2013-07-19 09:50:31 +02:00
|
|
|
/*
|
|
|
|
* nghttp2 - HTTP/2.0 C Library
|
|
|
|
*
|
|
|
|
* Copyright (c) 2013 Tatsuhiro Tsujikawa
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
* a copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
#include "nghttp2_hd.h"
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <assert.h>
|
2013-12-16 15:54:20 +01:00
|
|
|
#include <stdio.h>
|
2013-07-19 09:50:31 +02:00
|
|
|
|
|
|
|
#include "nghttp2_frame.h"
|
|
|
|
#include "nghttp2_helper.h"
|
2013-12-16 15:54:20 +01:00
|
|
|
#include "nghttp2_int.h"
|
2013-07-19 09:50:31 +02:00
|
|
|
|
2013-10-24 15:09:40 +02:00
|
|
|
/* Make scalar initialization form of nghttp2_nv */
|
2014-01-07 15:41:09 +01:00
|
|
|
#define MAKE_STATIC_ENT(I, N, V, NH, VH) \
|
|
|
|
{ { { (uint8_t*)N, (uint8_t*)V, sizeof(N) - 1, sizeof(V) - 1 }, \
|
|
|
|
NH, VH, 1, NGHTTP2_HD_FLAG_NONE }, I }
|
|
|
|
|
|
|
|
/* Sorted by hash(name) and its table index */
|
|
|
|
static nghttp2_hd_static_entry static_table[] = {
|
|
|
|
MAKE_STATIC_ENT(19, "age", "", 96511u, 0u),
|
|
|
|
MAKE_STATIC_ENT(58, "via", "", 116750u, 0u),
|
|
|
|
MAKE_STATIC_ENT(31, "date", "", 3076014u, 0u),
|
|
|
|
MAKE_STATIC_ENT(32, "etag", "", 3123477u, 0u),
|
|
|
|
MAKE_STATIC_ENT(35, "from", "", 3151786u, 0u),
|
|
|
|
MAKE_STATIC_ENT(36, "host", "", 3208616u, 0u),
|
|
|
|
MAKE_STATIC_ENT(43, "link", "", 3321850u, 0u),
|
|
|
|
MAKE_STATIC_ENT(57, "vary", "", 3612210u, 0u),
|
|
|
|
MAKE_STATIC_ENT(37, "if-match", "", 34533653u, 0u),
|
|
|
|
MAKE_STATIC_ENT(40, "if-range", "", 39145613u, 0u),
|
|
|
|
MAKE_STATIC_ENT(3, ":path", "/", 56997727u, 47u),
|
|
|
|
MAKE_STATIC_ENT(4, ":path", "/index.html", 56997727u, 2144181430u),
|
|
|
|
MAKE_STATIC_ENT(20, "allow", "", 92906313u, 0u),
|
|
|
|
MAKE_STATIC_ENT(48, "range", "", 108280125u, 0u),
|
|
|
|
MAKE_STATIC_ENT(13, "accept-charset", "", 124285319u, 0u),
|
|
|
|
MAKE_STATIC_ENT(42, "last-modified", "", 150043680u, 0u),
|
|
|
|
MAKE_STATIC_ENT(47, "proxy-authorization", "", 329532250u, 0u),
|
|
|
|
MAKE_STATIC_ENT(56, "user-agent", "", 486342275u, 0u),
|
|
|
|
MAKE_STATIC_ENT(39, "if-none-match", "", 646073760u, 0u),
|
|
|
|
MAKE_STATIC_ENT(29, "content-type", "", 785670158u, 0u),
|
|
|
|
MAKE_STATIC_ENT(15, "accept-language", "", 802785917u, 0u),
|
|
|
|
MAKE_STATIC_ENT(49, "referer", "", 1085069613u, 0u),
|
|
|
|
MAKE_STATIC_ENT(50, "refresh", "", 1085444827u, 0u),
|
|
|
|
MAKE_STATIC_ENT(54, "strict-transport-security", "", 1153852136u, 0u),
|
|
|
|
MAKE_STATIC_ENT(53, "set-cookie", "", 1237214767u, 0u),
|
|
|
|
MAKE_STATIC_ENT(55, "transfer-encoding", "", 1274458357u, 0u),
|
|
|
|
MAKE_STATIC_ENT(16, "accept-ranges", "", 1397189435u, 0u),
|
|
|
|
MAKE_STATIC_ENT(41, "if-unmodified-since", "", 1454068927u, 0u),
|
|
|
|
MAKE_STATIC_ENT(45, "max-forwards", "", 1619948695u, 0u),
|
|
|
|
MAKE_STATIC_ENT(44, "location", "", 1901043637u, 0u),
|
|
|
|
MAKE_STATIC_ENT(51, "retry-after", "", 1933352567u, 0u),
|
|
|
|
MAKE_STATIC_ENT(24, "content-encoding", "", 2095084583u, 0u),
|
|
|
|
MAKE_STATIC_ENT(27, "content-location", "", 2284906121u, 0u),
|
|
|
|
MAKE_STATIC_ENT(38, "if-modified-since", "", 2302095846u, 0u),
|
|
|
|
MAKE_STATIC_ENT(17, "accept", "", 2871506184u, 0u),
|
|
|
|
MAKE_STATIC_ENT(28, "content-range", "", 2878374633u, 0u),
|
|
|
|
MAKE_STATIC_ENT(21, "authorization", "", 2909397113u, 0u),
|
|
|
|
MAKE_STATIC_ENT(30, "cookie", "", 2940209764u, 0u),
|
|
|
|
MAKE_STATIC_ENT(0, ":authority", "", 2962729033u, 0u),
|
|
|
|
MAKE_STATIC_ENT(34, "expires", "", 2985731892u, 0u),
|
|
|
|
MAKE_STATIC_ENT(33, "expect", "", 3005803609u, 0u),
|
|
|
|
MAKE_STATIC_ENT(23, "content-disposition", "", 3027699811u, 0u),
|
|
|
|
MAKE_STATIC_ENT(25, "content-language", "", 3065240108u, 0u),
|
|
|
|
MAKE_STATIC_ENT(1, ":method", "GET", 3153018267u, 70454u),
|
|
|
|
MAKE_STATIC_ENT(2, ":method", "POST", 3153018267u, 2461856u),
|
|
|
|
MAKE_STATIC_ENT(26, "content-length", "", 3162187450u, 0u),
|
|
|
|
MAKE_STATIC_ENT(18, "access-control-allow-origin", "", 3297999203u, 0u),
|
|
|
|
MAKE_STATIC_ENT(5, ":scheme", "http", 3322585695u, 3213448u),
|
|
|
|
MAKE_STATIC_ENT(6, ":scheme", "https", 3322585695u, 99617003u),
|
|
|
|
MAKE_STATIC_ENT(7, ":status", "200", 3338091692u, 49586u),
|
|
|
|
MAKE_STATIC_ENT(8, ":status", "500", 3338091692u, 52469u),
|
|
|
|
MAKE_STATIC_ENT(9, ":status", "404", 3338091692u, 51512u),
|
|
|
|
MAKE_STATIC_ENT(10, ":status", "403", 3338091692u, 51511u),
|
|
|
|
MAKE_STATIC_ENT(11, ":status", "400", 3338091692u, 51508u),
|
|
|
|
MAKE_STATIC_ENT(12, ":status", "401", 3338091692u, 51509u),
|
|
|
|
MAKE_STATIC_ENT(52, "server", "", 3389140803u, 0u),
|
|
|
|
MAKE_STATIC_ENT(46, "proxy-authenticate", "", 3993199572u, 0u),
|
|
|
|
MAKE_STATIC_ENT(59, "www-authenticate", "", 4051929931u, 0u),
|
|
|
|
MAKE_STATIC_ENT(22, "cache-control", "", 4086191634u, 0u),
|
|
|
|
MAKE_STATIC_ENT(14, "accept-encoding", "", 4127597688u, 0u)
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Index to the position in static_table */
|
|
|
|
const size_t static_table_index[] = {
|
|
|
|
38, 43, 44, 10, 11, 47, 48, 49, 50, 51, 52, 53, 54, 14, 59, 20,
|
|
|
|
26, 34, 46, 0 , 12, 36, 58, 41, 31, 42, 45, 32, 35, 19, 37, 2 ,
|
|
|
|
3 , 40, 39, 4 , 5 , 8 , 33, 18, 9 , 27, 15, 6 , 29, 28, 56, 16,
|
|
|
|
13, 21, 22, 30, 55, 24, 23, 25, 17, 7 , 1 , 57
|
2013-07-19 09:50:31 +02:00
|
|
|
};
|
|
|
|
|
2013-11-07 17:35:15 +01:00
|
|
|
static const size_t STATIC_TABLE_LENGTH =
|
2013-10-24 15:09:40 +02:00
|
|
|
sizeof(static_table)/sizeof(static_table[0]);
|
|
|
|
|
2014-01-07 13:51:48 +01:00
|
|
|
static int memeq(const void *s1, const void *s2, size_t n)
|
|
|
|
{
|
|
|
|
const uint8_t *a = (const uint8_t*)s1, *b = (const uint8_t*)s2;
|
|
|
|
uint8_t c = 0;
|
|
|
|
while(n > 0) {
|
|
|
|
c |= (*a++) ^ (*b++);
|
|
|
|
--n;
|
|
|
|
}
|
|
|
|
return c == 0;
|
|
|
|
}
|
|
|
|
|
2014-01-07 14:43:34 +01:00
|
|
|
static uint32_t hash(const uint8_t *s, size_t n)
|
|
|
|
{
|
|
|
|
uint32_t h = 0;
|
|
|
|
while(n > 0) {
|
|
|
|
h = h * 31 + *s++;
|
|
|
|
--n;
|
|
|
|
}
|
|
|
|
return h;
|
|
|
|
}
|
|
|
|
|
2013-08-23 16:38:28 +02:00
|
|
|
typedef struct {
|
|
|
|
nghttp2_nv *nva;
|
|
|
|
size_t nvacap;
|
|
|
|
size_t nvlen;
|
|
|
|
} nghttp2_nva_out;
|
|
|
|
|
2013-10-12 14:49:01 +02:00
|
|
|
int nghttp2_hd_entry_init(nghttp2_hd_entry *ent, uint8_t flags,
|
2013-07-19 09:50:31 +02:00
|
|
|
uint8_t *name, uint16_t namelen,
|
|
|
|
uint8_t *value, uint16_t valuelen)
|
|
|
|
{
|
|
|
|
int rv = 0;
|
2013-10-14 16:38:12 +02:00
|
|
|
if((flags & NGHTTP2_HD_FLAG_NAME_ALLOC) &&
|
|
|
|
(flags & NGHTTP2_HD_FLAG_NAME_GIFT) == 0) {
|
2013-07-23 16:10:53 +02:00
|
|
|
if(namelen == 0) {
|
|
|
|
/* We should not allow empty header field name */
|
|
|
|
ent->nv.name = NULL;
|
|
|
|
} else {
|
|
|
|
ent->nv.name = nghttp2_memdup(name, namelen);
|
|
|
|
if(ent->nv.name == NULL) {
|
|
|
|
rv = NGHTTP2_ERR_NOMEM;
|
|
|
|
goto fail;
|
|
|
|
}
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ent->nv.name = name;
|
|
|
|
}
|
2013-10-14 16:38:12 +02:00
|
|
|
if((flags & NGHTTP2_HD_FLAG_VALUE_ALLOC) &&
|
|
|
|
