/* * Copyright (C) 2010-2015 Mamadou Diop. * * This file is part of Open Source Doubango Framework. * * DOUBANGO is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * DOUBANGO is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with DOUBANGO. * */ /**@file thttp_header_Sec_WebSocket_Key.c * @brief WebSocket "Sec-WebSocket-Key" header. */ #include "tinyhttp/headers/thttp_header_Sec_WebSocket_Key.h" #include "tsk_debug.h" #include %%{ machine thttp_machine_parser_header_Sec_WebSocket_Key; # Includes include thttp_machine_utils "./ragel/thttp_machine_utils.rl"; include thttp_machine_ws "./ragel/thttp_machine_ws.rl"; action tag { tag_start = p; } action eob { } action parse_key{ TSK_PARSER_SET_STRING(hdr_Sec_WebSocket_Key->value); } # Entry point main := "Sec-WebSocket-Key"i SP* HCOLON SP*<: Sec_WebSocket_Key>tag %parse_key :>CRLF @eob; }%% thttp_header_Sec_WebSocket_Key_t* thttp_header_Sec_WebSocket_Key_create(const char* value) { return tsk_object_new(THTTP_HEADER_SEC_WEBSOCKET_KEY_VA_ARGS(value)); } thttp_header_Sec_WebSocket_Key_t* thttp_header_Sec_WebSocket_Key_create_null() { return thttp_header_Sec_WebSocket_Key_create(tsk_null); } int thttp_header_Sec_WebSocket_Key_tostring(const thttp_header_t* header, tsk_buffer_t* output) { if(header){ const thttp_header_Sec_WebSocket_Key_t *Sec_WebSocket_Key = (const thttp_header_Sec_WebSocket_Key_t*)header; if(Sec_WebSocket_Key->value){ return tsk_buffer_append(output, Sec_WebSocket_Key->value, tsk_strlen(Sec_WebSocket_Key->value)); } return 0; } return -1; } thttp_header_Sec_WebSocket_Key_t *thttp_header_Sec_WebSocket_Key_parse(const char *data, tsk_size_t size) { int cs = 0; const char *p = data; const char *pe = p + size; const char *eof = pe; thttp_header_Sec_WebSocket_Key_t *hdr_Sec_WebSocket_Key = thttp_header_Sec_WebSocket_Key_create_null(); const char *tag_start = tsk_null; TSK_RAGEL_DISABLE_WARNINGS_BEGIN() %%write data; (void)(eof); (void)(thttp_machine_parser_header_Sec_WebSocket_Key_first_final); (void)(thttp_machine_parser_header_Sec_WebSocket_Key_error); (void)(thttp_machine_parser_header_Sec_WebSocket_Key_en_main); %%write init; %%write exec; TSK_RAGEL_DISABLE_WARNINGS_END() if( cs < %%{ write first_final; }%% ){ TSK_DEBUG_ERROR("Failed to parse Sec-WebSocket-Key header."); TSK_OBJECT_SAFE_FREE(hdr_Sec_WebSocket_Key); } return hdr_Sec_WebSocket_Key; } //======================================================== // Sec_WebSocket_Key header object definition // static tsk_object_t* thttp_header_Sec_WebSocket_Key_ctor(tsk_object_t *self, va_list * app) { thttp_header_Sec_WebSocket_Key_t *Sec_WebSocket_Key = self; if(Sec_WebSocket_Key){ THTTP_HEADER(Sec_WebSocket_Key)->type = thttp_htype_Sec_WebSocket_Key; THTTP_HEADER(Sec_WebSocket_Key)->tostring = thttp_header_Sec_WebSocket_Key_tostring; Sec_WebSocket_Key->value = tsk_strdup(va_arg(*app, const char*)); } else{ TSK_DEBUG_ERROR("Failed to create new Sec-WebSocket-Key header."); } return self; } static tsk_object_t* thttp_header_Sec_WebSocket_Key_dtor(tsk_object_t *self) { thttp_header_Sec_WebSocket_Key_t *Sec_WebSocket_Key = self; if(Sec_WebSocket_Key){ TSK_FREE(Sec_WebSocket_Key->value); TSK_OBJECT_SAFE_FREE(THTTP_HEADER_PARAMS(Sec_WebSocket_Key)); } else{ TSK_DEBUG_ERROR("Null Sec_WebSocket_Key header."); } return self; } static const tsk_object_def_t thttp_header_Sec_WebSocket_Key_def_s = { sizeof(thttp_header_Sec_WebSocket_Key_t), thttp_header_Sec_WebSocket_Key_ctor, thttp_header_Sec_WebSocket_Key_dtor, tsk_null }; const tsk_object_def_t *thttp_header_Sec_WebSocket_Key_def_t = &thttp_header_Sec_WebSocket_Key_def_s;