c732d49e |
* Contact for licensing options: <licensing-mcpttclient(at)mcopenplatform(dot)com>
*
* The original file was part of Open Source Doubango Framework
* Copyright (C) 2010-2011 Mamadou Diop.
* Copyright (C) 2012 Doubango Telecom <http://doubango.org>
*
* This file is part of Open Source Doubango Framework.
*
* DOUBANGO is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* DOUBANGO is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with DOUBANGO.
*
*/
/**@file thttp_header_Sec_WebSocket_Accept.c
* @brief WebSocket "Sec-WebSocket-Accept" header.
*/
#include "tinyhttp/headers/thttp_header_Sec_WebSocket_Accept.h"
#include "tsk_debug.h"
#include <string.h>
/* #line 46 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
thttp_header_Sec_WebSocket_Accept_t* thttp_header_Sec_WebSocket_Accept_create(const char* value)
{
return tsk_object_new(THTTP_HEADER_SEC_WEBSOCKET_ACCEPT_VA_ARGS(value));
}
thttp_header_Sec_WebSocket_Accept_t* thttp_header_Sec_WebSocket_Accept_create_null()
{
return thttp_header_Sec_WebSocket_Accept_create(tsk_null);
}
int thttp_header_Sec_WebSocket_Accept_tostring(const thttp_header_t* header, tsk_buffer_t* output)
{
if(header){
const thttp_header_Sec_WebSocket_Accept_t *Sec_WebSocket_Accept = (const thttp_header_Sec_WebSocket_Accept_t*)header;
if(Sec_WebSocket_Accept->value){
return tsk_buffer_append(output, Sec_WebSocket_Accept->value, tsk_strlen(Sec_WebSocket_Accept->value));
}
return 0;
}
return -1;
}
thttp_header_Sec_WebSocket_Accept_t *thttp_header_Sec_WebSocket_Accept_parse(const char *data, tsk_size_t size)
{
int cs = 0;
const char *p = data;
const char *pe = p + size;
const char *eof = pe;
thttp_header_Sec_WebSocket_Accept_t *hdr_Sec_WebSocket_Accept = thttp_header_Sec_WebSocket_Accept_create_null();
const char *tag_start = tsk_null;
TSK_RAGEL_DISABLE_WARNINGS_BEGIN()
/* #line 73 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_actions[] = {
0, 1, 0, 1, 1, 1, 2
};
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_key_offsets[] = {
0, 0, 2, 4, 6, 7, 9, 11,
13, 15, 17, 19, 21, 23, 25, 26,
28, 30, 32, 34, 36, 38, 41, 51,
52, 54, 63, 70, 78, 86, 94, 95,
96, 97
};
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_keys[] = {
83, 115, 69, 101, 67, 99, 45, 87,
119, 69, 101, 66, 98, 83, 115, 79,
111, 67, 99, 75, 107, 69, 101, 84,
116, 45, 65, 97, 67, 99, 67, 99,
69, 101, 80, 112, 84, 116, 9, 32,
58, 9, 13, 32, 43, 47, 57, 65,
90, 97, 122, 10, 9, 32, 9, 32,
43, 47, 57, 65, 90, 97, 122, 43,
47, 57, 65, 90, 97, 122, 43, 61,
47, 57, 65, 90, 97, 122, 43, 61,
47, 57, 65, 90, 97, 122, 13, 43,
47, 57, 65, 90, 97, 122, 10, 13,
61, 0
};
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_single_lengths[] = {
0, 2, 2, 2, 1, 2, 2, 2,
2, 2, 2, 2, 2, 2, 1, 2,
2, 2, 2, 2, 2, 3, 4, 1,
2, 3, 1, 2, 2, 2, 1, 1,
1, 0
};
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_range_lengths[] = {
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 3, 0,
0, 3, 3, 3, 3, 3, 0, 0,
0, 0
};
static const unsigned char _thttp_machine_parser_header_Sec_WebSocket_Accept_index_offsets[] = {
0, 0, 3, 6, 9, 11, 14, 17,
20, 23, 26, 29, 32, 35, 38, 40,
43, 46, 49, 52, 55, 58, 62, 70,
72, 75, 82, 87, 93, 99, 105, 107,
109, 111
};
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_indicies[] = {
0, 0, 1, 2, 2, 1, 3, 3,
1, 4, 1, 5, 5, 1, 6, 6,
1, 7, 7, 1, 8, 8, 1, 9,
9, 1, 10, 10, 1, 11, 11, 1,
12, 12, 1, 13, 13, 1, 14, 1,
15, 15, 1, 16, 16, 1, 17, 17,
1, 18, 18, 1, 19, 19, 1, 20,
20, 1, 20, 20, 21, 1, 21, 22,
21, 23, 23, 23, 23, 1, 24, 1,
25, 25, 1, 25, 25, 23, 23, 23,
23, 1, 26, 26, 26, 26, 1, 27,
28, 27, 27, 27, 1, 29, 30, 29,
29, 29, 1, 31, 32, 32, 32, 32,
1, 33, 1, 31, 1, 30, 1, 1,
0
};
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_targs[] = {
2, 0, 3, 4, 5, 6, 7, 8,
9, 10, 11, 12, 13, 14, 15, 16,
17, 18, 19, 20, 21, 22, 23, 26,
24, 25, 27, 28, 32, 29, 31, 30,
26, 33
};
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_actions[] = {
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 1,
0, 0, 0, 0, 0, 0, 0, 5,
0, 3
};
static const int thttp_machine_parser_header_Sec_WebSocket_Accept_start = 1;
static const int thttp_machine_parser_header_Sec_WebSocket_Accept_first_final = 33;
static const int thttp_machine_parser_header_Sec_WebSocket_Accept_error = 0;
static const int thttp_machine_parser_header_Sec_WebSocket_Accept_en_main = 1;
/* #line 84 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