(flags & NGHTTP2_HD_FLAG_VALUE_GIFT) == 0) {
|
2013-07-23 16:10:53 +02:00
|
|
|
if(valuelen == 0) {
|
|
|
|
ent->nv.value = NULL;
|
|
|
|
} else {
|
|
|
|
ent->nv.value = nghttp2_memdup(value, valuelen);
|
|
|
|
if(ent->nv.value == NULL) {
|
|
|
|
rv = NGHTTP2_ERR_NOMEM;
|
|
|
|
goto fail2;
|
|
|
|
}
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ent->nv.value = value;
|
|
|
|
}
|
|
|
|
ent->nv.namelen = namelen;
|
|
|
|
ent->nv.valuelen = valuelen;
|
|
|
|
ent->ref = 1;
|
|
|
|
ent->flags = flags;
|
2014-01-07 14:43:34 +01:00
|
|
|
if(ent->nv.name) {
|
|
|
|
ent->name_hash = hash(ent->nv.name, ent->nv.namelen);
|
|
|
|
} else {
|
|
|
|
ent->name_hash = 0;
|
|
|
|
}
|
|
|
|
if(ent->nv.value) {
|
|
|
|
ent->value_hash = hash(ent->nv.value, ent->nv.valuelen);
|
|
|
|
} else {
|
|
|
|
ent->value_hash = 0;
|
|
|
|
}
|
2013-07-19 09:50:31 +02:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
fail2:
|
|
|
|
if(flags & NGHTTP2_HD_FLAG_NAME_ALLOC) {
|
|
|
|
free(ent->nv.name);
|
|
|
|
}
|
|
|
|
fail:
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
void nghttp2_hd_entry_free(nghttp2_hd_entry *ent)
|
|
|
|
{
|
|
|
|
assert(ent->ref == 0);
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_NAME_ALLOC) {
|
|
|
|
free(ent->nv.name);
|
|
|
|
}
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_VALUE_ALLOC) {
|
|
|
|
free(ent->nv.value);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-12 14:49:01 +02:00
|
|
|
static int nghttp2_hd_ringbuf_init(nghttp2_hd_ringbuf *ringbuf,
|
|
|
|
size_t bufsize)
|
|
|
|
{
|
|
|
|
size_t size;
|
|
|
|
for(size = 1; size < bufsize; size <<= 1);
|
|
|
|
ringbuf->buffer = malloc(sizeof(nghttp2_hd_entry*)*size);
|
|
|
|
if(ringbuf->buffer == NULL) {
|
|
|
|
return NGHTTP2_ERR_NOMEM;
|
|
|
|
}
|
|
|
|
ringbuf->mask = size - 1;
|
|
|
|
ringbuf->first = 0;
|
|
|
|
ringbuf->len = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static nghttp2_hd_entry* nghttp2_hd_ringbuf_get(nghttp2_hd_ringbuf *ringbuf,
|
|
|
|
size_t index)
|
|
|
|
{
|
|
|
|
assert(index < ringbuf->len);
|
|
|
|
return ringbuf->buffer[(ringbuf->first + index) & ringbuf->mask];
|
|
|
|
}
|
|
|
|
|
2013-10-25 18:01:28 +02:00
|
|
|
static int nghttp2_hd_ringbuf_reserve(nghttp2_hd_ringbuf *ringbuf,
|
|
|
|
size_t bufsize)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
size_t size;
|
|
|
|
nghttp2_hd_entry **buffer;
|
|
|
|
|
|
|
|
if(ringbuf->mask + 1 >= bufsize) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
for(size = 1; size < bufsize; size <<= 1);
|
|
|
|
buffer = malloc(sizeof(nghttp2_hd_entry*) * size);
|
|
|
|
if(buffer == NULL) {
|
|
|
|
return NGHTTP2_ERR_NOMEM;
|
|
|
|
}
|
|
|
|
for(i = 0; i < ringbuf->len; ++i) {
|
|
|
|
buffer[i] = nghttp2_hd_ringbuf_get(ringbuf, i);
|
|
|
|
}
|
|
|
|
free(ringbuf->buffer);
|
|
|
|
ringbuf->buffer = buffer;
|
|
|
|
ringbuf->mask = size - 1;
|
|
|
|
ringbuf->first = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-12 14:49:01 +02:00
|
|
|
static void nghttp2_hd_ringbuf_free(nghttp2_hd_ringbuf *ringbuf)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
if(ringbuf == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
for(i = 0; i < ringbuf->len; ++i) {
|
|
|
|
nghttp2_hd_entry *ent = nghttp2_hd_ringbuf_get(ringbuf, i);
|
|
|
|
--ent->ref;
|
|
|
|
nghttp2_hd_entry_free(ent);
|
|
|
|
free(ent);
|
|
|
|
}
|
|
|
|
free(ringbuf->buffer);
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t nghttp2_hd_ringbuf_push_front(nghttp2_hd_ringbuf *ringbuf,
|
|
|
|
nghttp2_hd_entry *ent)
|
|
|
|
{
|
2014-01-16 15:41:13 +01:00
|
|
|
assert(ringbuf->len <= ringbuf->mask);
|
2013-10-12 14:49:01 +02:00
|
|
|
ringbuf->buffer[--ringbuf->first & ringbuf->mask] = ent;
|
|
|
|
++ringbuf->len;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nghttp2_hd_ringbuf_pop_back(nghttp2_hd_ringbuf *ringbuf)
|
|
|
|
{
|
|
|
|
assert(ringbuf->len > 0);
|
|
|
|
--ringbuf->len;
|
|
|
|
}
|
|
|
|
|
2013-07-19 09:50:31 +02:00
|
|
|
static int nghttp2_hd_context_init(nghttp2_hd_context *context,
|
2013-08-24 15:58:26 +02:00
|
|
|
nghttp2_hd_role role,
|
2013-10-13 12:24:21 +02:00
|
|
|
nghttp2_hd_side side,
|
2013-12-14 10:48:41 +01:00
|
|
|
size_t deflate_hd_table_bufsize_max)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2013-10-12 14:49:01 +02:00
|
|
|
int rv;
|
2013-08-24 15:58:26 +02:00
|
|
|
context->role = role;
|
2013-10-14 16:38:12 +02:00
|
|
|
context->side = side;
|
2013-07-25 18:34:28 +02:00
|
|
|
context->bad = 0;
|
2013-10-25 18:01:28 +02:00
|
|
|
context->hd_table_bufsize_max = NGHTTP2_HD_DEFAULT_MAX_BUFFER_SIZE;
|
|
|
|
rv = nghttp2_hd_ringbuf_init
|
|
|
|
(&context->hd_table,
|
|
|
|
context->hd_table_bufsize_max/NGHTTP2_HD_ENTRY_OVERHEAD);
|
2013-10-12 14:49:01 +02:00
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
2013-08-22 18:28:01 +02:00
|
|
|
}
|
2013-07-19 09:50:31 +02:00
|
|
|
|
2013-10-28 16:42:08 +01:00
|
|
|
context->deflate_hd_table_bufsize_max = deflate_hd_table_bufsize_max;
|
|
|
|
context->deflate_hd_table_bufsize = 0;
|
|
|
|
context->deflate_hd_tablelen = 0;
|
2013-07-19 18:27:26 +02:00
|
|
|
context->hd_table_bufsize = 0;
|
2013-07-19 09:50:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
int nghttp2_hd_deflate_init(nghttp2_hd_deflater *deflater, nghttp2_hd_side side)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2014-01-16 15:41:13 +01:00
|
|
|
return nghttp2_hd_deflate_init2(deflater, side,
|
|
|
|
NGHTTP2_HD_DEFAULT_MAX_DEFLATE_BUFFER_SIZE);
|
2013-10-13 12:24:21 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
int nghttp2_hd_deflate_init2(nghttp2_hd_deflater *deflater,
|
2013-10-13 12:24:21 +02:00
|
|
|
nghttp2_hd_side side,
|
2013-12-14 10:48:41 +01:00
|
|
|
size_t deflate_hd_table_bufsize_max)
|
2013-10-13 12:24:21 +02:00
|
|
|
{
|
2014-01-26 09:53:04 +01:00
|
|
|
int rv;
|
|
|
|
rv = nghttp2_hd_context_init(&deflater->ctx, NGHTTP2_HD_ROLE_DEFLATE, side,
|
|
|
|
deflate_hd_table_bufsize_max);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
deflater->no_refset = 0;
|
|
|
|
return 0;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
int nghttp2_hd_inflate_init(nghttp2_hd_inflater *inflater, nghttp2_hd_side side)
|
2013-08-22 20:45:26 +02:00
|
|
|
{
|
2014-01-25 10:24:15 +01:00
|
|
|
int rv;
|
2014-01-26 09:53:04 +01:00
|
|
|
rv = nghttp2_hd_context_init(&inflater->ctx, NGHTTP2_HD_ROLE_INFLATE, side,
|
2014-01-25 10:24:15 +01:00
|
|
|
NGHTTP2_HD_DEFAULT_MAX_BUFFER_SIZE);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
2014-01-26 09:53:04 +01:00
|
|
|
inflater->ent_keep = NULL;
|
|
|
|
inflater->name_keep = NULL;
|
|
|
|
inflater->value_keep = NULL;
|
|
|
|
inflater->end_headers_index = 0;
|
|
|
|
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->opcode = NGHTTP2_HD_OPCODE_NONE;
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_OPCODE;
|
|
|
|
nghttp2_buffer_init(&inflater->namebuf, NGHTTP2_HD_MAX_NAME);
|
|
|
|
nghttp2_buffer_init(&inflater->valuebuf, NGHTTP2_HD_MAX_VALUE);
|
|
|
|
inflater->huffman_encoded = 0;
|
|
|
|
inflater->index = 0;
|
|
|
|
inflater->left = 0;
|
|
|
|
inflater->index_required = 0;
|
|
|
|
inflater->ent_name = NULL;
