2009-07-30 21:33:57 +02:00
|
|
|
/*
|
2011-04-21 23:14:28 +02:00
|
|
|
* Copyright © 2009 Red Hat, Inc.
|
2018-05-11 11:10:33 +02:00
|
|
|
* Copyright © 2018 Ebrahim Byagowi
|
2009-07-30 21:33:57 +02:00
|
|
|
*
|
2010-04-22 06:11:43 +02:00
|
|
|
* This is part of HarfBuzz, a text shaping library.
|
2009-07-30 21:33:57 +02:00
|
|
|
*
|
|
|
|
* Permission is hereby granted, without written agreement and without
|
|
|
|
* license or royalty fees, to use, copy, modify, and distribute this
|
|
|
|
* software and its documentation for any purpose, provided that the
|
|
|
|
* above copyright notice and the following two paragraphs appear in
|
|
|
|
* all copies of this software.
|
|
|
|
*
|
|
|
|
* IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE TO ANY PARTY FOR
|
|
|
|
* DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES
|
|
|
|
* ARISING OUT OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN
|
|
|
|
* IF THE COPYRIGHT HOLDER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
|
|
|
|
* DAMAGE.
|
|
|
|
*
|
|
|
|
* THE COPYRIGHT HOLDER SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS
|
|
|
|
* ON AN "AS IS" BASIS, AND THE COPYRIGHT HOLDER HAS NO OBLIGATION TO
|
|
|
|
* PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS.
|
|
|
|
*
|
|
|
|
* Red Hat Author(s): Behdad Esfahbod
|
|
|
|
*/
|
|
|
|
|
2018-08-26 07:36:36 +02:00
|
|
|
#include "hb.hh"
|
|
|
|
#include "hb-blob.hh"
|
2009-07-30 21:33:57 +02:00
|
|
|
|
2009-08-13 11:25:23 +02:00
|
|
|
#ifdef HAVE_SYS_MMAN_H
|
2009-08-13 01:36:29 +02:00
|
|
|
#ifdef HAVE_UNISTD_H
|
2009-08-03 23:53:29 +02:00
|
|
|
#include <unistd.h>
|
2009-08-13 01:36:29 +02:00
|
|
|
#endif /* HAVE_UNISTD_H */
|
2009-08-03 23:53:29 +02:00
|
|
|
#include <sys/mman.h>
|
2009-08-13 11:25:23 +02:00
|
|
|
#endif /* HAVE_SYS_MMAN_H */
|
2009-08-03 23:53:29 +02:00
|
|
|
|
2011-05-07 04:28:26 +02:00
|
|
|
|
2018-10-27 13:07:33 +02:00
|
|
|
/**
|
|
|
|
* SECTION: hb-blob
|
2018-10-27 13:50:38 +02:00
|
|
|
* @title: hb-blob
|
2018-10-27 13:07:33 +02:00
|
|
|
* @short_description: Binary data containers
|
|
|
|
* @include: hb.h
|
|
|
|
*
|
|
|
|
* Blobs wrap a chunk of binary data to handle lifecycle management of data
|
|
|
|
* while it is passed between client and HarfBuzz. Blobs are primarily used
|
|
|
|
* to create font faces, but also to access font face tables, as well as
|
|
|
|
* pass around other binary data.
|
|
|
|
**/
|
|
|
|
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
2015-01-07 04:16:38 +01:00
|
|
|
* hb_blob_create: (skip)
|
|
|
|
* @data: Pointer to blob data.
|
2013-09-05 00:28:39 +02:00
|
|
|
* @length: Length of @data in bytes.
|
|
|
|
* @mode: Memory mode for @data.
|
2015-01-07 04:16:38 +01:00
|
|
|
* @user_data: Data parameter to pass to @destroy.
|
2020-12-30 23:19:29 +01:00
|
|
|
* @destroy: (nullable): Callback to call when @data is not needed anymore.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
|
|
|
* Creates a new "blob" object wrapping @data. The @mode parameter is used
|
|
|
|
* to negotiate ownership and lifecycle of @data.
|
|
|
|
*
|
2013-09-06 21:40:22 +02:00
|
|
|
* Return value: New blob, or the empty blob if something failed or if @length is
|
2013-09-05 00:28:39 +02:00
|
|
|
* zero. Destroy with hb_blob_destroy().
|
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2009-07-30 21:33:57 +02:00
|
|
|
hb_blob_t *
|
|
|
|
hb_blob_create (const char *data,
|
2009-08-03 23:53:29 +02:00
|
|
|
unsigned int length,
|
2009-07-30 21:33:57 +02:00
|
|
|
hb_memory_mode_t mode,
|
2011-04-20 08:59:28 +02:00
|
|
|
void *user_data,
|
|
|
|
hb_destroy_func_t destroy)
|
2021-06-14 23:46:04 +02:00
|
|
|
{
|
|
|
|
if (!length)
|
2021-06-21 02:47:03 +02:00
|
|
|
{
|
|
|
|
if (destroy)
|
|
|
|
destroy (user_data);
|
2021-06-14 23:46:04 +02:00
|
|
|
return hb_blob_get_empty ();
|
2021-06-21 02:47:03 +02:00
|
|
|
}
|
2021-06-14 23:46:04 +02:00
|
|
|
|
|
|
|
hb_blob_t *blob = hb_blob_create_or_fail (data, length, mode,
|
|
|
|
user_data, destroy);
|
|
|
|
return likely (blob) ? blob : hb_blob_get_empty ();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* hb_blob_create_or_fail: (skip)
|
|
|
|
* @data: Pointer to blob data.
|
|
|
|
* @length: Length of @data in bytes.
|
|
|
|
* @mode: Memory mode for @data.
|
|
|
|
* @user_data: Data parameter to pass to @destroy.
|
|
|
|
* @destroy: (nullable): Callback to call when @data is not needed anymore.
|
|
|
|
*
|
|
|
|
* Creates a new "blob" object wrapping @data. The @mode parameter is used
|
|
|
|
* to negotiate ownership and lifecycle of @data.
|
|
|
|
*
|
|
|
|
* Note that this function returns a freshly-allocated empty blob even if @length
|
|
|
|
* is zero. This is in contrast to hb_blob_create(), which returns the singleton
|
|
|
|
* empty blob (as returned by hb_blob_get_empty()) if @length is zero.
