]> git.ipfire.org Git - thirdparty/squid.git/blob - src/HttpHdrContRange.cc
Author: Francesco Chemolli <kinkie@squid-cache.org>
[thirdparty/squid.git] / src / HttpHdrContRange.cc
1
2 /*
3 * $Id: HttpHdrContRange.cc,v 1.22 2007/08/13 18:25:14 hno Exp $
4 *
5 * DEBUG: section 68 HTTP Content-Range Header
6 * AUTHOR: Alex Rousskov
7 *
8 * SQUID Web Proxy Cache http://www.squid-cache.org/
9 * ----------------------------------------------------------
10 *
11 * Squid is the result of efforts by numerous individuals from
12 * the Internet community; see the CONTRIBUTORS file for full
13 * details. Many organizations have provided support for Squid's
14 * development; see the SPONSORS file for full details. Squid is
15 * Copyrighted (C) 2001 by the Regents of the University of
16 * California; see the COPYRIGHT file for full details. Squid
17 * incorporates software developed and/or copyrighted by other
18 * sources; see the CREDITS file for full details.
19 *
20 * This program is free software; you can redistribute it and/or modify
21 * it under the terms of the GNU General Public License as published by
22 * the Free Software Foundation; either version 2 of the License, or
23 * (at your option) any later version.
24 *
25 * This program is distributed in the hope that it will be useful,
26 * but WITHOUT ANY WARRANTY; without even the implied warranty of
27 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
28 * GNU General Public License for more details.
29 *
30 * You should have received a copy of the GNU General Public License
31 * along with this program; if not, write to the Free Software
32 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA.
33 *
34 */
35
36 #include "squid.h"
37 #include "HttpHdrContRange.h"
38
39 /*
40 * Currently only byte ranges are supported
41 *
42 * Content-Range = "Content-Range" ":" content-range-spec
43 * content-range-spec = byte-content-range-spec
44 * byte-content-range-spec = bytes-unit SP
45 * ( byte-range-resp-spec | "*") "/"
46 * ( entity-length | "*" )
47 * byte-range-resp-spec = first-byte-pos "-" last-byte-pos
48 * entity-length = 1*DIGIT
49 */
50
51
52 /* local constants */
53 #define range_spec_unknown (-1)
54
55 /* local routines */
56 #define known_spec(s) ((s) != range_spec_unknown)
57 #define size_min(a,b) ((a) <= (b) ? (a) : (b))
58 #define size_diff(a,b) ((a) >= (b) ? ((a)-(b)) : 0)
59
60 /* globals */
61
62 /* parses range-resp-spec and inits spec, returns true on success */
63 static int
64 httpHdrRangeRespSpecParseInit(HttpHdrRangeSpec * spec, const char *field, int flen)
65 {
66 const char *p;
67 assert(spec);
68 spec->offset = spec->length = range_spec_unknown;
69
70 if (flen < 2)
71 return 0;
72
73 /* is spec given ? */
74 if (*field == '*')
75 return 1;
76
77 /* check format, must be %d-%d */
78 if (!((p = strchr(field, '-')) && (p - field < flen))) {
79 debugs(68, 2, "invalid (no '-') resp-range-spec near: '" << field << "'");
80 return 0;
81 }
82
83 /* parse offset */
84 if (!httpHeaderParseOffset(field, &spec->offset))
85 return 0;
86
87 p++;
88
89 /* do we have last-pos ? */
90 if (p - field < flen) {
91 int64_t last_pos;
92
93 if (!httpHeaderParseOffset(p, &last_pos))
94 return 0;
95
96 spec->length = size_diff(last_pos + 1, spec->offset);
97 /* Ensure typecast is safe */
98 assert (spec->length >= 0);
99 }
100
101 /* we managed to parse, check if the result makes sence */
102 if (known_spec(spec->length) && spec->length == 0) {
103 debugs(68, 2, "invalid range (" << spec->offset << " += " <<
104 (long int) spec->length << ") in resp-range-spec near: '" << field << "'");
105 return 0;
106 }
107
108 return 1;
109 }
110
111 static void
112 httpHdrRangeRespSpecPackInto(const HttpHdrRangeSpec * spec, Packer * p)
113 {
114 /* Ensure typecast is safe */
115 assert (spec->length >= 0);
116
117 if (!known_spec(spec->offset) || !known_spec(spec->length))
118 packerPrintf(p, "*");
119 else
120 packerPrintf(p, "bytes %"PRId64"-%"PRId64,
121 spec->offset, spec->offset + spec->length - 1);
122 }
123
124 /*
125 * Content Range
126 */
127
128 HttpHdrContRange *
129 httpHdrContRangeCreate(void)
130 {
131 HttpHdrContRange *r = (HttpHdrContRange *)memAllocate(MEM_HTTP_HDR_CONTENT_RANGE);
132 r->spec.offset = r->spec.length = range_spec_unknown;
133 r->elength = range_spec_unknown;
134 return r;
135 }
136
137 HttpHdrContRange *
138 httpHdrContRangeParseCreate(const char *str)
139 {
140 HttpHdrContRange *r = httpHdrContRangeCreate();
141
142 if (!httpHdrContRangeParseInit(r, str)) {
143 httpHdrContRangeDestroy(r);
144 r = NULL;
145 }
146
147 return r;
148 }
149
150 /* returns true if ranges are valid; inits HttpHdrContRange */
151 int
152 httpHdrContRangeParseInit(HttpHdrContRange * range, const char *str)
153 {
154 const char *p;
155 assert(range && str);
156 debugs(68, 8, "parsing content-range field: '" << str << "'");
157 /* check range type */
158
159 if (strncasecmp(str, "bytes ", 6))
160 return 0;
161
162 str += 6;
163
164 /* split */
165 if (!(p = strchr(str, '/')))
166 return 0;
167
168 if (*str == '*')
169 range->spec.offset = range->spec.length = range_spec_unknown;
170 else if (!httpHdrRangeRespSpecParseInit(&range->spec, str, p - str))
171 return 0;
172
173 p++;
174
175 if (*p == '*')
176 range->elength = range_spec_unknown;
177 else if (!httpHeaderParseOffset(p, &range->elength))
178 return 0;
179
180 debugs(68, 8, "parsed content-range field: " <<
181 (long int) range->spec.offset << "-" <<
182 (long int) range->spec.offset + range->spec.length - 1 << " / " <<
183 (long int) range->elength);
184
185 return 1;
186 }
187
188 void
189 httpHdrContRangeDestroy(HttpHdrContRange * range)
190 {
191 assert(range);
192 memFree(range, MEM_HTTP_HDR_CONTENT_RANGE);
193 }
194
195 HttpHdrContRange *
196 httpHdrContRangeDup(const HttpHdrContRange * range)
197 {
198 HttpHdrContRange *dup;
199 assert(range);
200 dup = httpHdrContRangeCreate();
201 *dup = *range;
202 return dup;
203 }
204
205 void
206 httpHdrContRangePackInto(const HttpHdrContRange * range, Packer * p)
207 {
208 assert(range && p);
209 httpHdrRangeRespSpecPackInto(&range->spec, p);
210 /* Ensure typecast is safe */
211 assert (range->elength >= 0);
212
213 if (!known_spec(range->elength))
214 packerPrintf(p, "/*");
215 else
216 packerPrintf(p, "/%"PRId64, range->elength);
217 }
218
219 void
220 httpHdrContRangeSet(HttpHdrContRange * cr, HttpHdrRangeSpec spec, int64_t ent_len)
221 {
222 assert(cr && ent_len >= 0);
223 cr->spec = spec;
224 cr->elength = ent_len;
225 }