|
|
|
|
return 0;
|
2013-08-22 20:45:26 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
static void hd_inflate_keep_free(nghttp2_hd_inflater *inflater)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2014-01-16 15:41:13 +01:00
|
|
|
if(inflater->ent_keep) {
|
|
|
|
if(inflater->ent_keep->ref == 0) {
|
|
|
|
nghttp2_hd_entry_free(inflater->ent_keep);
|
|
|
|
free(inflater->ent_keep);
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-16 15:41:13 +01:00
|
|
|
inflater->ent_keep = NULL;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-16 15:41:13 +01:00
|
|
|
free(inflater->name_keep);
|
|
|
|
free(inflater->value_keep);
|
|
|
|
inflater->name_keep = NULL;
|
|
|
|
inflater->value_keep = NULL;
|
|
|
|
}
|
2013-10-14 16:38:12 +02:00
|
|
|
|
2014-01-16 15:41:13 +01:00
|
|
|
static void nghttp2_hd_context_free(nghttp2_hd_context *context)
|
|
|
|
{
|
2013-10-12 14:49:01 +02:00
|
|
|
nghttp2_hd_ringbuf_free(&context->hd_table);
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
void nghttp2_hd_deflate_free(nghttp2_hd_deflater *deflater)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2014-01-26 09:53:04 +01:00
|
|
|
nghttp2_hd_context_free(&deflater->ctx);
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
void nghttp2_hd_inflate_free(nghttp2_hd_inflater *inflater)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2014-01-16 15:41:13 +01:00
|
|
|
hd_inflate_keep_free(inflater);
|
2014-01-25 10:24:15 +01:00
|
|
|
nghttp2_buffer_free(&inflater->namebuf);
|
|
|
|
nghttp2_buffer_free(&inflater->valuebuf);
|
2014-01-26 09:53:04 +01:00
|
|
|
nghttp2_hd_context_free(&inflater->ctx);
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
void nghttp2_hd_deflate_set_no_refset(nghttp2_hd_deflater *deflater,
|
2013-12-14 10:48:41 +01:00
|
|
|
uint8_t no_refset)
|
|
|
|
{
|
|
|
|
deflater->no_refset = no_refset;
|
|
|
|
}
|
|
|
|
|
2013-07-19 09:50:31 +02:00
|
|
|
static size_t entry_room(size_t namelen, size_t valuelen)
|
|
|
|
{
|
|
|
|
return NGHTTP2_HD_ENTRY_OVERHEAD + namelen + valuelen;
|
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
static int emit_indexed_header(nghttp2_nv *nv_out, nghttp2_hd_entry *ent)
|
2013-08-23 16:38:28 +02:00
|
|
|
{
|
2013-12-16 15:54:20 +01:00
|
|
|
DEBUGF(fprintf(stderr, "Header emission:\n"));
|
|
|
|
DEBUGF(fwrite(ent->nv.name, ent->nv.namelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, ": "));
|
|
|
|
DEBUGF(fwrite(ent->nv.value, ent->nv.valuelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, "\n"));
|
2013-09-07 08:28:43 +02:00
|
|
|
/* ent->ref may be 0. This happens if the careless stupid encoder
|
|
|
|
emits literal block larger than header table capacity with
|
|
|
|
indexing. */
|
2013-08-23 16:38:28 +02:00
|
|
|
ent->flags |= NGHTTP2_HD_FLAG_EMIT;
|
2014-01-16 15:41:13 +01:00
|
|
|
*nv_out = ent->nv;
|
|
|
|
return 0;
|
2013-08-23 16:38:28 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
static int emit_newname_header(nghttp2_nv *nv_out, nghttp2_nv *nv)
|
2013-08-23 16:38:28 +02:00
|
|
|
{
|
2013-12-16 15:54:20 +01:00
|
|
|
DEBUGF(fprintf(stderr, "Header emission:\n"));
|
|
|
|
DEBUGF(fwrite(nv->name, nv->namelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, ": "));
|
|
|
|
DEBUGF(fwrite(nv->value, nv->valuelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, "\n"));
|
2014-01-16 15:41:13 +01:00
|
|
|
*nv_out = *nv;
|
2013-10-24 16:49:37 +02:00
|
|
|
return 0;
|
2013-08-23 16:38:28 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
static int emit_indname_header(nghttp2_nv *nv_out, nghttp2_hd_entry *ent,
|
2014-01-16 15:41:13 +01:00
|
|
|
uint8_t *value, size_t valuelen)
|
2013-08-23 16:38:28 +02:00
|
|
|
{
|
2013-12-16 15:54:20 +01:00
|
|
|
DEBUGF(fprintf(stderr, "Header emission:\n"));
|
|
|
|
DEBUGF(fwrite(ent->nv.name, ent->nv.namelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, ": "));
|
|
|
|
DEBUGF(fwrite(value, valuelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, "\n"));
|
2014-01-16 15:41:13 +01:00
|
|
|
nv_out->name = ent->nv.name;
|
|
|
|
nv_out->namelen = ent->nv.namelen;
|
|
|
|
nv_out->value = value;
|
|
|
|
nv_out->valuelen = valuelen;
|
2013-10-24 16:49:37 +02:00
|
|
|
return 0;
|
2013-08-23 16:38:28 +02:00
|
|
|
}
|
|
|
|
|
2013-07-19 09:50:31 +02:00
|
|
|
static int ensure_write_buffer(uint8_t **buf_ptr, size_t *buflen_ptr,
|
|
|
|
size_t offset, size_t need)
|
|
|
|
{
|
|
|
|
int rv;
|
2014-01-26 14:01:27 +01:00
|
|
|
if(need + offset > NGHTTP2_HD_MAX_BUFFER_LENGTH) {
|
2013-07-19 09:50:31 +02:00
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
|
|
|
rv = nghttp2_reserve_buffer(buf_ptr, buflen_ptr, offset + need);
|
|
|
|
if(rv != 0) {
|
|
|
|
return NGHTTP2_ERR_NOMEM;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t count_encoded_length(size_t n, int prefix)
|
|
|
|
{
|
2013-10-18 12:27:15 +02:00
|
|
|
size_t k = (1 << prefix) - 1;
|
2013-07-19 09:50:31 +02:00
|
|
|
size_t len = 0;
|
2013-10-18 12:27:15 +02:00
|
|
|
if(n >= k) {
|
|
|
|
n -= k;
|
|
|
|
++len;
|
|
|
|
} else {
|
|
|
|
return 1;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2013-07-27 11:59:30 +02:00
|
|
|
do {
|
2013-07-19 09:50:31 +02:00
|
|
|
++len;
|
|
|
|
if(n >= 128) {
|
|
|
|
n >>= 7;
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
2013-07-27 11:59:30 +02:00
|
|
|
} while(n);
|
2013-07-19 09:50:31 +02:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t encode_length(uint8_t *buf, size_t n, int prefix)
|
|
|
|
{
|
2013-10-18 12:27:15 +02:00
|
|
|
size_t k = (1 << prefix) - 1;
|
2013-07-19 09:50:31 +02:00
|
|
|
size_t len = 0;
|
2013-10-20 09:28:52 +02:00
|
|
|
*buf &= ~k;
|
2013-10-18 12:27:15 +02:00
|
|
|
if(n >= k) {
|
2013-10-20 09:28:52 +02:00
|
|
|
*buf++ |= k;
|
2013-10-18 12:27:15 +02:00
|
|
|
n -= k;
|
|
|
|
++len;
|
|
|
|
} else {
|
2013-10-20 09:28:52 +02:00
|
|
|
*buf++ |= n;
|
2013-10-18 12:27:15 +02:00
|
|
|
return 1;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2013-07-27 11:59:30 +02:00
|
|
|
do {
|
2013-07-19 09:50:31 +02:00
|
|
|
++len;
|
|
|
|
if(n >= 128) {
|
|
|
|
*buf++ = (1 << 7) | (n & 0x7f);
|
|
|
|
n >>= 7;
|
|
|
|
} else {
|
|
|
|
*buf++ = n;
|
|
|
|
break;
|
|
|
|
}
|
2013-07-27 11:59:30 +02:00
|
|
|
} while(n);
|
2013-07-19 09:50:31 +02:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Decodes |prefx| prefixed integer stored from |in|. The |last|
|
|
|
|
* represents the 1 beyond the last of the valid contiguous memory
|
|
|
|
* region from |in|. The decoded integer must be strictly less than 1
|
|
|
|
* << 16.
|
|
|
|
*
|
2014-01-25 10:24:15 +01:00
|
|
|
* If the |initial| is nonzero, it is used as a initial value, this
|
|
|
|
* function assumes the |in| starts with intermediate data.
|
|
|
|
*
|
|
|
|
* An entire integer is decoded successfully, decoded, the |*final| is
|
|
|
|
* set to nonzero.
|
|
|
|
*
|
2013-07-19 09:50:31 +02:00
|
|
|
* This function returns the next byte of read byte. This function
|
2014-01-25 10:24:15 +01:00
|
|
|
* stores the decoded integer in |*res| if it succeed, including
|
|
|
|
* partial decoding, or stores -1 in |*res|, indicating decoding
|
|
|
|
* error.