|
|
|
|
*
|
2022-06-30 08:43:57 +02:00
|
|
|
* Return value: New blob, or `NULL` if failed. Destroy with hb_blob_destroy().
|
2021-06-14 23:46:04 +02:00
|
|
|
*
|
2021-07-08 22:46:33 +02:00
|
|
|
* Since: 2.8.2
|
2021-06-14 23:46:04 +02:00
|
|
|
**/
|
|
|
|
hb_blob_t *
|
|
|
|
hb_blob_create_or_fail (const char *data,
|
|
|
|
unsigned int length,
|
|
|
|
hb_memory_mode_t mode,
|
|
|
|
void *user_data,
|
|
|
|
hb_destroy_func_t destroy)
|
2009-07-30 21:33:57 +02:00
|
|
|
{
|
|
|
|
hb_blob_t *blob;
|
|
|
|
|
2021-06-14 23:46:04 +02:00
|
|
|
if (length >= 1u << 31 ||
|
|
|
|
!(blob = hb_object_create<hb_blob_t> ()))
|
|
|
|
{
|
2009-07-30 21:33:57 +02:00
|
|
|
if (destroy)
|
|
|
|
destroy (user_data);
|
2021-06-14 23:46:04 +02:00
|
|
|
return nullptr;
|
2009-07-30 21:33:57 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
blob->data = data;
|
2009-08-03 23:53:29 +02:00
|
|
|
blob->length = length;
|
2009-07-30 21:33:57 +02:00
|
|
|
blob->mode = mode;
|
|
|
|
|
|
|
|
blob->user_data = user_data;
|
2011-04-20 08:59:28 +02:00
|
|
|
blob->destroy = destroy;
|
2009-07-30 21:33:57 +02:00
|
|
|
|
|
|
|
if (blob->mode == HB_MEMORY_MODE_DUPLICATE) {
|
|
|
|
blob->mode = HB_MEMORY_MODE_READONLY;
|
2021-06-14 23:46:04 +02:00
|
|
|
if (!blob->try_make_writable ())
|
|
|
|
{
|
2009-08-04 03:27:08 +02:00
|
|
|
hb_blob_destroy (blob);
|
2021-06-14 23:46:04 +02:00
|
|
|
return nullptr;
|
2009-08-04 03:27:08 +02:00
|
|
|
}
|
2009-07-30 21:33:57 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return blob;
|
|
|
|
}
|
|
|
|
|
2017-10-11 15:51:31 +02:00
|
|
|
static void
|
|
|
|
_hb_blob_destroy (void *data)
|
|
|
|
{
|
|
|
|
hb_blob_destroy ((hb_blob_t *) data);
|
|
|
|
}
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
|
|
|
* hb_blob_create_sub_blob:
|
|
|
|
* @parent: Parent blob.
|
|
|
|
* @offset: Start offset of sub-blob within @parent, in bytes.
|
|
|
|
* @length: Length of sub-blob.
|
|
|
|
*
|
|
|
|
* Returns a blob that represents a range of bytes in @parent. The new
|
2020-12-30 22:09:59 +01:00
|
|
|
* blob is always created with #HB_MEMORY_MODE_READONLY, meaning that it
|
2013-09-05 00:28:39 +02:00
|
|
|
* will never modify data in the parent blob. The parent data is not
|
|
|
|
* expected to be modified, and will result in undefined behavior if it
|
|
|
|
* is.
|
|
|
|
*
|
|
|
|
* Makes @parent immutable.
|
|
|
|
*
|
2013-09-06 21:40:22 +02:00
|
|
|
* Return value: New blob, or the empty blob if something failed or if
|
|
|
|
* @length is zero or @offset is beyond the end of @parent's data. Destroy
|
|
|
|
* with hb_blob_destroy().
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2009-08-03 23:53:29 +02:00
|
|
|
hb_blob_t *
|
|
|
|
hb_blob_create_sub_blob (hb_blob_t *parent,
|
|
|
|
unsigned int offset,
|
|
|
|
unsigned int length)
|
|
|
|
{
|
|
|
|
hb_blob_t *blob;
|
|
|
|
|
2018-11-03 20:49:37 +01:00
|
|
|
if (!length || !parent || offset >= parent->length)
|
2012-06-05 18:31:51 +02:00
|
|
|
return hb_blob_get_empty ();
|
2009-08-03 23:53:29 +02:00
|
|
|
|
2011-05-07 04:28:26 +02:00
|
|
|
hb_blob_make_immutable (parent);
|
2009-08-03 23:53:29 +02:00
|
|
|
|
2011-05-07 04:28:26 +02:00
|
|
|
blob = hb_blob_create (parent->data + offset,
|
2019-05-08 05:54:31 +02:00
|
|
|
hb_min (length, parent->length - offset),
|
2013-02-25 23:06:35 +01:00
|
|
|
HB_MEMORY_MODE_READONLY,
|
2011-05-03 06:19:18 +02:00
|
|
|
hb_blob_reference (parent),
|
2017-10-11 15:51:31 +02:00
|
|
|
_hb_blob_destroy);
|
2009-08-03 23:53:29 +02:00
|
|
|
|
|
|
|
return blob;
|
|
|
|
}
|
|
|
|
|
2018-02-14 07:12:36 +01:00
|
|
|
/**
|
|
|
|
* hb_blob_copy_writable_or_fail:
|
|
|
|
* @blob: A blob.
|
|
|
|
*
|
|
|
|
* Makes a writable copy of @blob.
|
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Return value: The new blob, or nullptr if allocation failed
|
2018-02-14 07:12:36 +01:00
|
|
|
*
|
|
|
|
* Since: 1.8.0
|
|
|
|
**/
|
|
|
|
hb_blob_t *
|
|
|
|
hb_blob_copy_writable_or_fail (hb_blob_t *blob)
|
|
|
|
{
|
|
|
|
blob = hb_blob_create (blob->data,
|
|
|
|
blob->length,
|
|
|
|
HB_MEMORY_MODE_DUPLICATE,
|
|
|
|
nullptr,
|
|
|
|
nullptr);
|
|
|
|
|
|
|
|
if (unlikely (blob == hb_blob_get_empty ()))
|
|
|
|
blob = nullptr;
|
|
|
|
|
|
|
|
return blob;
|
|
|
|
}
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
|
|
|
* hb_blob_get_empty:
|
|
|
|
*
|
|
|
|
* Returns the singleton empty blob.
