#if HAVE_CRT
#define _CRTDBG_MAP_ALLOC 
#include <stdlib.h> 
#include <crtdbg.h>
#endif //HAVE_CRT

/* #line 1 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
/*
* Copyright (C) 2020, University of the Basque Country (UPV/EHU)
* Contact for licensing options: <licensing-mcpttclient(at)mcopenplatform(dot)com>
*
* The original file was part of Open Source Doubango Framework
* Copyright (C) 2010-2011 Mamadou Diop.
* Copyright (C) 2012 Doubango Telecom <http://doubango.org>
*
* This file is part of Open Source Doubango Framework.
*
* DOUBANGO is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* DOUBANGO is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with DOUBANGO.
*
*/


/**@file thttp_header_Sec_WebSocket_Accept.c
 * @brief WebSocket "Sec-WebSocket-Accept" header.
 */
#include "tinyhttp/headers/thttp_header_Sec_WebSocket_Accept.h"

#include "tsk_debug.h"

#include <string.h>


/* #line 46 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */


thttp_header_Sec_WebSocket_Accept_t* thttp_header_Sec_WebSocket_Accept_create(const char* value)
{
	return tsk_object_new(THTTP_HEADER_SEC_WEBSOCKET_ACCEPT_VA_ARGS(value));
}

thttp_header_Sec_WebSocket_Accept_t* thttp_header_Sec_WebSocket_Accept_create_null()
{ 
	return thttp_header_Sec_WebSocket_Accept_create(tsk_null);
}


int thttp_header_Sec_WebSocket_Accept_tostring(const thttp_header_t* header, tsk_buffer_t* output)
{
	if(header){
		const thttp_header_Sec_WebSocket_Accept_t *Sec_WebSocket_Accept = (const thttp_header_Sec_WebSocket_Accept_t*)header;
		if(Sec_WebSocket_Accept->value){
			return tsk_buffer_append(output, Sec_WebSocket_Accept->value, tsk_strlen(Sec_WebSocket_Accept->value));
		}
		return 0;
	}

	return -1;
}

thttp_header_Sec_WebSocket_Accept_t *thttp_header_Sec_WebSocket_Accept_parse(const char *data, tsk_size_t size)
{
	int cs = 0;
	const char *p = data;
	const char *pe = p + size;
	const char *eof = pe;
	thttp_header_Sec_WebSocket_Accept_t *hdr_Sec_WebSocket_Accept = thttp_header_Sec_WebSocket_Accept_create_null();
	
	const char *tag_start = tsk_null;

	TSK_RAGEL_DISABLE_WARNINGS_BEGIN()
	
/* #line 73 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_actions[] = {
	0, 1, 0, 1, 1, 1, 2
};

static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_key_offsets[] = {
	0, 0, 2, 4, 6, 7, 9, 11, 
	13, 15, 17, 19, 21, 23, 25, 26, 
	28, 30, 32, 34, 36, 38, 41, 51, 
	52, 54, 63, 70, 78, 86, 94, 95, 
	96, 97
};

static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_keys[] = {
	83, 115, 69, 101, 67, 99, 45, 87, 
	119, 69, 101, 66, 98, 83, 115, 79, 
	111, 67, 99, 75, 107, 69, 101, 84, 
	116, 45, 65, 97, 67, 99, 67, 99, 
	69, 101, 80, 112, 84, 116, 9, 32, 
	58, 9, 13, 32, 43, 47, 57, 65, 
	90, 97, 122, 10, 9, 32, 9, 32, 
	43, 47, 57, 65, 90, 97, 122, 43, 
	47, 57, 65, 90, 97, 122, 43, 61, 
	47, 57, 65, 90, 97, 122, 43, 61, 
	47, 57, 65, 90, 97, 122, 13, 43, 
	47, 57, 65, 90, 97, 122, 10, 13, 
	61, 0
};

static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_single_lengths[] = {
	0, 2, 2, 2, 1, 2, 2, 2, 
	2, 2, 2, 2, 2, 2, 1, 2, 
	2, 2, 2, 2, 2, 3, 4, 1, 
	2, 3, 1, 2, 2, 2, 1, 1, 
	1, 0
};