|
2013-07-19 09:50:31 +02:00
|
|
|
*/
|
2014-01-25 10:24:15 +01:00
|
|
|
static uint8_t* decode_length(ssize_t *res, int *final, ssize_t initial,
|
|
|
|
uint8_t *in, uint8_t *last, int prefix)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
|
|
|
int k = (1 << prefix) - 1, r;
|
2014-01-25 10:24:15 +01:00
|
|
|
ssize_t n = initial;
|
|
|
|
*final = 0;
|
|
|
|
if(n == 0) {
|
|
|
|
if((*in & k) == k) {
|
|
|
|
n = k;
|
|
|
|
} else {
|
|
|
|
*res = (*in) & k;
|
|
|
|
*final = 1;
|
|
|
|
return in + 1;
|
|
|
|
}
|
2014-02-26 13:44:48 +01:00
|
|
|
if(++in == last) {
|
|
|
|
*res = n;
|
|
|
|
return in;
|
|
|
|
}
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
for(r = 0; in != last; ++in, r += 7) {
|
2014-01-25 10:24:15 +01:00
|
|
|
n += (*in & 0x7f) << r;
|
|
|
|
if(n >= (1 << 16)) {
|
2013-07-19 09:50:31 +02:00
|
|
|
*res = -1;
|
|
|
|
return in + 1;
|
|
|
|
}
|
|
|
|
if((*in & (1 << 7)) == 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
if(in == last) {
|
|
|
|
*res = n;
|
|
|
|
return in;
|
|
|
|
}
|
|
|
|
if(*in & (1 << 7)) {
|
2013-07-19 09:50:31 +02:00
|
|
|
*res = -1;
|
|
|
|
return in + 1;
|
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
*res = n;
|
|
|
|
*final = 1;
|
|
|
|
return in + 1;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
|
2013-11-16 09:05:18 +01:00
|
|
|
static int emit_indexed0(uint8_t **buf_ptr, size_t *buflen_ptr,
|
|
|
|
size_t *offset_ptr)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
rv = ensure_write_buffer(buf_ptr, buflen_ptr, *offset_ptr, 1);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
*(*buf_ptr + *offset_ptr) = 0x80u;
|
|
|
|
++*offset_ptr;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-07-19 18:24:34 +02:00
|
|
|
static int emit_indexed_block(uint8_t **buf_ptr, size_t *buflen_ptr,
|
2013-07-26 17:58:38 +02:00
|
|
|
size_t *offset_ptr, size_t index)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
uint8_t *bufp;
|
2013-11-16 08:18:44 +01:00
|
|
|
size_t blocklen = count_encoded_length(index + 1, 7);
|
2013-07-19 09:50:31 +02:00
|
|
|
rv = ensure_write_buffer(buf_ptr, buflen_ptr, *offset_ptr, blocklen);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
bufp = *buf_ptr + *offset_ptr;
|
2013-10-20 09:28:52 +02:00
|
|
|
*bufp = 0x80u;
|
2013-11-16 08:18:44 +01:00
|
|
|
encode_length(bufp, index + 1, 7);
|
2013-07-19 09:50:31 +02:00
|
|
|
*offset_ptr += blocklen;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-20 17:22:14 +02:00
|
|
|
static size_t emit_string(uint8_t *buf, size_t buflen,
|
|
|
|
size_t enclen, int huffman,
|
|
|
|
const uint8_t *str, size_t len,
|
|
|
|
nghttp2_hd_side side)
|
|
|
|
{
|
|
|
|
size_t rv;
|
|
|
|
*buf = huffman ? 1 << 7 : 0;
|
|
|
|
rv = encode_length(buf, enclen, 7);
|
|
|
|
buf += rv;
|
|
|
|
if(huffman) {
|
|
|
|
nghttp2_hd_huff_encode(buf, buflen - rv, str, len, side);
|
|
|
|
} else {
|
|
|
|
assert(enclen == len);
|
|
|
|
memcpy(buf, str, len);
|
|
|
|
}
|
|
|
|
return rv + enclen;
|
|
|
|
}
|
|
|
|
|
2013-07-19 18:24:34 +02:00
|
|
|
static int emit_indname_block(uint8_t **buf_ptr, size_t *buflen_ptr,
|
2013-07-26 17:58:38 +02:00
|
|
|
size_t *offset_ptr, size_t index,
|
2013-07-19 18:24:34 +02:00
|
|
|
const uint8_t *value, size_t valuelen,
|
2013-10-14 16:38:12 +02:00
|
|
|
int inc_indexing,
|
|
|
|
nghttp2_hd_side side)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
uint8_t *bufp;
|
2013-10-14 16:38:12 +02:00
|
|
|
size_t encvallen = nghttp2_hd_huff_encode_count(value, valuelen, side);
|
2013-10-20 16:59:15 +02:00
|
|
|
size_t blocklen = count_encoded_length(index + 1, 6);
|
|
|
|
int huffman = encvallen < valuelen;
|
|
|
|
if(!huffman) {
|
|
|
|
encvallen = valuelen;
|
|
|
|
}
|
|
|
|
blocklen += count_encoded_length(encvallen, 7) + encvallen;
|
2013-07-19 09:50:31 +02:00
|
|
|
rv = ensure_write_buffer(buf_ptr, buflen_ptr, *offset_ptr, blocklen);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
bufp = *buf_ptr + *offset_ptr;
|
2013-10-20 09:28:52 +02:00
|
|
|
*bufp = inc_indexing ? 0 : 0x40u;
|
2013-10-12 14:49:01 +02:00
|
|
|
bufp += encode_length(bufp, index + 1, 6);
|
2013-10-20 17:22:14 +02:00
|
|
|
bufp += emit_string(bufp, *buflen_ptr - (bufp - *buf_ptr),
|
|
|
|
encvallen, huffman, value, valuelen, side);
|
|
|
|
assert(bufp - (*buf_ptr + *offset_ptr) == (ssize_t)blocklen);
|
2013-07-19 09:50:31 +02:00
|
|
|
*offset_ptr += blocklen;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-07-19 18:24:34 +02:00
|
|
|
static int emit_newname_block(uint8_t **buf_ptr, size_t *buflen_ptr,
|
2013-07-19 09:50:31 +02:00
|
|
|
size_t *offset_ptr, nghttp2_nv *nv,
|
2013-10-14 16:38:12 +02:00
|
|
|
int inc_indexing,
|
|
|
|
nghttp2_hd_side side)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
uint8_t *bufp;
|
2013-10-14 16:38:12 +02:00
|
|
|
size_t encnamelen =
|
|
|
|
nghttp2_hd_huff_encode_count(nv->name, nv->namelen, side);
|
|
|
|
size_t encvallen =
|
|
|
|
nghttp2_hd_huff_encode_count(nv->value, nv->valuelen, side);
|
2013-10-20 16:59:15 +02:00
|
|
|
size_t blocklen = 1;
|
|
|
|
int name_huffman = encnamelen < nv->namelen;
|
|
|
|
int value_huffman = encvallen < nv->valuelen;
|
|
|
|
if(!name_huffman) {
|
|
|
|
encnamelen = nv->namelen;
|
|
|
|
}
|
|
|
|
if(!value_huffman) {
|
|
|
|
encvallen = nv->valuelen;
|
|
|
|
}
|
|
|
|
blocklen += count_encoded_length(encnamelen, 7) + encnamelen +
|
|
|
|
count_encoded_length(encvallen, 7) + encvallen;
|
2013-07-19 09:50:31 +02:00
|
|
|
rv = ensure_write_buffer(buf_ptr, buflen_ptr, *offset_ptr, blocklen);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
bufp = *buf_ptr + *offset_ptr;
|
2013-10-12 14:49:01 +02:00
|
|
|
*bufp++ = inc_indexing ? 0 : 0x40u;
|
2013-10-20 17:22:14 +02:00
|
|
|
bufp += emit_string(bufp, *buflen_ptr - (bufp - *buf_ptr),
|
|
|
|
encnamelen, name_huffman, nv->name, nv->namelen, side);
|
|
|
|
bufp += emit_string(bufp, *buflen_ptr - (bufp - *buf_ptr),
|
|
|
|
encvallen, value_huffman, nv->value, nv->valuelen, side);
|
2013-07-19 09:50:31 +02:00
|
|
|
*offset_ptr += blocklen;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-09-06 14:53:28 +02:00
|
|
|
/*
|
|
|
|
* Emit common header with |index| by toggle off and on (thus 2
|
|
|
|
* indexed representation emissions).