|
|
|
|
*
|
|
|
|
* See TODO:link object types for more information.
|
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Return value: (transfer full): The empty blob.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2009-08-03 23:53:29 +02:00
|
|
|
hb_blob_t *
|
2018-12-17 19:01:01 +01:00
|
|
|
hb_blob_get_empty ()
|
2009-08-03 23:53:29 +02:00
|
|
|
{
|
2020-04-20 11:42:45 +02:00
|
|
|
return const_cast<hb_blob_t *> (&Null (hb_blob_t));
|
2009-08-03 23:53:29 +02:00
|
|
|
}
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
2013-09-06 21:40:22 +02:00
|
|
|
* hb_blob_reference: (skip)
|
2013-09-05 00:28:39 +02:00
|
|
|
* @blob: a blob.
|
|
|
|
*
|
|
|
|
* Increases the reference count on @blob.
|
|
|
|
*
|
|
|
|
* See TODO:link object types for more information.
|
|
|
|
*
|
2013-09-06 21:40:22 +02:00
|
|
|
* Return value: @blob.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2009-07-30 21:33:57 +02:00
|
|
|
hb_blob_t *
|
|
|
|
hb_blob_reference (hb_blob_t *blob)
|
|
|
|
{
|
2011-04-27 22:38:03 +02:00
|
|
|
return hb_object_reference (blob);
|
2009-07-30 21:33:57 +02:00
|
|
|
}
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
2013-09-06 21:40:22 +02:00
|
|
|
* hb_blob_destroy: (skip)
|
2013-09-05 00:28:39 +02:00
|
|
|
* @blob: a blob.
|
|
|
|
*
|
2018-01-31 14:44:45 +01:00
|
|
|
* Decreases the reference count on @blob, and if it reaches zero, destroys
|
2013-09-05 00:28:39 +02:00
|
|
|
* @blob, freeing all memory, possibly calling the destroy-callback the blob
|
|
|
|
* was created for if it has not been called already.
|
|
|
|
*
|
|
|
|
* See TODO:link object types for more information.
|
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2009-07-30 21:33:57 +02:00
|
|
|
void
|
|
|
|
hb_blob_destroy (hb_blob_t *blob)
|
|
|
|
{
|
2011-04-27 22:38:03 +02:00
|
|
|
if (!hb_object_destroy (blob)) return;
|
2009-07-30 21:33:57 +02:00
|
|
|
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_free (blob);
|
2009-07-30 21:33:57 +02:00
|
|
|
}
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
2013-09-06 21:40:22 +02:00
|
|
|
* hb_blob_set_user_data: (skip)
|
2020-12-24 20:28:37 +01:00
|
|
|
* @blob: An #hb_blob_t
|
2019-04-21 21:31:31 +02:00
|
|
|
* @key: The user-data key to set
|
|
|
|
* @data: A pointer to the user data to set
|
2020-12-30 23:19:29 +01:00
|
|
|
* @destroy: (nullable): A callback to call when @data is not needed anymore
|
2019-04-21 21:31:31 +02:00
|
|
|
* @replace: Whether to replace an existing data with the same key
|
|
|
|
*
|
|
|
|
* Attaches a user-data key/data pair to the specified blob.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2022-06-30 08:43:57 +02:00
|
|
|
* Return value: `true` if success, `false` otherwise
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2011-04-28 03:46:01 +02:00
|
|
|
hb_bool_t
|
|
|
|
hb_blob_set_user_data (hb_blob_t *blob,
|
|
|
|
hb_user_data_key_t *key,
|
|
|
|
void * data,
|
2011-08-09 00:43:24 +02:00
|
|
|
hb_destroy_func_t destroy,
|
|
|
|
hb_bool_t replace)
|
2011-04-28 03:46:01 +02:00
|
|
|
{
|
2011-08-09 00:43:24 +02:00
|
|
|
return hb_object_set_user_data (blob, key, data, destroy, replace);
|
2011-04-28 03:46:01 +02:00
|
|
|
}
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
2013-09-06 21:40:22 +02:00
|
|
|
* hb_blob_get_user_data: (skip)
|
2019-04-21 21:31:31 +02:00
|
|
|
* @blob: a blob
|
|
|
|
* @key: The user-data key to query
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Fetches the user data associated with the specified key,
|
|
|
|
* attached to the specified font-functions structure.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Return value: (transfer none): A pointer to the user data
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2011-04-28 03:46:01 +02:00
|
|
|
void *
|
2022-07-25 18:45:55 +02:00
|
|
|
hb_blob_get_user_data (const hb_blob_t *blob,
|
2011-04-28 03:46:01 +02:00
|
|
|
hb_user_data_key_t *key)
|
|
|
|
{
|
|
|
|
return hb_object_get_user_data (blob, key);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
|
|
|
* hb_blob_make_immutable:
|
2019-04-21 21:31:31 +02:00
|
|
|
* @blob: a blob
|
2018-04-20 07:59:06 +02:00
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Makes a blob immutable.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2009-08-04 03:27:08 +02:00
|
|
|
void
|
2011-05-07 04:28:26 +02:00
|
|
|
hb_blob_make_immutable (hb_blob_t *blob)
|
2009-08-04 03:27:08 +02:00
|
|
|
{
|
2018-11-03 19:51:38 +01:00
|
|
|
if (hb_object_is_immutable (blob))
|
2018-09-26 21:03:07 +02:00
|
|
|
return;
|
2009-08-06 19:33:51 +02:00
|
|
|
|
2018-11-03 19:51:38 +01:00
|
|
|
hb_object_make_immutable (blob);
|
2011-05-07 04:28:26 +02:00
|
|
|
}
|
2009-08-05 21:20:34 +02:00
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
|
|
|
* hb_blob_is_immutable:
|
|
|
|
* @blob: a blob.
|
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Tests whether a blob is immutable.
