147 lines
4.1 KiB
Ragel
Executable File
147 lines
4.1 KiB
Ragel
Executable File
/*
|
|
* Copyright (C) 2010-2015 Mamadou Diop.
|
|
*
|
|
* This file is part of Open Source Doubango Framework.
|
|
*
|
|
* DOUBANGO is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* DOUBANGO is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with DOUBANGO.
|
|
*
|
|
*/
|
|
|
|
/**@file thttp_header_Sec_WebSocket_Key.c
|
|
* @brief WebSocket "Sec-WebSocket-Key" header.
|
|
*/
|
|
#include "tinyhttp/headers/thttp_header_Sec_WebSocket_Key.h"
|
|
|
|
#include "tsk_debug.h"
|
|
|
|
#include <string.h>
|
|
|
|
%%{
|
|
machine thttp_machine_parser_header_Sec_WebSocket_Key;
|
|
|
|
# Includes
|
|
include thttp_machine_utils "./ragel/thttp_machine_utils.rl";
|
|
include thttp_machine_ws "./ragel/thttp_machine_ws.rl";
|
|
|
|
action tag { tag_start = p; }
|
|
action eob { }
|
|
|
|
action parse_key{
|
|
TSK_PARSER_SET_STRING(hdr_Sec_WebSocket_Key->value);
|
|
}
|
|
|
|
# Entry point
|
|
main := "Sec-WebSocket-Key"i SP* HCOLON SP*<: Sec_WebSocket_Key>tag %parse_key :>CRLF @eob;
|
|
}%%
|
|
|
|
thttp_header_Sec_WebSocket_Key_t* thttp_header_Sec_WebSocket_Key_create(const char* value)
|
|
{
|
|
return tsk_object_new(THTTP_HEADER_SEC_WEBSOCKET_KEY_VA_ARGS(value));
|
|
}
|
|
|
|
thttp_header_Sec_WebSocket_Key_t* thttp_header_Sec_WebSocket_Key_create_null()
|
|
{
|
|
return thttp_header_Sec_WebSocket_Key_create(tsk_null);
|
|
}
|
|
|
|
|
|
int thttp_header_Sec_WebSocket_Key_tostring(const thttp_header_t* header, tsk_buffer_t* output)
|
|
{
|
|
if(header){
|
|
const thttp_header_Sec_WebSocket_Key_t *Sec_WebSocket_Key = (const thttp_header_Sec_WebSocket_Key_t*)header;
|
|
if(Sec_WebSocket_Key->value){
|
|
return tsk_buffer_append(output, Sec_WebSocket_Key->value, tsk_strlen(Sec_WebSocket_Key->value));
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
thttp_header_Sec_WebSocket_Key_t *thttp_header_Sec_WebSocket_Key_parse(const char *data, tsk_size_t size)
|
|
{
|
|
int cs = 0;
|
|
const char *p = data;
|
|
const char *pe = p + size;
|
|
const char *eof = pe;
|
|
thttp_header_Sec_WebSocket_Key_t *hdr_Sec_WebSocket_Key = thttp_header_Sec_WebSocket_Key_create_null();
|
|
|
|
const char *tag_start = tsk_null;
|
|
|
|
TSK_RAGEL_DISABLE_WARNINGS_BEGIN()
|
|
%%write data;
|
|
(void)(eof);
|
|
(void)(thttp_machine_parser_header_Sec_WebSocket_Key_first_final);
|
|
(void)(thttp_machine_parser_header_Sec_WebSocket_Key_error);
|
|
(void)(thttp_machine_parser_header_Sec_WebSocket_Key_en_main);
|
|
%%write init;
|
|
%%write exec;
|
|
TSK_RAGEL_DISABLE_WARNINGS_END()
|
|
|
|
if( cs < %%{ write first_final; }%% ){
|
|
TSK_DEBUG_ERROR("Failed to parse Sec-WebSocket-Key header.");
|
|
TSK_OBJECT_SAFE_FREE(hdr_Sec_WebSocket_Key);
|
|
}
|
|
|
|
return hdr_Sec_WebSocket_Key;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//========================================================
|
|
// Sec_WebSocket_Key header object definition
|
|
//
|
|
|
|
static tsk_object_t* thttp_header_Sec_WebSocket_Key_ctor(tsk_object_t *self, va_list * app)
|
|
{
|
|
thttp_header_Sec_WebSocket_Key_t *Sec_WebSocket_Key = self;
|
|
if(Sec_WebSocket_Key){
|
|
THTTP_HEADER(Sec_WebSocket_Key)->type = thttp_htype_Sec_WebSocket_Key;
|
|
THTTP_HEADER(Sec_WebSocket_Key)->tostring = thttp_header_Sec_WebSocket_Key_tostring;
|
|
|
|
Sec_WebSocket_Key->value = tsk_strdup(va_arg(*app, const char*));
|
|
}
|
|
else{
|
|
TSK_DEBUG_ERROR("Failed to create new Sec-WebSocket-Key header.");
|
|
}
|
|
return self;
|
|
}
|
|
|
|
static tsk_object_t* thttp_header_Sec_WebSocket_Key_dtor(tsk_object_t *self)
|
|
{
|
|
thttp_header_Sec_WebSocket_Key_t *Sec_WebSocket_Key = self;
|
|
if(Sec_WebSocket_Key){
|
|
TSK_FREE(Sec_WebSocket_Key->value);
|
|
TSK_OBJECT_SAFE_FREE(THTTP_HEADER_PARAMS(Sec_WebSocket_Key));
|
|
}
|
|
else{
|
|
TSK_DEBUG_ERROR("Null Sec_WebSocket_Key header.");
|
|
}
|
|
|
|
return self;
|
|
}
|
|
|
|
static const tsk_object_def_t thttp_header_Sec_WebSocket_Key_def_s =
|
|
{
|
|
sizeof(thttp_header_Sec_WebSocket_Key_t),
|
|
thttp_header_Sec_WebSocket_Key_ctor,
|
|
thttp_header_Sec_WebSocket_Key_dtor,
|
|
tsk_null
|
|
};
|
|
const tsk_object_def_t *thttp_header_Sec_WebSocket_Key_def_t = &thttp_header_Sec_WebSocket_Key_def_s;
|