static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_range_lengths[] = {
	0, 0, 0, 0, 0, 0, 0, 0, 
	0, 0, 0, 0, 0, 0, 0, 0, 
	0, 0, 0, 0, 0, 0, 3, 0, 
	0, 3, 3, 3, 3, 3, 0, 0, 
	0, 0
};

static const unsigned char _thttp_machine_parser_header_Sec_WebSocket_Accept_index_offsets[] = {
	0, 0, 3, 6, 9, 11, 14, 17, 
	20, 23, 26, 29, 32, 35, 38, 40, 
	43, 46, 49, 52, 55, 58, 62, 70, 
	72, 75, 82, 87, 93, 99, 105, 107, 
	109, 111
};

static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_indicies[] = {
	0, 0, 1, 2, 2, 1, 3, 3, 
	1, 4, 1, 5, 5, 1, 6, 6, 
	1, 7, 7, 1, 8, 8, 1, 9, 
	9, 1, 10, 10, 1, 11, 11, 1, 
	12, 12, 1, 13, 13, 1, 14, 1, 
	15, 15, 1, 16, 16, 1, 17, 17, 
	1, 18, 18, 1, 19, 19, 1, 20, 
	20, 1, 20, 20, 21, 1, 21, 22, 
	21, 23, 23, 23, 23, 1, 24, 1, 
	25, 25, 1, 25, 25, 23, 23, 23, 
	23, 1, 26, 26, 26, 26, 1, 27, 
	28, 27, 27, 27, 1, 29, 30, 29, 
	29, 29, 1, 31, 32, 32, 32, 32, 
	1, 33, 1, 31, 1, 30, 1, 1, 
	0
};

static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_targs[] = {
	2, 0, 3, 4, 5, 6, 7, 8, 
	9, 10, 11, 12, 13, 14, 15, 16, 
	17, 18, 19, 20, 21, 22, 23, 26, 
	24, 25, 27, 28, 32, 29, 31, 30, 
	26, 33
};

static const char _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_actions[] = {
	0, 0, 0, 0, 0, 0, 0, 0, 
	0, 0, 0, 0, 0, 0, 0, 0, 
	0, 0, 0, 0, 0, 0, 0, 1, 
	0, 0, 0, 0, 0, 0, 0, 5, 
	0, 3
};

static const int thttp_machine_parser_header_Sec_WebSocket_Accept_start = 1;
static const int thttp_machine_parser_header_Sec_WebSocket_Accept_first_final = 33;
static const int thttp_machine_parser_header_Sec_WebSocket_Accept_error = 0;

static const int thttp_machine_parser_header_Sec_WebSocket_Accept_en_main = 1;


/* #line 84 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
	(void)(eof);
	(void)(thttp_machine_parser_header_Sec_WebSocket_Accept_first_final);
	(void)(thttp_machine_parser_header_Sec_WebSocket_Accept_error);
	(void)(thttp_machine_parser_header_Sec_WebSocket_Accept_en_main);
	
/* #line 173 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
	{
	cs = thttp_machine_parser_header_Sec_WebSocket_Accept_start;
	}

/* #line 89 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
	
/* #line 180 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
	{
	int _klen;
	unsigned int _trans;
	const char *_acts;
	unsigned int _nacts;
	const char *_keys;

	if ( p == pe )
		goto _test_eof;
	if ( cs == 0 )
		goto _out;
_resume:
	_keys = _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_keys + _thttp_machine_parser_header_Sec_WebSocket_Accept_key_offsets[cs];
	_trans = _thttp_machine_parser_header_Sec_WebSocket_Accept_index_offsets[cs];

	_klen = _thttp_machine_parser_header_Sec_WebSocket_Accept_single_lengths[cs];
	if ( _klen > 0 ) {
		const char *_lower = _keys;
		const char *_mid;
		const char *_upper = _keys + _klen - 1;
		while (1) {
			if ( _upper < _lower )
				break;

			_mid = _lower + ((_upper-_lower) >> 1);
			if ( (*p) < *_mid )
				_upper = _mid - 1;
			else if ( (*p) > *_mid )
				_lower = _mid + 1;
			else {
				_trans += (_mid - _keys);
				goto _match;
			}
		}
		_keys += _klen;
		_trans += _klen;
	}