|
2018-04-20 07:59:06 +02:00
|
|
|
*
|
2022-06-30 08:43:57 +02:00
|
|
|
* Return value: `true` if @blob is immutable, `false` otherwise
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2011-05-07 04:28:26 +02:00
|
|
|
hb_bool_t
|
|
|
|
hb_blob_is_immutable (hb_blob_t *blob)
|
|
|
|
{
|
2018-11-03 19:51:38 +01:00
|
|
|
return hb_object_is_immutable (blob);
|
2011-05-07 04:28:26 +02:00
|
|
|
}
|
2009-08-06 19:33:51 +02:00
|
|
|
|
2009-11-06 02:08:17 +01:00
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
|
|
|
* hb_blob_get_length:
|
|
|
|
* @blob: a blob.
|
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Fetches the length of a blob's data.
|
2018-04-20 07:59:06 +02:00
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Return value: the length of @blob data in bytes.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2011-05-07 04:28:26 +02:00
|
|
|
unsigned int
|
|
|
|
hb_blob_get_length (hb_blob_t *blob)
|
|
|
|
{
|
|
|
|
return blob->length;
|
2009-07-30 21:33:57 +02:00
|
|
|
}
|
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
|
|
|
* hb_blob_get_data:
|
|
|
|
* @blob: a blob.
|
2019-04-21 21:31:31 +02:00
|
|
|
* @length: (out): The length in bytes of the data retrieved
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2019-04-21 21:31:31 +02:00
|
|
|
* Fetches the data from a blob.
|
2018-04-20 07:59:06 +02:00
|
|
|
*
|
2022-06-27 13:41:13 +02:00
|
|
|
* Returns: (nullable) (transfer none) (array length=length): the byte data of @blob.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2011-05-07 04:28:26 +02:00
|
|
|
const char *
|
|
|
|
hb_blob_get_data (hb_blob_t *blob, unsigned int *length)
|
2009-07-30 21:33:57 +02:00
|
|
|
{
|
2011-05-07 04:28:26 +02:00
|
|
|
if (length)
|
|
|
|
*length = blob->length;
|
2009-08-06 19:33:51 +02:00
|
|
|
|
2011-05-07 04:28:26 +02:00
|
|
|
return blob->data;
|
|
|
|
}
|
2009-08-06 19:33:51 +02:00
|
|
|
|
2013-09-05 00:28:39 +02:00
|
|
|
/**
|
|
|
|
* hb_blob_get_data_writable:
|
|
|
|
* @blob: a blob.
|
|
|
|
* @length: (out): output length of the writable data.
|
|
|
|
*
|
|
|
|
* Tries to make blob data writable (possibly copying it) and
|
|
|
|
* return pointer to data.
|
|
|
|
*
|
|
|
|
* Fails if blob has been made immutable, or if memory allocation
|
|
|
|
* fails.
|
|
|
|
*
|
2013-09-06 21:40:22 +02:00
|
|
|
* Returns: (transfer none) (array length=length): Writable blob data,
|
2022-06-30 08:43:57 +02:00
|
|
|
* or `NULL` if failed.
|
2013-09-05 00:28:39 +02:00
|
|
|
*
|
2015-09-03 13:23:22 +02:00
|
|
|
* Since: 0.9.2
|
2013-09-05 00:28:39 +02:00
|
|
|
**/
|
2011-05-07 04:28:26 +02:00
|
|
|
char *
|
|
|
|
hb_blob_get_data_writable (hb_blob_t *blob, unsigned int *length)
|
|
|
|
{
|
2020-06-29 07:03:57 +02:00
|
|
|
if (hb_object_is_immutable (blob) ||
|
|
|
|
!blob->try_make_writable ())
|
2020-06-29 06:59:46 +02:00
|
|
|
{
|
|
|
|
if (length) *length = 0;
|
2017-10-15 12:11:08 +02:00
|
|
|
return nullptr;
|
2011-05-07 04:28:26 +02:00
|
|
|
}
|
2009-08-06 19:33:51 +02:00
|
|
|
|
2020-06-29 07:03:57 +02:00
|
|
|
if (length) *length = blob->length;
|
2011-05-07 04:28:26 +02:00
|
|
|
return const_cast<char *> (blob->data);
|
2009-07-30 21:33:57 +02:00
|
|
|
}
|
|
|
|
|
2009-08-18 21:49:23 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
bool
|
2018-12-17 19:01:01 +01:00
|
|
|
hb_blob_t::try_make_writable_inplace_unix ()
|
2009-08-18 21:49:23 +02:00
|
|
|
{
|
|
|
|
#if defined(HAVE_SYS_MMAN_H) && defined(HAVE_MPROTECT)
|
2010-02-23 22:47:51 +01:00
|
|
|
uintptr_t pagesize = -1, mask, length;
|
2009-08-18 21:49:23 +02:00
|
|
|
const char *addr;
|
|
|
|
|
|
|
|
#if defined(HAVE_SYSCONF) && defined(_SC_PAGE_SIZE)
|
2010-02-23 22:47:51 +01:00
|
|
|
pagesize = (uintptr_t) sysconf (_SC_PAGE_SIZE);
|
2009-08-18 21:49:23 +02:00
|
|
|
#elif defined(HAVE_SYSCONF) && defined(_SC_PAGESIZE)
|
2010-02-23 22:47:51 +01:00
|
|
|
pagesize = (uintptr_t) sysconf (_SC_PAGESIZE);
|
2009-08-18 21:49:23 +02:00
|
|
|
#elif defined(HAVE_GETPAGESIZE)
|
2010-02-23 22:47:51 +01:00
|
|
|
pagesize = (uintptr_t) getpagesize ();
|
2009-08-18 21:49:23 +02:00
|
|
|
#endif
|
|
|
|
|
2010-02-23 22:47:51 +01:00
|
|
|
if ((uintptr_t) -1L == pagesize) {
|
2018-05-04 04:14:54 +02:00
|
|
|
DEBUG_MSG_FUNC (BLOB, this, "failed to get pagesize: %s", strerror (errno));
|
2012-06-06 02:35:40 +02:00
