2 * Copyright (C) 1996-2015 The Squid Software Foundation and contributors
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
9 /* DEBUG: section 68 HTTP Content-Range Header */
14 #include "HttpHdrContRange.h"
15 #include "HttpHeaderTools.h"
18 * Currently only byte ranges are supported
20 * Content-Range = "Content-Range" ":" content-range-spec
21 * content-range-spec = byte-content-range-spec
22 * byte-content-range-spec = bytes-unit SP
23 * ( byte-range-resp-spec | "*") "/"
24 * ( entity-length | "*" )
25 * byte-range-resp-spec = first-byte-pos "-" last-byte-pos
26 * entity-length = 1*DIGIT
30 #define range_spec_unknown (-1)
33 #define known_spec(s) ((s) != range_spec_unknown)
34 #define size_min(a,b) ((a) <= (b) ? (a) : (b))
35 #define size_diff(a,b) ((a) >= (b) ? ((a)-(b)) : 0)
39 /* parses range-resp-spec and inits spec, returns true on success */
41 httpHdrRangeRespSpecParseInit(HttpHdrRangeSpec
* spec
, const char *field
, int flen
)
45 spec
->offset
= spec
->length
= range_spec_unknown
;
54 /* check format, must be %d-%d */
55 if (!((p
= strchr(field
, '-')) && (p
- field
< flen
))) {
56 debugs(68, 2, "invalid (no '-') resp-range-spec near: '" << field
<< "'");
61 if (!httpHeaderParseOffset(field
, &spec
->offset
))
64 /* Additional check for BUG2155 - there MUST BE first-byte-pos and it MUST be positive*/
65 if (spec
->offset
< 0) {
66 debugs(68, 2, "invalid (no first-byte-pos or it is negative) resp-range-spec near: '" << field
<< "'");
72 /* do we have last-pos ? */
73 if (p
- field
>= flen
) {
74 debugs(68, 2, "invalid (no last-byte-pos) resp-range-spec near: '" << field
<< "'");
80 if (!httpHeaderParseOffset(p
, &last_pos
))
83 if (last_pos
< spec
->offset
) {
84 debugs(68, 2, "invalid (negative last-byte-pos) resp-range-spec near: '" << field
<< "'");
88 spec
->length
= size_diff(last_pos
+ 1, spec
->offset
);
90 /* we managed to parse, check if the result makes sence */
91 if (spec
->length
<= 0) {
92 debugs(68, 2, "invalid range (" << spec
->offset
<< " += " <<
93 (long int) spec
->length
<< ") in resp-range-spec near: '" << field
<< "'");
101 httpHdrRangeRespSpecPackInto(const HttpHdrRangeSpec
* spec
, Packable
* p
)
103 /* Ensure typecast is safe */
104 assert (spec
->length
>= 0);
106 if (!known_spec(spec
->offset
) || !known_spec(spec
->length
))
109 p
->appendf("bytes %" PRId64
"-%" PRId64
, spec
->offset
, spec
->offset
+ spec
->length
- 1);
117 httpHdrContRangeCreate(void)
119 HttpHdrContRange
*r
= (HttpHdrContRange
*)memAllocate(MEM_HTTP_HDR_CONTENT_RANGE
);
120 r
->spec
.offset
= r
->spec
.length
= range_spec_unknown
;
121 r
->elength
= range_spec_unknown
;
126 httpHdrContRangeParseCreate(const char *str
)
128 HttpHdrContRange
*r
= httpHdrContRangeCreate();
130 if (!httpHdrContRangeParseInit(r
, str
)) {
131 httpHdrContRangeDestroy(r
);
138 /* returns true if ranges are valid; inits HttpHdrContRange */
140 httpHdrContRangeParseInit(HttpHdrContRange
* range
, const char *str
)
143 assert(range
&& str
);
144 debugs(68, 8, "parsing content-range field: '" << str
<< "'");
145 /* check range type */
147 if (strncasecmp(str
, "bytes ", 6))
153 if (!(p
= strchr(str
, '/')))
157 range
->spec
.offset
= range
->spec
.length
= range_spec_unknown
;
158 else if (!httpHdrRangeRespSpecParseInit(&range
->spec
, str
, p
- str
))
164 range
->elength
= range_spec_unknown
;
165 else if (!httpHeaderParseOffset(p
, &range
->elength
))
167 else if (range
->elength
<= 0) {
168 /* Additional paranoidal check for BUG2155 - entity-length MUST be > 0 */
169 debugs(68, 2, "invalid (entity-length is negative) content-range-spec near: '" << str
<< "'");
171 } else if (known_spec(range
->spec
.length
) && range
->elength
< (range
->spec
.offset
+ range
->spec
.length
)) {
172 debugs(68, 2, "invalid (range is outside entity-length) content-range-spec near: '" << str
<< "'");
176 debugs(68, 8, "parsed content-range field: " <<
177 (long int) range
->spec
.offset
<< "-" <<
178 (long int) range
->spec
.offset
+ range
->spec
.length
- 1 << " / " <<
179 (long int) range
->elength
);
185 httpHdrContRangeDestroy(HttpHdrContRange
* range
)
188 memFree(range
, MEM_HTTP_HDR_CONTENT_RANGE
);
192 httpHdrContRangeDup(const HttpHdrContRange
* range
)
194 HttpHdrContRange
*dup
;
196 dup
= httpHdrContRangeCreate();
202 httpHdrContRangePackInto(const HttpHdrContRange
* range
, Packable
* p
)
205 httpHdrRangeRespSpecPackInto(&range
->spec
, p
);
206 /* Ensure typecast is safe */
207 assert (range
->elength
>= 0);
209 if (!known_spec(range
->elength
))
212 p
->appendf("/%" PRId64
, range
->elength
);
216 httpHdrContRangeSet(HttpHdrContRange
* cr
, HttpHdrRangeSpec spec
, int64_t ent_len
)
218 assert(cr
&& ent_len
>= 0);
220 cr
->elength
= ent_len
;