	_klen = _thttp_machine_parser_header_Sec_WebSocket_Accept_range_lengths[cs];
	if ( _klen > 0 ) {
		const char *_lower = _keys;
		const char *_mid;
		const char *_upper = _keys + (_klen<<1) - 2;
		while (1) {
			if ( _upper < _lower )
				break;

			_mid = _lower + (((_upper-_lower) >> 1) & ~1);
			if ( (*p) < _mid[0] )
				_upper = _mid - 2;
			else if ( (*p) > _mid[1] )
				_lower = _mid + 2;
			else {
				_trans += ((_mid - _keys)>>1);
				goto _match;
			}
		}
		_trans += _klen;
	}

_match:
	_trans = _thttp_machine_parser_header_Sec_WebSocket_Accept_indicies[_trans];
	cs = _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_targs[_trans];

	if ( _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_actions[_trans] == 0 )
		goto _again;

	_acts = _thttp_machine_parser_header_Sec_WebSocket_Accept_actions + _thttp_machine_parser_header_Sec_WebSocket_Accept_trans_actions[_trans];
	_nacts = (unsigned int) *_acts++;
	while ( _nacts-- > 0 )
	{
		switch ( *_acts++ )
		{
	case 0:
/* #line 37 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
	{ tag_start = p; }
	break;
	case 1:
/* #line 38 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
	{ }
	break;
	case 2:
/* #line 40 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
	{
		TSK_PARSER_SET_STRING(hdr_Sec_WebSocket_Accept->value);
	}
	break;
/* #line 268 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
		}
	}

_again:
	if ( cs == 0 )
		goto _out;
	if ( ++p != pe )
		goto _resume;
	_test_eof: {}
	_out: {}
	}

/* #line 90 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
	TSK_RAGEL_DISABLE_WARNINGS_END()
	
	if( cs < 
/* #line 285 "./src/headers/thttp_header_Sec_WebSocket_Accept.c" */
33
/* #line 92 "./ragel/thttp_parser_header_Sec_WebSocket_Accept.rl" */
 ){
		TSK_DEBUG_ERROR("Failed to parse Sec-WebSocket-Accept header.");
		TSK_OBJECT_SAFE_FREE(hdr_Sec_WebSocket_Accept);
	}
	
	return hdr_Sec_WebSocket_Accept;
}







//========================================================
//	Sec_WebSocket_Accept header object definition
//

static tsk_object_t* thttp_header_Sec_WebSocket_Accept_ctor(tsk_object_t *self, va_list * app)
{
	thttp_header_Sec_WebSocket_Accept_t *Sec_WebSocket_Accept = self;
	if(Sec_WebSocket_Accept){
		THTTP_HEADER(Sec_WebSocket_Accept)->type = thttp_htype_Sec_WebSocket_Accept;
		THTTP_HEADER(Sec_WebSocket_Accept)->tostring = thttp_header_Sec_WebSocket_Accept_tostring;

		Sec_WebSocket_Accept->value = tsk_strdup(va_arg(*app, const char*));
	}
	else{
		TSK_DEBUG_ERROR("Failed to create new Sec-WebSocket-Accept header.");
	}
	return self;
}

static tsk_object_t* thttp_header_Sec_WebSocket_Accept_dtor(tsk_object_t *self)
{
	thttp_header_Sec_WebSocket_Accept_t *Sec_WebSocket_Accept = self;
	if(Sec_WebSocket_Accept){
		TSK_FREE(Sec_WebSocket_Accept->value);
		TSK_OBJECT_SAFE_FREE(THTTP_HEADER_PARAMS(Sec_WebSocket_Accept));
	}
	else{
		TSK_DEBUG_ERROR("Null Sec_WebSocket_Accept header.");
	}

	return self;
}

static const tsk_object_def_t thttp_header_Sec_WebSocket_Accept_def_s = 
{
	sizeof(thttp_header_Sec_WebSocket_Accept_t),
	thttp_header_Sec_WebSocket_Accept_ctor,
	thttp_header_Sec_WebSocket_Accept_dtor,
	tsk_null
};
const tsk_object_def_t *thttp_header_Sec_WebSocket_Accept_def_t = &thttp_header_Sec_WebSocket_Accept_def_s;