|
|
|
return false;
|
2009-08-18 21:49:23 +02:00
|
|
|
}
|
2018-05-04 04:14:54 +02:00
|
|
|
DEBUG_MSG_FUNC (BLOB, this, "pagesize is %lu", (unsigned long) pagesize);
|
2009-08-18 21:49:23 +02:00
|
|
|
|
|
|
|
mask = ~(pagesize-1);
|
2018-05-04 04:14:54 +02:00
|
|
|
addr = (const char *) (((uintptr_t) this->data) & mask);
|
|
|
|
length = (const char *) (((uintptr_t) this->data + this->length + pagesize-1) & mask) - addr;
|
|
|
|
DEBUG_MSG_FUNC (BLOB, this,
|
2011-07-26 02:25:44 +02:00
|
|
|
"calling mprotect on [%p..%p] (%lu bytes)",
|
|
|
|
addr, addr+length, (unsigned long) length);
|
2009-08-18 21:49:23 +02:00
|
|
|
if (-1 == mprotect ((void *) addr, length, PROT_READ | PROT_WRITE)) {
|
2018-05-04 04:14:54 +02:00
|
|
|
DEBUG_MSG_FUNC (BLOB, this, "mprotect failed: %s", strerror (errno));
|
2012-06-06 02:35:40 +02:00
|
|
|
return false;
|
2009-08-18 21:49:23 +02:00
|
|
|
}
|
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
this->mode = HB_MEMORY_MODE_WRITABLE;
|
2011-05-07 04:28:26 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
DEBUG_MSG_FUNC (BLOB, this,
|
2011-07-26 02:25:44 +02:00
|
|
|
"successfully made [%p..%p] (%lu bytes) writable\n",
|
|
|
|
addr, addr+length, (unsigned long) length);
|
2012-06-06 02:35:40 +02:00
|
|
|
return true;
|
2009-08-18 21:49:23 +02:00
|
|
|
#else
|
2012-06-06 02:35:40 +02:00
|
|
|
return false;
|
2009-08-18 21:49:23 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
bool
|
2018-12-17 19:01:01 +01:00
|
|
|
hb_blob_t::try_make_writable_inplace ()
|
2009-08-19 22:45:41 +02:00
|
|
|
{
|
2018-05-04 04:14:54 +02:00
|
|
|
DEBUG_MSG_FUNC (BLOB, this, "making writable inplace\n");
|
2009-08-19 22:45:41 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
if (this->try_make_writable_inplace_unix ())
|
2012-06-06 02:35:40 +02:00
|
|
|
return true;
|
2011-05-07 04:28:26 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
DEBUG_MSG_FUNC (BLOB, this, "making writable -> FAILED\n");
|
2011-05-07 04:28:26 +02:00
|
|
|
|
|
|
|
/* Failed to make writable inplace, mark that */
|
2018-05-04 04:14:54 +02:00
|
|
|
this->mode = HB_MEMORY_MODE_READONLY;
|
2012-06-06 02:35:40 +02:00
|
|
|
return false;
|
2009-08-19 22:45:41 +02:00
|
|
|
}
|
2009-08-18 21:49:23 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
bool
|
2018-12-17 19:01:01 +01:00
|
|
|
hb_blob_t::try_make_writable ()
|
2009-07-30 21:33:57 +02:00
|
|
|
{
|
2020-06-29 06:59:46 +02:00
|
|
|
if (unlikely (!length))
|
|
|
|
mode = HB_MEMORY_MODE_WRITABLE;
|
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
if (this->mode == HB_MEMORY_MODE_WRITABLE)
|
2012-06-06 02:35:40 +02:00
|
|
|
return true;
|
2009-08-06 19:33:51 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
if (this->mode == HB_MEMORY_MODE_READONLY_MAY_MAKE_WRITABLE && this->try_make_writable_inplace ())
|
2012-06-06 02:35:40 +02:00
|
|
|
return true;
|
2010-04-23 19:48:06 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
if (this->mode == HB_MEMORY_MODE_WRITABLE)
|
2012-06-06 02:35:40 +02:00
|
|
|
return true;
|
2009-07-30 21:33:57 +02:00
|
|
|
|
2009-08-04 03:27:08 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
DEBUG_MSG_FUNC (BLOB, this, "current data is -> %p\n", this->data);
|
2011-05-07 04:28:26 +02:00
|
|
|
|
|
|
|
char *new_data;
|
|
|
|
|
2021-07-08 18:58:50 +02:00
|
|
|
new_data = (char *) hb_malloc (this->length);
|
2011-05-07 04:28:26 +02:00
|
|
|
if (unlikely (!new_data))
|
2012-06-06 02:35:40 +02:00
|
|
|
return false;
|
2009-08-06 19:33:51 +02:00
|
|
|
|
2018-05-04 04:14:54 +02:00
|
|
|
DEBUG_MSG_FUNC (BLOB, this, "dupped successfully -> %p\n", this->data);
|
2009-08-06 19:33:51 +02:00
|
|
|
|
2022-11-22 20:54:50 +01:00
|
|
|
hb_memcpy (new_data, this->data, this->length);
|
2018-05-04 04:14:54 +02:00
|
|
|
this->destroy_user_data ();
|
|
|
|
this->mode = HB_MEMORY_MODE_WRITABLE;
|
|
|
|
this->data = new_data;
|
|
|
|
this->user_data = new_data;
|
2021-07-08 18:58:50 +02:00
|
|
|
this->destroy = hb_free;
|
2011-05-07 04:28:26 +02:00
|
|
|
|
2012-06-06 02:35:40 +02:00
|
|
|
return true;
|
2009-07-30 21:33:57 +02:00
|
|
|
}
|
2018-04-20 07:59:06 +02:00
|
|
|
|
2018-05-04 03:10:57 +02:00
|
|
|
/*
|
|
|
|
* Mmap
|
|
|
|
*/
|
|
|
|
|
2019-06-21 20:09:42 +02:00
|
|
|
#ifndef HB_NO_OPEN
|
2018-05-11 11:10:33 +02:00
|
|
|