|
|
|
|
*/
|
|
|
|
static int emit_implicit(uint8_t **buf_ptr,
|
|
|
|
size_t *buflen_ptr,
|
|
|
|
size_t *offset_ptr,
|
|
|
|
size_t index)
|
2013-08-23 16:38:28 +02:00
|
|
|
{
|
2013-09-06 14:53:28 +02:00
|
|
|
int i;
|
|
|
|
int rv;
|
|
|
|
for(i = 0; i < 2; ++i) {
|
|
|
|
rv = emit_indexed_block(buf_ptr, buflen_ptr, offset_ptr, index);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static nghttp2_hd_entry* add_hd_table_incremental(nghttp2_hd_context *context,
|
|
|
|
uint8_t **buf_ptr,
|
|
|
|
size_t *buflen_ptr,
|
|
|
|
size_t *offset_ptr,
|
2013-10-12 15:56:29 +02:00
|
|
|
nghttp2_nv *nv,
|
|
|
|
uint8_t entry_flags)
|
2013-09-06 14:53:28 +02:00
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
nghttp2_hd_entry *new_ent;
|
|
|
|
size_t room = entry_room(nv->namelen, nv->valuelen);
|
2013-10-25 18:01:28 +02:00
|
|
|
while(context->hd_table_bufsize + room > context->hd_table_bufsize_max &&
|
2013-10-12 14:49:01 +02:00
|
|
|
context->hd_table.len > 0) {
|
|
|
|
size_t index = context->hd_table.len - 1;
|
|
|
|
nghttp2_hd_entry* ent = nghttp2_hd_ringbuf_get(&context->hd_table, index);
|
2013-09-06 14:53:28 +02:00
|
|
|
context->hd_table_bufsize -= entry_room(ent->nv.namelen, ent->nv.valuelen);
|
2013-10-30 17:51:16 +01:00
|
|
|
if(context->hd_table_bufsize < context->deflate_hd_table_bufsize) {
|
|
|
|
context->deflate_hd_table_bufsize -= entry_room(ent->nv.namelen,
|
|
|
|
ent->nv.valuelen);
|
|
|
|
--context->deflate_hd_tablelen;
|
|
|
|
}
|
2013-10-25 18:01:28 +02:00
|
|
|
if(context->role == NGHTTP2_HD_ROLE_DEFLATE) {
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_IMPLICIT_EMIT) {
|
|
|
|
/* Emit common header just before it slips away from the
|
|
|
|
table. If we don't do this, we have to emit it in literal
|
|
|
|
representation which hurts compression. */
|
|
|
|
rv = emit_implicit(buf_ptr, buflen_ptr, offset_ptr, index);
|
|
|
|
if(rv != 0) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2013-09-06 14:53:28 +02:00
|
|
|
}
|
|
|
|
}
|
2013-12-16 15:54:20 +01:00
|
|
|
DEBUGF(fprintf(stderr, "Remove item from header table:\n"));
|
|
|
|
DEBUGF(fwrite(ent->nv.name, ent->nv.namelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, ": "));
|
|
|
|
DEBUGF(fwrite(ent->nv.value, ent->nv.valuelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, "\n"));
|
2013-10-12 14:49:01 +02:00
|
|
|
nghttp2_hd_ringbuf_pop_back(&context->hd_table);
|
2013-09-06 14:53:28 +02:00
|
|
|
if(--ent->ref == 0) {
|
|
|
|
nghttp2_hd_entry_free(ent);
|
|
|
|
free(ent);
|
|
|
|
}
|
|
|
|
}
|
2013-10-30 17:51:16 +01:00
|
|
|
while(context->deflate_hd_table_bufsize + room >
|
|
|
|
context->deflate_hd_table_bufsize_max
|
|
|
|
&& context->deflate_hd_tablelen > 0) {
|
|
|
|
size_t index = context->deflate_hd_tablelen - 1;
|
|
|
|
nghttp2_hd_entry *ent =
|
|
|
|
nghttp2_hd_ringbuf_get(&context->hd_table, index);
|
|
|
|
context->deflate_hd_table_bufsize -= entry_room(ent->nv.namelen,
|
|
|
|
ent->nv.valuelen);
|
|
|
|
--context->deflate_hd_tablelen;
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_IMPLICIT_EMIT) {
|
|
|
|
/* Just like a normal eviction, implicit header must be
|
|
|
|
emitted twice. */
|
|
|
|
rv = emit_implicit(buf_ptr, buflen_ptr, offset_ptr, index);
|
|
|
|
if(rv != 0) {
|
|
|
|
return NULL;
|
2013-10-25 18:01:28 +02:00
|
|
|
}
|
2013-10-30 17:51:16 +01:00
|
|
|
ent->flags ^= NGHTTP2_HD_FLAG_IMPLICIT_EMIT;
|
|
|
|
}
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_REFSET) {
|
|
|
|
/* We need to drop entry from reference set. */
|
|
|
|
rv = emit_indexed_block(buf_ptr, buflen_ptr, offset_ptr, index);
|
|
|
|
if(rv != 0) {
|
|
|
|
return NULL;
|
2013-10-25 18:01:28 +02:00
|
|
|
}
|
2013-10-30 17:51:16 +01:00
|
|
|
ent->flags ^= NGHTTP2_HD_FLAG_REFSET;
|
|
|
|
}
|
|
|
|
/* Release memory. We don't remove entry from the header table
|
|
|
|
at this moment. */
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_NAME_ALLOC) {
|
|
|
|
free(ent->nv.name);
|
|
|
|
ent->nv.name = NULL;
|
|
|
|
ent->flags ^= NGHTTP2_HD_FLAG_NAME_ALLOC;
|
|
|
|
}
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_VALUE_ALLOC) {
|
|
|
|
free(ent->nv.value);
|
|
|
|
ent->nv.value = NULL;
|
|
|
|
ent->flags ^= NGHTTP2_HD_FLAG_VALUE_ALLOC;
|
2013-10-25 18:01:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-06 14:53:28 +02:00
|
|
|
new_ent = malloc(sizeof(nghttp2_hd_entry));
|
|
|
|
if(new_ent == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2013-10-25 18:01:28 +02:00
|
|
|
|
|
|
|
if(context->role == NGHTTP2_HD_ROLE_DEFLATE &&
|
2013-10-28 16:42:08 +01:00
|
|
|
room > context->deflate_hd_table_bufsize_max) {
|
2013-10-25 18:01:28 +02:00
|
|
|
uint8_t flags = entry_flags &
|
|
|
|
~(NGHTTP2_HD_FLAG_NAME_ALLOC | NGHTTP2_HD_FLAG_VALUE_ALLOC |
|
|
|
|
NGHTTP2_HD_FLAG_NAME_GIFT | NGHTTP2_HD_FLAG_VALUE_GIFT);
|
|
|
|
rv = nghttp2_hd_entry_init(new_ent, flags,
|
|
|
|
NULL, nv->namelen, NULL, nv->valuelen);
|
|
|
|
if(rv != 0) {
|
|
|
|
free(new_ent);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
if(flags & NGHTTP2_HD_FLAG_NAME_GIFT) {
|
|
|
|
free(nv->name);
|
|
|
|
nv->name = NULL;
|
|
|
|
}
|
|
|
|
if(flags & NGHTTP2_HD_FLAG_VALUE_GIFT) {
|
|
|
|
free(nv->value);
|
|
|
|
nv->value = NULL;
|
|
|
|
}
|
|
|
|
/* caller must emit indexed repr to toggle off new_ent from
|
|
|
|
reference set. We cannot do it here because it may break the
|
|
|
|
indexing. */
|
|
|
|
} else {
|
|
|
|
rv = nghttp2_hd_entry_init(new_ent,
|
|
|
|
entry_flags,
|
|
|
|
nv->name, nv->namelen, nv->value, nv->valuelen);
|
|
|
|
if(rv != 0) {
|
|
|
|
free(new_ent);
|
|
|
|
return NULL;
|
|
|
|
}
|
2013-09-06 14:53:28 +02:00
|
|
|
}
|
2013-10-13 12:24:21 +02:00
|
|
|
if(room > context->hd_table_bufsize_max) {
|
2013-09-06 14:53:28 +02:00
|
|
|
/* The entry taking more than NGHTTP2_HD_MAX_BUFFER_SIZE is
|
|
|
|
immediately evicted. */
|
|
|
|
--new_ent->ref;
|
|
|
|
} else {
|
2013-10-25 18:01:28 +02:00
|
|
|
context->hd_table_bufsize += room;
|
2013-10-12 14:49:01 +02:00
|
|
|
nghttp2_hd_ringbuf_push_front(&context->hd_table, new_ent);
|
2013-10-30 17:51:16 +01:00
|
|
|
if(room <= context->deflate_hd_table_bufsize_max) {
|
2013-12-17 13:39:21 +01:00
|
|
|
new_ent->flags |= NGHTTP2_HD_FLAG_REFSET;
|
2013-10-28 16:42:08 +01:00
|
|
|
context->deflate_hd_table_bufsize += room;
|
|
|
|
++context->deflate_hd_tablelen;
|
2013-10-26 16:30:48 +02:00
|
|
|
}
|
2013-09-06 14:53:28 +02:00
|
|
|
}
|
|
|
|
return new_ent;
|
|
|
|
}
|
|
|
|
|
2013-12-18 13:45:15 +01:00
|
|
|
static int name_eq(const nghttp2_nv *a, const nghttp2_nv *b)
|
2013-09-06 14:53:28 +02:00
|
|
|
{
|
2014-01-07 13:51:48 +01:00
|
|
|
return a->namelen == b->namelen && memeq(a->name, b->name, a->namelen);
|
2013-09-06 14:53:28 +02:00
|
|
|
}
|
|
|
|
|
2013-12-18 13:45:15 +01:00
|
|
|
static int value_eq(const nghttp2_nv *a, const nghttp2_nv *b)
|
|
|
|
{
|
2014-01-07 13:51:48 +01:00
|
|
|
return a->valuelen == b->valuelen && memeq(a->value, b->value, a->valuelen);
|
2013-12-18 13:45:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
ssize_t index;
|
|
|
|
/* Nonzero if both name and value are matched. */
|
|
|
|
uint8_t name_value_match;
|
|
|
|
} search_result;
|
|
|
|
|
|
|
|
static search_result search_hd_table(nghttp2_hd_context *context,
|
2013-10-12 14:49:01 +02:00
|
|
|
nghttp2_nv *nv)
|
2013-09-06 14:53:28 +02:00
|
|
|
{
|
2013-12-18 13:45:15 +01:00
|
|
|
search_result res = { -1, 0 };
|
2013-09-06 14:53:28 +02:00
|
|
|
size_t i;
|
2014-01-07 14:43:34 +01:00
|
|
|
uint32_t name_hash = hash(nv->name, nv->namelen);
|
|
|
|
uint32_t value_hash = hash(nv->value, nv->valuelen);
|
2014-01-08 13:32:39 +01:00
|
|
|
ssize_t left = -1, right = STATIC_TABLE_LENGTH;
|
2014-01-07 14:43:34 +01:00
|
|
|
|
2013-10-30 17:51:16 +01:00
|
|
|
for(i = 0; i < context->deflate_hd_tablelen; ++i) {
|
2013-10-12 14:49:01 +02:00
|
|
|
nghttp2_hd_entry *ent = nghttp2_hd_ringbuf_get(&context->hd_table, i);
|
2014-01-07 14:43:34 +01:00
|
|
|
if(ent->name_hash == name_hash && name_eq(&ent->nv, nv)) {
|
2013-12-18 13:45:15 +01:00
|
|
|
if(res.index == -1) {
|
|
|
|
res.index = i;
|
|
|
|
}
|
2014-01-07 14:43:34 +01:00
|
|
|
if(ent->value_hash == value_hash && value_eq(&ent->nv, nv)) {
|
2013-12-18 13:45:15 +01:00
