
io.netty.buffer.ByteBuf in) |
actualReadableBytes, callDecode, channelInactive, checkpoint, checkpoint, internalBuffer, newInboundBuffer, state, statebeforeAdd, decodeLast, inboundBufferUpdated, replaceafterAdd, afterRemove, beforeRemove, channelActive, channelRegistered, channelUnregistered, exceptionCaught, userEventTriggeredclone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, waitpublic WebSocket08FrameDecoder(boolean maskedPayload,
boolean allowExtensions,
int maxFramePayloadLength)
maskedPayload - Web socket servers must set this to true processed incoming masked payload. Client implementations
must set this to false.allowExtensions - Flag to allow reserved extension bits to be used or notmaxFramePayloadLength - Maximum length of a frame's payload. Setting this to an appropriate value for you application
helps check for denial of services attacks.public WebSocketFrame decode(io.netty.channel.ChannelHandlerContext ctx, io.netty.buffer.ByteBuf in) throws Exception
decode in class io.netty.handler.codec.ByteToMessageDecoder<WebSocketFrame>Exceptionprotected void checkCloseFrameBody(io.netty.channel.ChannelHandlerContext ctx,
io.netty.buffer.ByteBuf buffer)
throws io.netty.handler.codec.CorruptedFrameException
io.netty.handler.codec.CorruptedFrameExceptionCopyright © 2008-2012 The Netty Project. All Rights Reserved.