2 * Copyright (C) 1996-2014 The Squid Software Foundation and contributors
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
9 /* DEBUG: section 68 HTTP Content-Range Header */
14 #include "HttpHdrContRange.h"
15 #include "HttpHeaderTools.h"
19 * Currently only byte ranges are supported
21 * Content-Range = "Content-Range" ":" content-range-spec
22 * content-range-spec = byte-content-range-spec
23 * byte-content-range-spec = bytes-unit SP
24 * ( byte-range-resp-spec | "*") "/"
25 * ( entity-length | "*" )
26 * byte-range-resp-spec = first-byte-pos "-" last-byte-pos
27 * entity-length = 1*DIGIT
31 #define range_spec_unknown (-1)
34 #define known_spec(s) ((s) != range_spec_unknown)
35 #define size_min(a,b) ((a) <= (b) ? (a) : (b))
36 #define size_diff(a,b) ((a) >= (b) ? ((a)-(b)) : 0)
40 /* parses range-resp-spec and inits spec, returns true on success */
42 httpHdrRangeRespSpecParseInit(HttpHdrRangeSpec
* spec
, const char *field
, int flen
)
46 spec
->offset
= spec
->length
= range_spec_unknown
;
55 /* check format, must be %d-%d */
56 if (!((p
= strchr(field
, '-')) && (p
- field
< flen
))) {
57 debugs(68, 2, "invalid (no '-') resp-range-spec near: '" << field
<< "'");
62 if (!httpHeaderParseOffset(field
, &spec
->offset
))
65 /* Additional check for BUG2155 - there MUST BE first-byte-pos and it MUST be positive*/
66 if (spec
->offset
< 0) {
67 debugs(68, 2, "invalid (no first-byte-pos or it is negative) resp-range-spec near: '" << field
<< "'");
73 /* do we have last-pos ? */
74 if (p
- field
>= flen
) {
75 debugs(68, 2, "invalid (no last-byte-pos) resp-range-spec near: '" << field
<< "'");
81 if (!httpHeaderParseOffset(p
, &last_pos
))
84 if (last_pos
< spec
->offset
) {
85 debugs(68, 2, "invalid (negative last-byte-pos) resp-range-spec near: '" << field
<< "'");
89 spec
->length
= size_diff(last_pos
+ 1, spec
->offset
);
91 /* we managed to parse, check if the result makes sence */
92 if (spec
->length
<= 0) {
93 debugs(68, 2, "invalid range (" << spec
->offset
<< " += " <<
94 (long int) spec
->length
<< ") in resp-range-spec near: '" << field
<< "'");
102 httpHdrRangeRespSpecPackInto(const HttpHdrRangeSpec
* spec
, Packer
* p
)
104 /* Ensure typecast is safe */
105 assert (spec
->length
>= 0);
107 if (!known_spec(spec
->offset
) || !known_spec(spec
->length
))
108 packerPrintf(p
, "*");
110 packerPrintf(p
, "bytes %" PRId64
"-%" PRId64
,
111 spec
->offset
, spec
->offset
+ spec
->length
- 1);
119 httpHdrContRangeCreate(void)
121 HttpHdrContRange
*r
= (HttpHdrContRange
*)memAllocate(MEM_HTTP_HDR_CONTENT_RANGE
);
122 r
->spec
.offset
= r
->spec
.length
= range_spec_unknown
;
123 r
->elength
= range_spec_unknown
;
128 httpHdrContRangeParseCreate(const char *str
)
130 HttpHdrContRange
*r
= httpHdrContRangeCreate();
132 if (!httpHdrContRangeParseInit(r
, str
)) {
133 httpHdrContRangeDestroy(r
);
140 /* returns true if ranges are valid; inits HttpHdrContRange */
142 httpHdrContRangeParseInit(HttpHdrContRange
* range
, const char *str
)
145 assert(range
&& str
);
146 debugs(68, 8, "parsing content-range field: '" << str
<< "'");
147 /* check range type */
149 if (strncasecmp(str
, "bytes ", 6))
155 if (!(p
= strchr(str
, '/')))
159 range
->spec
.offset
= range
->spec
.length
= range_spec_unknown
;
160 else if (!httpHdrRangeRespSpecParseInit(&range
->spec
, str
, p
- str
))
166 range
->elength
= range_spec_unknown
;
167 else if (!httpHeaderParseOffset(p
, &range
->elength
))
169 else if (range
->elength
<= 0) {
170 /* Additional paranoidal check for BUG2155 - entity-length MUST be > 0 */
171 debugs(68, 2, "invalid (entity-length is negative) content-range-spec near: '" << str
<< "'");
173 } else if (known_spec(range
->spec
.length
) && range
->elength
< (range
->spec
.offset
+ range
->spec
.length
)) {
174 debugs(68, 2, "invalid (range is outside entity-length) content-range-spec near: '" << str
<< "'");
178 debugs(68, 8, "parsed content-range field: " <<
179 (long int) range
->spec
.offset
<< "-" <<
180 (long int) range
->spec
.offset
+ range
->spec
.length
- 1 << " / " <<
181 (long int) range
->elength
);
187 httpHdrContRangeDestroy(HttpHdrContRange
* range
)
190 memFree(range
, MEM_HTTP_HDR_CONTENT_RANGE
);
194 httpHdrContRangeDup(const HttpHdrContRange
* range
)
196 HttpHdrContRange
*dup
;
198 dup
= httpHdrContRangeCreate();
204 httpHdrContRangePackInto(const HttpHdrContRange
* range
, Packer
* p
)
207 httpHdrRangeRespSpecPackInto(&range
->spec
, p
);
208 /* Ensure typecast is safe */
209 assert (range
->elength
>= 0);
211 if (!known_spec(range
->elength
))
212 packerPrintf(p
, "/*");
214 packerPrintf(p
, "/%" PRId64
, range
->elength
);
218 httpHdrContRangeSet(HttpHdrContRange
* cr
, HttpHdrRangeSpec spec
, int64_t ent_len
)
220 assert(cr
&& ent_len
>= 0);
222 cr
->elength
= ent_len
;