|
|
|
res.index = i;
|
|
|
|
res.name_value_match = 1;
|
|
|
|
return res;
|
|
|
|
}
|
2013-09-06 14:53:28 +02:00
|
|
|
}
|
|
|
|
}
|
2014-01-07 15:41:09 +01:00
|
|
|
|
|
|
|
while(right - left > 1) {
|
2014-01-08 13:32:39 +01:00
|
|
|
ssize_t mid = (left + right) / 2;
|
2014-01-07 15:41:09 +01:00
|
|
|
nghttp2_hd_entry *ent = &static_table[mid].ent;
|
|
|
|
if(ent->name_hash < name_hash) {
|
|
|
|
left = mid;
|
|
|
|
} else {
|
|
|
|
right = mid;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for(i = right; i < STATIC_TABLE_LENGTH; ++i) {
|
|
|
|
nghttp2_hd_entry *ent = &static_table[i].ent;
|
|
|
|
if(ent->name_hash != name_hash) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if(name_eq(&ent->nv, nv)) {
|
2013-12-18 13:45:15 +01:00
|
|
|
if(res.index == -1) {
|
2014-01-07 15:41:09 +01:00
|
|
|
res.index = context->hd_table.len + static_table[i].index;
|
2013-12-18 13:45:15 +01:00
|
|
|
}
|
2014-01-07 14:43:34 +01:00
|
|
|
if(ent->value_hash == value_hash && value_eq(&ent->nv, nv)) {
|
2014-01-07 15:41:09 +01:00
|
|
|
res.index = context->hd_table.len + static_table[i].index;
|
2013-12-18 13:45:15 +01:00
|
|
|
res.name_value_match = 1;
|
|
|
|
return res;
|
|
|
|
}
|
2013-09-06 14:53:28 +02:00
|
|
|
}
|
|
|
|
}
|
2013-12-18 13:45:15 +01:00
|
|
|
return res;
|
2013-10-12 14:49:01 +02:00
|
|
|
}
|
|
|
|
|
2013-10-25 18:01:28 +02:00
|
|
|
int nghttp2_hd_change_table_size(nghttp2_hd_context *context,
|
|
|
|
size_t hd_table_bufsize_max)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
rv = nghttp2_hd_ringbuf_reserve
|
|
|
|
(&context->hd_table, hd_table_bufsize_max / NGHTTP2_HD_ENTRY_OVERHEAD);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
context->hd_table_bufsize_max = hd_table_bufsize_max;
|
2013-10-30 17:51:16 +01:00
|
|
|
if(context->role == NGHTTP2_HD_ROLE_INFLATE) {
|
|
|
|
context->deflate_hd_table_bufsize_max = hd_table_bufsize_max;
|
|
|
|
}
|
2013-10-25 18:01:28 +02:00
|
|
|
while(context->hd_table_bufsize > context->hd_table_bufsize_max &&
|
|
|
|
context->hd_table.len > 0) {
|
|
|
|
size_t index = context->hd_table.len - 1;
|
|
|
|
nghttp2_hd_entry* ent = nghttp2_hd_ringbuf_get(&context->hd_table, index);
|
|
|
|
context->hd_table_bufsize -= entry_room(ent->nv.namelen, ent->nv.valuelen);
|
2013-10-30 17:51:16 +01:00
|
|
|
if(context->hd_table_bufsize < context->deflate_hd_table_bufsize) {
|
|
|
|
context->deflate_hd_table_bufsize -= entry_room(ent->nv.namelen,
|
|
|
|
ent->nv.valuelen);
|
|
|
|
--context->deflate_hd_tablelen;
|
2013-10-25 18:01:28 +02:00
|
|
|
}
|
|
|
|
nghttp2_hd_ringbuf_pop_back(&context->hd_table);
|
|
|
|
if(--ent->ref == 0) {
|
|
|
|
nghttp2_hd_entry_free(ent);
|
|
|
|
free(ent);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-11-16 09:05:18 +01:00
|
|
|
static void clear_refset(nghttp2_hd_context *context)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
for(i = 0; i < context->hd_table.len; ++i) {
|
|
|
|
nghttp2_hd_entry *ent = nghttp2_hd_ringbuf_get(&context->hd_table, i);
|
|
|
|
ent->flags &= ~NGHTTP2_HD_FLAG_REFSET;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-24 15:09:40 +02:00
|
|
|
static int check_index_range(nghttp2_hd_context *context, size_t index)
|
|
|
|
{
|
|
|
|
return index < context->hd_table.len + STATIC_TABLE_LENGTH;
|
|
|
|
}
|
|
|
|
|
2014-01-25 10:24:15 +01:00
|
|
|
static int get_max_index(nghttp2_hd_context *context)
|
|
|
|
{
|
|
|
|
return context->hd_table.len + STATIC_TABLE_LENGTH - 1;
|
|
|
|
}
|
|
|
|
|
2013-10-12 14:49:01 +02:00
|
|
|
nghttp2_hd_entry* nghttp2_hd_table_get(nghttp2_hd_context *context,
|
|
|
|
size_t index)
|
|
|
|
{
|
2013-10-24 15:09:40 +02:00
|
|
|
assert(check_index_range(context, index));
|
2013-10-12 14:49:01 +02:00
|
|
|
if(index < context->hd_table.len) {
|
|
|
|
return nghttp2_hd_ringbuf_get(&context->hd_table, index);
|
|
|
|
} else {
|
2014-01-07 15:41:09 +01:00
|
|
|
return
|
|
|
|
&static_table[static_table_index[index - context->hd_table.len]].ent;
|
2013-10-12 14:49:01 +02:00
|
|
|
}
|
2013-08-23 16:38:28 +02:00
|
|
|
}
|
|
|
|
|
2014-01-07 13:51:48 +01:00
|
|
|
#define name_match(NV, NAME) \
|
|
|
|
(nv->namelen == sizeof(NAME) - 1 && memeq(nv->name, NAME, sizeof(NAME) - 1))
|
2013-11-19 13:41:02 +01:00
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
static int hd_deflate_should_indexing(nghttp2_hd_deflater *deflater,
|
2014-01-21 13:48:25 +01:00
|
|
|
const nghttp2_nv *nv)
|
2013-11-19 13:41:02 +01:00
|
|
|
{
|
2014-01-26 09:53:04 +01:00
|
|
|
size_t table_size = nghttp2_min(deflater->ctx.deflate_hd_table_bufsize_max,
|
|
|
|
deflater->ctx.hd_table_bufsize_max);
|
2014-01-21 13:48:25 +01:00
|
|
|
if(entry_room(nv->namelen, nv->valuelen) > table_size * 3 / 4) {
|
|
|
|
return 0;
|
|
|
|
}
|
2013-11-19 13:41:02 +01:00
|
|
|
#ifdef NGHTTP2_XHD
|
|
|
|
return !name_match(nv, NGHTTP2_XHD);
|
|
|
|
#else /* !NGHTTP2_XHD */
|
|
|
|
return
|
|
|
|
!name_match(nv, "set-cookie") &&
|
|
|
|
!name_match(nv, "content-length") &&
|
|
|
|
!name_match(nv, "location") &&
|
|
|
|
!name_match(nv, "etag") &&
|
|
|
|
!name_match(nv, ":path");
|
|
|
|
#endif /* !NGHTTP2_XHD */
|
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
static int deflate_nv(nghttp2_hd_deflater *deflater,
|
2013-08-24 15:58:26 +02:00
|
|
|
uint8_t **buf_ptr, size_t *buflen_ptr,
|
|
|
|
size_t *offset_ptr,
|
|
|
|
nghttp2_nv *nv)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
nghttp2_hd_entry *ent;
|
2013-12-18 13:45:15 +01:00
|
|
|
search_result res;
|
2014-01-26 09:53:04 +01:00
|
|
|
res = search_hd_table(&deflater->ctx, nv);
|
2013-12-18 13:45:15 +01:00
|
|
|
if(res.index != -1 && res.name_value_match) {
|
|
|
|
size_t index = res.index;
|
2014-01-26 09:53:04 +01:00
|
|
|
ent = nghttp2_hd_table_get(&deflater->ctx, index);
|
|
|
|
if(index >= deflater->ctx.hd_table.len) {
|
2013-10-24 14:52:02 +02:00
|
|
|
nghttp2_hd_entry *new_ent;
|
|
|
|
/* It is important to first add entry to the header table and
|
|
|
|
let eviction go. If NGHTTP2_HD_FLAG_IMPLICIT_EMIT entry is
|
|
|
|
evicted, it must be emitted before the |nv|. */
|
2014-01-26 09:53:04 +01:00
|
|
|
new_ent = add_hd_table_incremental(&deflater->ctx, buf_ptr, buflen_ptr,
|
2013-10-24 14:52:02 +02:00
|
|
|
offset_ptr, &ent->nv,
|
|
|
|
NGHTTP2_HD_FLAG_NONE);
|
|
|
|
if(!new_ent) {
|
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
|
|
|
if(new_ent->ref == 0) {
|
|
|
|
nghttp2_hd_entry_free(new_ent);
|
|
|
|
free(new_ent);
|
2013-10-25 18:01:28 +02:00
|
|
|
new_ent = NULL;
|
|
|
|
} else if(new_ent->nv.name != NULL) {
|
|
|
|
/* new_ent->ref > 0 and nv.name is not NULL means that new_ent is
|
2013-10-28 16:42:08 +01:00
|
|
|
in the reference set and in deflate_hd_table_bufsize */
|
2013-10-24 14:52:02 +02:00
|
|
|
new_ent->flags |= NGHTTP2_HD_FLAG_EMIT;
|
|
|
|
}
|
|
|
|
rv = emit_indexed_block(buf_ptr, buflen_ptr, offset_ptr, index);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
} else if((ent->flags & NGHTTP2_HD_FLAG_REFSET) == 0) {
|
2013-08-24 15:58:26 +02:00
|
|
|
ent->flags |= NGHTTP2_HD_FLAG_REFSET | NGHTTP2_HD_FLAG_EMIT;
|
2013-10-12 14:49:01 +02:00
|
|
|
rv = emit_indexed_block(buf_ptr, buflen_ptr, offset_ptr, index);
|
2013-08-24 15:58:26 +02:00
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
int num_emits = 0;
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_EMIT) {
|
|
|
|
/* occurrences of the same indexed representation. Emit index
|
|
|
|
twice. */
|
|
|
|
num_emits = 2;
|
|
|
|
} else if(ent->flags & NGHTTP2_HD_FLAG_IMPLICIT_EMIT) {
|
|
|
|
/* ent was implicitly emitted because it is the common
|
|
|
|
header field. To support occurrences of the same indexed
|
|
|
|
representation, we have to emit 4 times. This is because
|
|
|
|
"implicitly emitted" means actually not emitted at
|
|
|
|
all. So first 2 emits performs 1st header appears in the
|
|
|
|
reference set. And another 2 emits are done for 2nd
|
|
|
|
(current) header. */
|
|
|
|
ent->flags ^= NGHTTP2_HD_FLAG_IMPLICIT_EMIT;
|
|
|
|
ent->flags |= NGHTTP2_HD_FLAG_EMIT;
|
|
|
|
num_emits = 4;
|
2013-09-06 14:53:28 +02:00
|
|
|
} else {
|
|
|
|
/* This is common header and not emitted in the current
|
|
|
|
run. Just mark IMPLICIT_EMIT, in the hope that we are not
|
|
|
|