(void)(eof);
(void)(thttp_machine_parser_header_Sec_WebSocket_Accept_first_final);
(void)(thttp_machine_parser_header_Sec_WebSocket_Accept_error);
(void)(thttp_machine_parser_header_Sec_WebSocket_Accept_en_main);
/* #line 173 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
{
cs = thttp_machine_parser_header_Sec_WebSocket_Accept_start;
}
/* #line 89 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
/* #line 180 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
{
int _klen;
unsigned int _trans;
const char *_acts;
unsigned int _nacts;
const char *_keys;
if ( p == pe )
goto _test_eof;
if ( cs == 0 )
goto _out;
_resume:
_keys = _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_keys + _thttp_machine_parser_header_Sec_WebSocket_Accept_key_offsets[cs];
_trans = _thttp_machine_parser_header_Sec_WebSocket_Accept_index_offsets[cs];
_klen = _thttp_machine_parser_header_Sec_WebSocket_Accept_single_lengths[cs];
if ( _klen > 0 ) {
const char *_lower = _keys;
const char *_mid;
const char *_upper = _keys + _klen - 1;
while (1) {
if ( _upper < _lower )
break;
_mid = _lower + ((_upper-_lower) >> 1);
if ( (*p) < *_mid )
_upper = _mid - 1;
else if ( (*p) > *_mid )
_lower = _mid + 1;
else {
_trans += (_mid - _keys);
goto _match;
}
}
_keys += _klen;
_trans += _klen;
}
_klen = _thttp_machine_parser_header_Sec_WebSocket_Accept_range_lengths[cs];
if ( _klen > 0 ) {
const char *_lower = _keys;
const char *_mid;
const char *_upper = _keys + (_klen<<1) - 2;
while (1) {
if ( _upper < _lower )
break;
_mid = _lower + (((_upper-_lower) >> 1) & ~1);
if ( (*p) < _mid[0] )
_upper = _mid - 2;
else if ( (*p) > _mid[1] )
_lower = _mid + 2;
else {
_trans += ((_mid - _keys)>>1);
goto _match;
}
}
_trans += _klen;
}
_match:
_trans = _thttp_machine_parser_header_Sec_WebSocket_Accept_indicies[_trans];
cs = _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_targs[_trans];
if ( _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_actions[_trans] == 0 )
goto _again;
_acts = _thttp_machine_parser_header_Sec_WebSocket_Accept_actions + _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_actions[_trans];
_nacts = (unsigned int) *_acts++;
while ( _nacts-- > 0 )
{
switch ( *_acts++ )
{
case 0:
/* #line 37 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
{ tag_start = p; }
break;
case 1:
/* #line 38 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
{ }
break;
case 2:
/* #line 40 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
{
TSK_PARSER_SET_STRING(hdr_Sec_WebSocket_Accept->value);
}
break;
/* #line 268 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
}
}
_again:
if ( cs == 0 )
goto _out;
if ( ++p != pe )
goto _resume;
_test_eof: {}
_out: {}
}
/* #line 90 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
TSK_RAGEL_DISABLE_WARNINGS_END()
if( cs <
/* #line 285 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
33
/* #line 92 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
){
TSK_DEBUG_ERROR("Failed to parse Sec-WebSocket-Accept header.");
TSK_OBJECT_SAFE_FREE(hdr_Sec_WebSocket_Accept);
}
return hdr_Sec_WebSocket_Accept;
}
//========================================================
// Sec_WebSocket_Accept header object definition
//
static tsk_object_t* thttp_header_Sec_WebSocket_Accept_ctor(tsk_object_t *self, va_list * app)
{
thttp_header_Sec_WebSocket_Accept_t *Sec_WebSocket_Accept = self;
if(Sec_WebSocket_Accept){
THTTP_HEADER(Sec_WebSocket_Accept)->type = thttp_htype_Sec_WebSocket_Accept;
THTTP_HEADER(Sec_WebSocket_Accept)->tostring = thttp_header_Sec_WebSocket_Accept_tostring;
Sec_WebSocket_Accept->value = tsk_strdup(va_arg(*app, const char*));
}
else{
TSK_DEBUG_ERROR("Failed to create new Sec-WebSocket-Accept header.");
}
return self;
}
static tsk_object_t* thttp_header_Sec_WebSocket_Accept_dtor(tsk_object_t *self)
{
thttp_header_Sec_WebSocket_Accept_t *Sec_WebSocket_Accept = self;
if(Sec_WebSocket_Accept){
TSK_FREE(Sec_WebSocket_Accept->value);
TSK_OBJECT_SAFE_FREE(THTTP_HEADER_PARAMS(Sec_WebSocket_Accept));
}
else{
TSK_DEBUG_ERROR("Null Sec_WebSocket_Accept header.");
}
return self;
}
static const tsk_object_def_t thttp_header_Sec_WebSocket_Accept_def_s =
{
sizeof(thttp_header_Sec_WebSocket_Accept_t),
thttp_header_Sec_WebSocket_Accept_ctor,
thttp_header_Sec_WebSocket_Accept_dtor,
tsk_null
};
const tsk_object_def_t *thttp_header_Sec_WebSocket_Accept_def_t = &thttp_header_Sec_WebSocket_Accept_def_s; |