#ifdef HAVE_MMAP
|
2020-05-11 14:35:11 +02:00
|
|
|
# if !defined(HB_NO_RESOURCE_FORK) && defined(__APPLE__)
|
|
|
|
# include <sys/paths.h>
|
|
|
|
# endif
|
2018-05-11 12:06:41 +02:00
|
|
|
# include <sys/types.h>
|
|
|
|
# include <sys/stat.h>
|
|
|
|
# include <fcntl.h>
|
2018-05-11 11:10:33 +02:00
|
|
|
#endif
|
|
|
|
|
2018-11-13 03:05:39 +01:00
|
|
|
#ifdef _WIN32
|
2018-05-11 12:06:41 +02:00
|
|
|
# include <windows.h>
|
2018-06-27 11:43:26 +02:00
|
|
|
#else
|
2018-10-19 22:04:56 +02:00
|
|
|
# ifndef O_BINARY
|
|
|
|
# define O_BINARY 0
|
2018-06-27 11:43:26 +02:00
|
|
|
# endif
|
2018-04-20 07:59:06 +02:00
|
|
|
#endif
|
|
|
|
|
2018-05-26 21:20:10 +02:00
|
|
|
#ifndef MAP_NORESERVE
|
|
|
|
# define MAP_NORESERVE 0
|
|
|
|
#endif
|
|
|
|
|
2018-04-20 07:59:06 +02:00
|
|
|
struct hb_mapped_file_t
|
|
|
|
{
|
|
|
|
char *contents;
|
|
|
|
unsigned long length;
|
2018-11-13 03:05:39 +01:00
|
|
|
#ifdef _WIN32
|
2018-04-20 07:59:06 +02:00
|
|
|
HANDLE mapping;
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
2018-11-13 03:05:39 +01:00
|
|
|
#if (defined(HAVE_MMAP) || defined(_WIN32)) && !defined(HB_NO_MMAP)
|
2018-04-20 07:59:06 +02:00
|
|
|
static void
|
2018-10-15 07:22:45 +02:00
|
|
|
_hb_mapped_file_destroy (void *file_)
|
2018-04-20 07:59:06 +02:00
|
|
|
{
|
2018-10-15 07:22:45 +02:00
|
|
|
hb_mapped_file_t *file = (hb_mapped_file_t *) file_;
|
2018-04-20 07:59:06 +02:00
|
|
|
#ifdef HAVE_MMAP
|
|
|
|
munmap (file->contents, file->length);
|
2018-11-13 03:05:39 +01:00
|
|
|
#elif defined(_WIN32)
|
2018-04-20 07:59:06 +02:00
|
|
|
UnmapViewOfFile (file->contents);
|
|
|
|
CloseHandle (file->mapping);
|
|
|
|
#else
|
2018-06-25 19:53:43 +02:00
|
|
|
assert (0); // If we don't have mmap we shouldn't reach here
|
2018-04-20 07:59:06 +02:00
|
|
|
#endif
|
|
|
|
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_free (file);
|
2018-04-20 07:59:06 +02:00
|
|
|
}
|
2018-07-03 10:34:05 +02:00
|
|
|
#endif
|
2018-04-20 07:59:06 +02:00
|
|
|
|
2020-04-30 18:51:46 +02:00
|
|
|
#ifdef _PATH_RSRCFORKSPEC
|
|
|
|
static int
|
2020-04-30 20:44:54 +02:00
|
|
|
_open_resource_fork (const char *file_name, hb_mapped_file_t *file)
|
2020-04-30 18:51:46 +02:00
|
|
|
{
|
|
|
|
size_t name_len = strlen (file_name);
|
|
|
|
size_t len = name_len + sizeof (_PATH_RSRCFORKSPEC);
|
|
|
|
|
2021-07-08 18:58:50 +02:00
|
|
|
char *rsrc_name = (char *) hb_malloc (len);
|
2020-04-30 18:51:46 +02:00
|
|
|
if (unlikely (!rsrc_name)) return -1;
|
|
|
|
|
|
|
|
strncpy (rsrc_name, file_name, name_len);
|
|
|
|
strncpy (rsrc_name + name_len, _PATH_RSRCFORKSPEC,
|
2022-05-30 14:59:03 +02:00
|
|
|
sizeof (_PATH_RSRCFORKSPEC));
|
2020-04-30 18:51:46 +02:00
|
|
|
|
|
|
|
int fd = open (rsrc_name, O_RDONLY | O_BINARY, 0);
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_free (rsrc_name);
|
2020-04-30 18:51:46 +02:00
|
|
|
|
|
|
|
if (fd != -1)
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
if (fstat (fd, &st) != -1)
|
|
|
|
file->length = (unsigned long) st.st_size;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
close (fd);
|
|
|
|
fd = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-04-20 07:59:06 +02:00
|
|
|
/**
|
|
|
|
* hb_blob_create_from_file:
|
2019-04-21 21:31:31 +02:00
|
|
|
* @file_name: A font filename
|
|
|
|
*
|
|
|
|
* Creates a new blob containing the data from the
|
|
|
|
* specified binary font file.
|
2018-04-20 07:59:06 +02:00
|
|
|
*
|
2021-06-14 23:46:04 +02:00
|
|
|
* Returns: An #hb_blob_t pointer with the content of the file,
|
|
|
|
* or hb_blob_get_empty() if failed.
|
2018-04-20 07:59:06 +02:00
|
|
|
*
|
2018-06-06 00:17:39 +02:00
|
|
|
* Since: 1.7.7
|
2018-04-20 07:59:06 +02:00
|
|
|
**/
|
|
|
|
hb_blob_t *
|
|
|
|
hb_blob_create_from_file (const char *file_name)
|
2021-06-14 23:46:04 +02:00
|
|
|
{
|
|
|
|
hb_blob_t *blob = hb_blob_create_from_file_or_fail (file_name);
|
|
|
|
return likely (blob) ? blob : hb_blob_get_empty ();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* hb_blob_create_from_file_or_fail:
|
|
|
|
* @file_name: A font filename
|
|
|
|
*
|
|
|
|
* Creates a new blob containing the data from the
|
|
|
|
* specified binary font file.
|
|
|
|
*
|
|
|
|
* Returns: An #hb_blob_t pointer with the content of the file,
|
2022-06-30 08:43:57 +02:00
|
|
|
* or `NULL` if failed.