required to emit anything for this. We will emit toggle
|
|
|
|
off/on for this entry if it is removed from the header
|
|
|
|
table. */
|
|
|
|
ent->flags |= NGHTTP2_HD_FLAG_IMPLICIT_EMIT;
|
2013-08-24 15:58:26 +02:00
|
|
|
}
|
|
|
|
for(; num_emits > 0; --num_emits) {
|
2013-10-12 14:49:01 +02:00
|
|
|
rv = emit_indexed_block(buf_ptr, buflen_ptr, offset_ptr, index);
|
2013-08-24 15:58:26 +02:00
|
|
|
if(rv != 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2013-10-12 14:49:01 +02:00
|
|
|
ssize_t index = -1;
|
2013-08-24 15:58:26 +02:00
|
|
|
int incidx = 0;
|
2013-12-18 13:45:15 +01:00
|
|
|
if(res.index != -1) {
|
|
|
|
index = res.index;
|
2013-08-24 15:58:26 +02:00
|
|
|
}
|
2014-01-21 13:48:25 +01:00
|
|
|
if(hd_deflate_should_indexing(deflater, nv)) {
|
2013-08-24 15:58:26 +02:00
|
|
|
nghttp2_hd_entry *new_ent;
|
2014-01-26 09:53:04 +01:00
|
|
|
if(index >= (ssize_t)deflater->ctx.hd_table.len) {
|
2013-10-12 15:56:29 +02:00
|
|
|
nghttp2_nv nv_indname;
|
|
|
|
nv_indname = *nv;
|
2014-01-26 09:53:04 +01:00
|
|
|
nv_indname.name = nghttp2_hd_table_get(&deflater->ctx, index)->nv.name;
|
|
|
|
new_ent = add_hd_table_incremental(&deflater->ctx, buf_ptr, buflen_ptr,
|
2013-10-12 15:56:29 +02:00
|
|
|
offset_ptr, &nv_indname,
|
|
|
|
NGHTTP2_HD_FLAG_VALUE_ALLOC);
|
|
|
|
} else {
|
2014-01-26 09:53:04 +01:00
|
|
|
new_ent = add_hd_table_incremental(&deflater->ctx, buf_ptr, buflen_ptr,
|
2013-10-12 15:56:29 +02:00
|
|
|
offset_ptr, nv,
|
|
|
|
NGHTTP2_HD_FLAG_NAME_ALLOC |
|
|
|
|
NGHTTP2_HD_FLAG_VALUE_ALLOC);
|
|
|
|
}
|
2013-08-24 15:58:26 +02:00
|
|
|
if(!new_ent) {
|
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
2013-10-24 14:52:02 +02:00
|
|
|
if(new_ent->ref == 0) {
|
|
|
|
nghttp2_hd_entry_free(new_ent);
|
|
|
|
free(new_ent);
|
2013-10-25 18:01:28 +02:00
|
|
|
} else if(new_ent->nv.name != NULL) {
|
|
|
|
/* new_ent->ref > 0 and nv.name is not NULL means that new_ent is
|
2013-10-28 16:42:08 +01:00
|
|
|
in the reference set and in deflate_hd_table_bufsize */
|
2013-10-24 14:52:02 +02:00
|
|
|
new_ent->flags |= NGHTTP2_HD_FLAG_EMIT;
|
|
|
|
}
|
2013-08-24 15:58:26 +02:00
|
|
|
incidx = 1;
|
|
|
|
}
|
2013-10-12 14:49:01 +02:00
|
|
|
if(index == -1) {
|
2013-10-14 16:38:12 +02:00
|
|
|
rv = emit_newname_block(buf_ptr, buflen_ptr, offset_ptr, nv, incidx,
|
2014-01-26 09:53:04 +01:00
|
|
|
deflater->ctx.side);
|
2013-08-24 15:58:26 +02:00
|
|
|
} else {
|
|
|
|
rv = emit_indname_block(buf_ptr, buflen_ptr, offset_ptr, index,
|
2013-10-14 16:38:12 +02:00
|
|
|
nv->value, nv->valuelen, incidx,
|
2014-01-26 09:53:04 +01:00
|
|
|
deflater->ctx.side);
|
2013-08-24 15:58:26 +02:00
|
|
|
}
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-12 14:49:01 +02:00
|
|
|
static int deflate_post_process_hd_entry(nghttp2_hd_entry *ent,
|
|
|
|
size_t index,
|
|
|
|
uint8_t **buf_ptr,
|
|
|
|
size_t *buflen_ptr,
|
|
|
|
size_t *offset_ptr)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
if((ent->flags & NGHTTP2_HD_FLAG_REFSET) &&
|
|
|
|
(ent->flags & NGHTTP2_HD_FLAG_IMPLICIT_EMIT) == 0 &&
|
|
|
|
(ent->flags & NGHTTP2_HD_FLAG_EMIT) == 0) {
|
|
|
|
/* This entry is not present in the current header set and must
|
|
|
|
be removed. */
|
|
|
|
ent->flags ^= NGHTTP2_HD_FLAG_REFSET;
|
|
|
|
rv = emit_indexed_block(buf_ptr, buflen_ptr, offset_ptr, index);
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ent->flags &= ~(NGHTTP2_HD_FLAG_EMIT | NGHTTP2_HD_FLAG_IMPLICIT_EMIT);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
ssize_t nghttp2_hd_deflate_hd(nghttp2_hd_deflater *deflater,
|
2013-07-19 09:50:31 +02:00
|
|
|
uint8_t **buf_ptr, size_t *buflen_ptr,
|
|
|
|
size_t nv_offset,
|
|
|
|
nghttp2_nv *nv, size_t nvlen)
|
|
|
|
{
|
2013-09-06 14:53:28 +02:00
|
|
|
size_t i, offset;
|
2013-07-25 18:34:28 +02:00
|
|
|
int rv = 0;
|
2014-01-26 09:53:04 +01:00
|
|
|
if(deflater->ctx.bad) {
|
2013-07-25 18:34:28 +02:00
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
2013-07-19 09:50:31 +02:00
|
|
|
offset = nv_offset;
|
2013-11-16 09:05:18 +01:00
|
|
|
if(deflater->no_refset) {
|
|
|
|
rv = emit_indexed0(buf_ptr, buflen_ptr, &offset);
|
|
|
|
if(rv != 0) {
|
|
|
|
goto fail;
|
|
|
|
}
|
2014-01-26 09:53:04 +01:00
|
|
|
clear_refset(&deflater->ctx);
|
2013-11-16 09:05:18 +01:00
|
|
|
}
|
2013-09-06 14:53:28 +02:00
|
|
|
for(i = 0; i < nvlen; ++i) {
|
2013-08-24 15:58:26 +02:00
|
|
|
rv = deflate_nv(deflater, buf_ptr, buflen_ptr, &offset, &nv[i]);
|
|
|
|
if(rv != 0) {
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
2014-01-26 09:53:04 +01:00
|
|
|
for(i = 0; i < deflater->ctx.deflate_hd_tablelen; ++i) {
|
|
|
|
nghttp2_hd_entry *ent = nghttp2_hd_ringbuf_get(&deflater->ctx.hd_table, i);
|
2013-10-12 14:49:01 +02:00
|
|
|
rv = deflate_post_process_hd_entry(ent, i, buf_ptr, buflen_ptr, &offset);
|
|
|
|
if(rv != 0) {
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
2013-07-19 09:50:31 +02:00
|
|
|
return offset - nv_offset;
|
2013-07-25 18:34:28 +02:00
|
|
|
fail:
|
2014-01-26 09:53:04 +01:00
|
|
|
deflater->ctx.bad = 1;
|
2013-07-25 18:34:28 +02:00
|
|
|
return rv;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
static void hd_inflate_set_huffman_encoded(nghttp2_hd_inflater *inflater,
|
2014-01-25 10:24:15 +01:00
|
|
|
const uint8_t *in)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->huffman_encoded = (*in & (1 << 7)) != 0;
|
|
|
|
}
|
2014-01-16 15:41:13 +01:00
|
|
|
|
2014-01-25 10:24:15 +01:00
|
|
|
/*
|
|
|
|
* Decodes the integer from the range [in, last). The result is
|
|
|
|
* assigned to |inflater->left|. If the |inflater->left| is 0, then
|
|
|
|
* it performs variable integer decoding from scratch. Otherwise, it
|
|
|
|
* uses the |inflater->left| as the initial value and continues to
|
|
|
|
* decode assuming that [in, last) begins with intermediary sequence.
|
|
|
|
*
|
|
|
|
* This function returns the number of bytes read if it succeeds, or
|
|
|
|
* one of the following negative error codes:
|
|
|
|
*
|
|
|
|
* NGHTTP2_ERR_HEADER_COMP
|
|
|
|
* Integer decoding failed
|
|
|
|
*/
|
2014-01-26 09:53:04 +01:00
|
|
|
static ssize_t hd_inflate_read_len(nghttp2_hd_inflater *inflater,
|
2014-01-25 10:24:15 +01:00
|
|
|
int *rfin,
|
|
|
|
uint8_t *in, uint8_t *last,
|
|
|
|
int prefix, size_t maxlen)
|
|
|
|
{
|
|
|
|
uint8_t *nin;
|
|
|
|
*rfin = 0;
|
|
|
|
nin = decode_length(&inflater->left, rfin, inflater->left, in, last, prefix);
|
|
|
|
if(inflater->left == -1) {
|
|
|
|
DEBUGF(fprintf(stderr, "invalid integer\n"));
|
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
|
|
|
if((size_t)inflater->left > maxlen) {
|
|
|
|
DEBUGF(fprintf(stderr, "integer exceeds the maximum value %zu\n", maxlen));
|
2013-07-25 18:34:28 +02:00
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
return nin - in;
|
|
|
|
}
|
2014-01-16 15:41:13 +01:00
|
|
|
|
2014-01-25 10:24:15 +01:00
|
|
|
/*
|
|
|
|
* Reads |inflater->left| bytes from the range [in, last) and performs
|
|
|
|
* huffman decoding against them and pushes the result into the
|
|
|
|
* |buffer|.
|
|
|
|
*
|
|
|
|
* This function returns the number of bytes read if it succeeds, or
|
|
|
|
* one of the following negative error codes:
|
|
|
|
*
|
|
|
|
* NGHTTP2_ERR_NOMEM
|
|
|
|
* Out of memory
|
|
|
|
* NGHTTP2_ERR_HEADER_COMP
|
|
|
|
* Huffman decoding failed
|
|
|
|
*/
|
2014-01-26 09:53:04 +01:00
|
|
|
static ssize_t hd_inflate_read_huff(nghttp2_hd_inflater *inflater,
|
2014-01-25 10:24:15 +01:00
|
|
|
nghttp2_buffer *buffer,
|
|
|
|
uint8_t *in, uint8_t *last)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
int final = 0;
|
|
|
|
if(last - in >= inflater->left) {
|
|
|
|
last = in + inflater->left;
|
|
|
|
final = 1;
|
|
|
|
}
|
|
|
|
rv = nghttp2_hd_huff_decode(&inflater->huff_decode_ctx, buffer,
|
|
|
|
in, last - in, final);
|
|
|
|
if(rv == NGHTTP2_ERR_BUFFER_ERROR) {
|
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
|
|
|
if(rv < 0) {
|
|
|
|
DEBUGF(fprintf(stderr, "huffman decoding failed\n"));
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
inflater->left -= rv;
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Reads |inflater->left| bytes from the range [in, last) and copies
|
|
|
|
* them into the |buffer|.