|
2021-06-14 23:46:04 +02:00
|
|
|
*
|
2021-07-08 22:46:33 +02:00
|
|
|
* Since: 2.8.2
|
2021-06-14 23:46:04 +02:00
|
|
|
**/
|
|
|
|
hb_blob_t *
|
|
|
|
hb_blob_create_from_file_or_fail (const char *file_name)
|
2018-04-20 07:59:06 +02:00
|
|
|
{
|
2018-06-30 23:24:14 +02:00
|
|
|
/* Adopted from glib's gmappedfile.c with Matthias Clasen and
|
|
|
|
Allison Lortie permission but changed a lot to suit our need. */
|
|
|
|
#if defined(HAVE_MMAP) && !defined(HB_NO_MMAP)
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_mapped_file_t *file = (hb_mapped_file_t *) hb_calloc (1, sizeof (hb_mapped_file_t));
|
2022-04-01 02:18:37 +02:00
|
|
|
if (unlikely (!file)) return nullptr;
|
2018-04-20 07:59:06 +02:00
|
|
|
|
2018-10-19 22:04:56 +02:00
|
|
|
int fd = open (file_name, O_RDONLY | O_BINARY, 0);
|
2018-05-11 11:10:33 +02:00
|
|
|
if (unlikely (fd == -1)) goto fail_without_close;
|
2018-04-20 07:59:06 +02:00
|
|
|
|
|
|
|
struct stat st;
|
|
|
|
if (unlikely (fstat (fd, &st) == -1)) goto fail;
|
|
|
|
|
|
|
|
file->length = (unsigned long) st.st_size;
|
2020-04-30 18:51:46 +02:00
|
|
|
|
|
|
|
#ifdef _PATH_RSRCFORKSPEC
|
|
|
|
if (unlikely (file->length == 0))
|
|
|
|
{
|
|
|
|
int rfd = _open_resource_fork (file_name, file);
|
|
|
|
if (rfd != -1)
|
|
|
|
{
|
|
|
|
close (fd);
|
|
|
|
fd = rfd;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-06-25 19:53:43 +02:00
|
|
|
file->contents = (char *) mmap (nullptr, file->length, PROT_READ,
|
2018-05-26 21:20:10 +02:00
|
|
|
MAP_PRIVATE | MAP_NORESERVE, fd, 0);
|
2018-05-11 11:10:33 +02:00
|
|
|
|
2018-06-25 19:53:43 +02:00
|
|
|
if (unlikely (file->contents == MAP_FAILED)) goto fail;
|
2018-05-11 11:10:33 +02:00
|
|
|
|
2018-06-25 19:53:43 +02:00
|
|
|
close (fd);
|
|
|
|
|
2021-06-14 23:46:04 +02:00
|
|
|
return hb_blob_create_or_fail (file->contents, file->length,
|
|
|
|
HB_MEMORY_MODE_READONLY_MAY_MAKE_WRITABLE, (void *) file,
|
|
|
|
(hb_destroy_func_t) _hb_mapped_file_destroy);
|
2018-06-25 19:53:43 +02:00
|
|
|
|
|
|
|
fail:
|
|
|
|
close (fd);
|
|
|
|
fail_without_close:
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_free (file);
|
2018-06-25 19:53:43 +02:00
|
|
|
|
2018-11-13 03:05:39 +01:00
|
|
|
#elif defined(_WIN32) && !defined(HB_NO_MMAP)
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_mapped_file_t *file = (hb_mapped_file_t *) hb_calloc (1, sizeof (hb_mapped_file_t));
|
2022-04-01 02:18:37 +02:00
|
|
|
if (unlikely (!file)) return nullptr;
|
2018-06-25 19:53:43 +02:00
|
|
|
|
2018-07-04 13:03:39 +02:00
|
|
|
HANDLE fd;
|
|
|
|
unsigned int size = strlen (file_name) + 1;
|
2021-07-08 18:58:50 +02:00
|
|
|
wchar_t * wchar_file_name = (wchar_t *) hb_malloc (sizeof (wchar_t) * size);
|
2020-04-20 21:18:23 +02:00
|
|
|
if (unlikely (!wchar_file_name)) goto fail_without_close;
|
2018-07-04 13:03:39 +02:00
|
|
|
mbstowcs (wchar_file_name, file_name, size);
|
2023-02-10 14:14:43 +01:00
|
|
|
#if !WINAPI_FAMILY_PARTITION(WINAPI_PARTITION_DESKTOP) && WINAPI_FAMILY_PARTITION(WINAPI_PARTITION_APP)
|
2018-09-23 10:08:30 +02:00
|
|
|
{
|
|
|
|
CREATEFILE2_EXTENDED_PARAMETERS ceparams = { 0 };
|
|
|
|
ceparams.dwSize = sizeof(CREATEFILE2_EXTENDED_PARAMETERS);
|
|
|
|
ceparams.dwFileAttributes = FILE_ATTRIBUTE_NORMAL | FILE_FLAG_OVERLAPPED & 0xFFFF;
|
|
|
|
ceparams.dwFileFlags = FILE_ATTRIBUTE_NORMAL | FILE_FLAG_OVERLAPPED & 0xFFF00000;
|
|
|
|
ceparams.dwSecurityQosFlags = FILE_ATTRIBUTE_NORMAL | FILE_FLAG_OVERLAPPED & 0x000F0000;
|
|
|
|
ceparams.lpSecurityAttributes = nullptr;
|
|
|
|
ceparams.hTemplateFile = nullptr;
|
|
|
|
fd = CreateFile2 (wchar_file_name, GENERIC_READ, FILE_SHARE_READ,
|
2019-08-24 15:27:14 +02:00
|
|
|
OPEN_EXISTING, &ceparams);
|
2018-09-23 10:08:30 +02:00
|
|
|
}
|
|
|
|
#else
|
2018-07-04 13:03:39 +02:00
|
|
|
fd = CreateFileW (wchar_file_name, GENERIC_READ, FILE_SHARE_READ, nullptr,
|
|
|
|
OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL|FILE_FLAG_OVERLAPPED,
|
|
|
|
nullptr);
|
2018-09-23 10:08:30 +02:00
|
|
|
#endif
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_free (wchar_file_name);
|
2018-05-11 11:10:33 +02:00
|
|
|
|
|
|
|
if (unlikely (fd == INVALID_HANDLE_VALUE)) goto fail_without_close;
|
|
|
|
|
2023-02-10 14:14:43 +01:00
|
|
|
#if !WINAPI_FAMILY_PARTITION(WINAPI_PARTITION_DESKTOP) && WINAPI_FAMILY_PARTITION(WINAPI_PARTITION_APP)
|
2018-09-23 10:08:30 +02:00
|
|
|
{
|
|
|
|
LARGE_INTEGER length;
|
|
|
|
GetFileSizeEx (fd, &length);
|
|
|
|
file->length = length.LowPart;
|
|
|
|
file->mapping = CreateFileMappingFromApp (fd, nullptr, PAGE_READONLY, length.QuadPart, nullptr);
|
|
|
|
}
|
|
|
|
#else
|
2018-05-11 11:10:33 +02:00
|
|
|
file->length = (unsigned long) GetFileSize (fd, nullptr);
|
2018-06-25 19:53:43 +02:00
|
|
|
file->mapping = CreateFileMapping (fd, nullptr, PAGE_READONLY, 0, 0, nullptr);
|
2018-09-23 10:08:30 +02:00
|
|
|
#endif
|
2020-04-20 21:18:23 +02:00
|
|
|
if (unlikely (!file->mapping)) goto fail;
|
2018-04-20 07:59:06 +02:00
|
|
|
|
2023-02-10 14:14:43 +01:00
|
|
|
#if !WINAPI_FAMILY_PARTITION(WINAPI_PARTITION_DESKTOP) && WINAPI_FAMILY_PARTITION(WINAPI_PARTITION_APP)
|
2018-09-23 10:08:30 +02:00
|
|
|
file->contents = (char *) MapViewOfFileFromApp (file->mapping, FILE_MAP_READ, 0, 0);
|
|
|
|
#else
|
2018-06-25 19:53:43 +02:00
|
|
|
file->contents = (char *) MapViewOfFile (file->mapping, FILE_MAP_READ, 0, 0, 0);
|
2018-09-23 10:08:30 +02:00
|
|
|
#endif
|
2020-04-20 21:18:23 +02:00
|
|
|
if (unlikely (!file->contents)) goto fail;
|
2018-05-11 11:10:33 +02:00
|
|
|
|
2018-06-25 19:53:43 +02:00
|
|
|
CloseHandle (fd);
|
2021-06-14 23:46:04 +02:00
|
|
|
return hb_blob_create_or_fail (file->contents, file->length,
|
|
|
|
HB_MEMORY_MODE_READONLY_MAY_MAKE_WRITABLE, (void *) file,
|
|
|
|
(hb_destroy_func_t) _hb_mapped_file_destroy);
|
2018-05-11 11:10:33 +02:00
|
|
|
|
2018-06-25 19:53:43 +02:00
|
|
|
fail:
|
|
|
|
CloseHandle (fd);
|
|
|
|
fail_without_close:
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_free (file);
|
2018-06-25 19:53:43 +02:00
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2018-06-30 23:24:14 +02:00
|
|
|
/* The following tries to read a file without knowing its size beforehand
|
|
|
|
It's used as a fallback for systems without mmap or to read from pipes */
|
2018-06-27 11:43:26 +02:00
|
|
|
unsigned long len = 0, allocated = BUFSIZ * 16;
|
2021-07-08 18:58:50 +02:00
|
|
|
char *data = (char *) hb_malloc (allocated);
|
2021-06-14 23:46:04 +02:00
|
|
|
if (unlikely (!data)) return nullptr;
|
2018-05-11 11:10:33 +02:00
|
|
|
|
2018-06-25 19:53:43 +02:00
|
|
|
FILE *fp = fopen (file_name, "rb");
|
2020-04-20 21:18:23 +02:00
|
|
|
if (unlikely (!fp)) goto fread_fail_without_close;
|
2018-05-11 11:10:33 +02:00
|
|
|
|
2018-06-25 19:53:43 +02:00
|
|
|
while (!feof (fp))
|
|
|
|
{
|
|
|
|
if (allocated - len < BUFSIZ)
|
|
|
|
{
|
|
|
|
allocated *= 2;
|
2018-06-30 23:24:14 +02:00
|
|
|
/* Don't allocate and go more than ~536MB, our mmap reader still
|
|
|
|
can cover files like that but lets limit our fallback reader */
|
2018-06-27 11:43:26 +02:00
|
|
|
if (unlikely (allocated > (2 << 28))) goto fread_fail;
|
2021-07-08 18:58:50 +02:00
|
|
|
char *new_data = (char *) hb_realloc (data, allocated);
|
2020-04-20 21:18:23 +02:00
|
|
|
if (unlikely (!new_data)) goto fread_fail;
|
2018-06-27 14:24:44 +02:00
|
|
|
data = new_data;
|
2018-06-25 19:53:43 +02:00
|
|
|
}
|
2018-05-11 11:10:33 +02:00
|
|
|
|
2018-06-27 14:24:44 +02:00
|
|
|
unsigned long addition = fread (data + len, 1, allocated - len, fp);
|
2018-06-27 11:43:26 +02:00
|
|
|
|
|
|
|
int err = ferror (fp);
|
2018-06-28 12:02:36 +02:00
|
|
|
#ifdef EINTR // armcc doesn't have it
|
2018-06-27 11:43:26 +02:00
|
|
|
if (unlikely (err == EINTR)) continue;
|
2018-06-28 12:02:36 +02:00
|
|
|
#endif
|
2018-06-28 10:52:21 +02:00
|
|
|
if (unlikely (err)) goto fread_fail;
|
2018-06-27 11:43:26 +02:00
|
|
|
|
|
|
|
len += addition;
|
2018-06-25 19:53:43 +02:00
|
|
|
}
|
2020-04-28 16:55:37 +02:00
|
|
|
fclose (fp);
|
2018-04-20 07:59:06 +02:00
|
|
|
|
2021-06-14 23:46:04 +02:00
|
|
|
return hb_blob_create_or_fail (data, len, HB_MEMORY_MODE_WRITABLE, data,
|
2021-07-08 18:58:50 +02:00
|
|
|
(hb_destroy_func_t) hb_free);
|
2018-04-20 07:59:06 +02:00
|
|
|
|
2018-06-25 19:53:43 +02:00
|
|
|
fread_fail:
|
|
|
|
fclose (fp);
|
|
|
|
fread_fail_without_close:
|
2021-07-08 18:58:50 +02:00
|
|
|
hb_free (data);
|
2021-06-14 23:46:04 +02:00
|
|
|
return nullptr;
|
2018-04-20 07:59:06 +02:00
|
|
|
}
|
2019-06-21 20:09:42 +02:00
|
|
|
#endif /* !HB_NO_OPEN */
|