|
|
|
|
*
|
|
|
|
* This function returns the number of bytes read if it succeeds, or
|
|
|
|
* one of the following negative error codes:
|
|
|
|
*
|
|
|
|
* NGHTTP2_ERR_NOMEM
|
|
|
|
* Out of memory
|
|
|
|
* NGHTTP2_ERR_HEADER_COMP
|
|
|
|
* Header decompression failed
|
|
|
|
*/
|
2014-01-26 09:53:04 +01:00
|
|
|
static ssize_t hd_inflate_read(nghttp2_hd_inflater *inflater,
|
2014-01-25 10:24:15 +01:00
|
|
|
nghttp2_buffer *buffer,
|
|
|
|
uint8_t *in, uint8_t *last)
|
|
|
|
{
|
|
|
|
int rv;
|
|
|
|
size_t len = nghttp2_min(last - in, inflater->left);
|
|
|
|
rv = nghttp2_buffer_add(buffer, in, len);
|
|
|
|
if(rv == NGHTTP2_ERR_BUFFER_ERROR) {
|
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
|
|
|
if(rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
inflater->left -= len;
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Finalize indexed header representation reception. If header is
|
|
|
|
* emitted, |*nv_out| is filled with that value and 0 is returned. If
|
|
|
|
* no header is emitted, 1 is returned.
|
|
|
|
*
|
|
|
|
* This function returns either 0 or 1 if it succeeds, or one of the
|
|
|
|
* following negative error codes:
|
|
|
|
*
|
|
|
|
* NGHTTP2_ERR_NOMEM
|
|
|
|
* Out of memory
|
|
|
|
*/
|
2014-01-26 09:53:04 +01:00
|
|
|
static int hd_inflate_commit_indexed(nghttp2_hd_inflater *inflater,
|
2014-01-25 10:24:15 +01:00
|
|
|
nghttp2_nv *nv_out)
|
|
|
|
{
|
2014-01-26 09:53:04 +01:00
|
|
|
nghttp2_hd_entry *ent = nghttp2_hd_table_get(&inflater->ctx, inflater->index);
|
|
|
|
if(inflater->index >= inflater->ctx.hd_table.len) {
|
2014-01-25 10:24:15 +01:00
|
|
|
nghttp2_hd_entry *new_ent;
|
2014-01-26 09:53:04 +01:00
|
|
|
new_ent = add_hd_table_incremental(&inflater->ctx, NULL, NULL, NULL,
|
2014-01-25 10:24:15 +01:00
|
|
|
&ent->nv, NGHTTP2_HD_FLAG_NONE);
|
|
|
|
if(!new_ent) {
|
|
|
|
return NGHTTP2_ERR_NOMEM;
|
|
|
|
}
|
|
|
|
/* new_ent->ref == 0 may be hold */
|
2014-01-26 09:53:04 +01:00
|
|
|
emit_indexed_header(nv_out, new_ent);
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->ent_keep = new_ent;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
ent->flags ^= NGHTTP2_HD_FLAG_REFSET;
|
|
|
|
if(ent->flags & NGHTTP2_HD_FLAG_REFSET) {
|
2014-01-26 09:53:04 +01:00
|
|
|
emit_indexed_header(nv_out, ent);
|
2014-01-25 10:24:15 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
DEBUGF(fprintf(stderr, "Toggle off item:\n"));
|
|
|
|
DEBUGF(fwrite(ent->nv.name, ent->nv.namelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, ": "));
|
|
|
|
DEBUGF(fwrite(ent->nv.value, ent->nv.valuelen, 1, stderr));
|
|
|
|
DEBUGF(fprintf(stderr, "\n"));
|
|
|
|
return 1;
|
|
|
|
}
|
2014-01-16 15:41:13 +01:00
|
|
|
|
2014-01-25 10:24:15 +01:00
|
|
|
/*
|
|
|
|
* Finalize literal header representation - new name- reception. If
|
|
|
|
* header is emitted, |*nv_out| is filled with that value and 0 is
|
|
|
|
* returned.
|
|
|
|
*
|
|
|
|
* This function returns 0 if it succeeds, or one of the following
|
|
|
|
* negative error codes:
|
|
|
|
*
|
|
|
|
* NGHTTP2_ERR_NOMEM
|
|
|
|
* Out of memory
|
|
|
|
*/
|
2014-01-26 09:53:04 +01:00
|
|
|
static int hd_inflate_commit_newname(nghttp2_hd_inflater *inflater,
|
2014-01-25 10:24:15 +01:00
|
|
|
nghttp2_nv *nv_out)
|
|
|
|
{
|
|
|
|
nghttp2_nv nv = {
|
|
|
|
inflater->namebuf.buf,
|
|
|
|
inflater->valuebuf.buf,
|
|
|
|
inflater->namebuf.len,
|
|
|
|
inflater->valuebuf.len
|
|
|
|
};
|
|
|
|
if(inflater->index_required) {
|
|
|
|
nghttp2_hd_entry *new_ent;
|
|
|
|
uint8_t ent_flags =
|
|
|
|
NGHTTP2_HD_FLAG_NAME_ALLOC | NGHTTP2_HD_FLAG_VALUE_ALLOC |
|
|
|
|
NGHTTP2_HD_FLAG_NAME_GIFT | NGHTTP2_HD_FLAG_VALUE_GIFT;
|
2014-01-26 09:53:04 +01:00
|
|
|
new_ent = add_hd_table_incremental(&inflater->ctx, NULL, NULL, NULL, &nv,
|
2014-01-25 10:24:15 +01:00
|
|
|
ent_flags);
|
|
|
|
if(new_ent) {
|
|
|
|
nghttp2_buffer_release(&inflater->namebuf);
|
|
|
|
nghttp2_buffer_release(&inflater->valuebuf);
|
2014-01-26 09:53:04 +01:00
|
|
|
emit_indexed_header(nv_out, new_ent);
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->ent_keep = new_ent;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return NGHTTP2_ERR_NOMEM;
|
|
|
|
}
|
2014-01-26 09:53:04 +01:00
|
|
|
emit_newname_header(nv_out, &nv);
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->name_keep = inflater->namebuf.buf;
|
|
|
|
nghttp2_buffer_release(&inflater->namebuf);
|
|
|
|
inflater->value_keep = inflater->valuebuf.buf;
|
|
|
|
nghttp2_buffer_release(&inflater->valuebuf);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Finalize literal header representation - indexed name-
|
|
|
|
* reception. If header is emitted, |*nv_out| is filled with that
|
|
|
|
* value and 0 is returned.
|
|
|
|
*
|
|
|
|
* This function returns 0 if it succeeds, or one of the following
|
|
|
|
* negative error codes:
|
|
|
|
*
|
|
|
|
* NGHTTP2_ERR_NOMEM
|
|
|
|
* Out of memory
|
|
|
|
*/
|
2014-01-26 09:53:04 +01:00
|
|
|
static int hd_inflate_commit_indname(nghttp2_hd_inflater *inflater,
|
2014-01-25 10:24:15 +01:00
|
|
|
nghttp2_nv *nv_out)
|
|
|
|
{
|
|
|
|
if(inflater->index_required) {
|
|
|
|
nghttp2_nv nv;
|
|
|
|
nghttp2_hd_entry *new_ent;
|
|
|
|
uint8_t ent_flags = NGHTTP2_HD_FLAG_VALUE_ALLOC |
|
|
|
|
NGHTTP2_HD_FLAG_VALUE_GIFT;
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
if(inflater->index < inflater->ctx.hd_table.len) {
|
2014-01-25 10:24:15 +01:00
|
|
|
ent_flags |= NGHTTP2_HD_FLAG_NAME_ALLOC;
|
|
|
|
}
|
|
|
|
++inflater->ent_name->ref;
|
|
|
|
nv.name = inflater->ent_name->nv.name;
|
|
|
|
nv.namelen = inflater->ent_name->nv.namelen;
|
|
|
|
nv.value = inflater->valuebuf.buf;
|
|
|
|
nv.valuelen = inflater->valuebuf.len;
|
2014-01-26 09:53:04 +01:00
|
|
|
new_ent = add_hd_table_incremental(&inflater->ctx, NULL, NULL, NULL, &nv,
|
2014-01-25 10:24:15 +01:00
|
|
|
ent_flags);
|
|
|
|
if(--inflater->ent_name->ref == 0) {
|
|
|
|
nghttp2_hd_entry_free(inflater->ent_name);
|
|
|
|
free(inflater->ent_name);
|
|
|
|
}
|
|
|
|
inflater->ent_name = NULL;
|
|
|
|
if(new_ent) {
|
|
|
|
nghttp2_buffer_release(&inflater->valuebuf);
|
2014-01-26 09:53:04 +01:00
|
|
|
emit_indexed_header(nv_out, new_ent);
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->ent_keep = new_ent;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return NGHTTP2_ERR_NOMEM;
|
|
|
|
}
|
2014-01-26 09:53:04 +01:00
|
|
|
emit_indname_header(nv_out, inflater->ent_name,
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->valuebuf.buf, inflater->valuebuf.len);
|
|
|
|
inflater->value_keep = inflater->valuebuf.buf;
|
|
|
|
nghttp2_buffer_release(&inflater->valuebuf);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t guess_huff_decode_len(size_t encode_len)
|
|
|
|
{
|
|
|
|
return encode_len * 3 / 2;
|
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
ssize_t nghttp2_hd_inflate_hd(nghttp2_hd_inflater *inflater,
|
2014-01-25 10:24:15 +01:00
|
|
|
nghttp2_nv *nv_out, int *inflate_flags,
|
|
|
|
uint8_t *in, size_t inlen, int in_final)
|
|
|
|
{
|
|
|
|
ssize_t rv = 0;
|
|
|
|
uint8_t *first = in;
|
|
|
|
uint8_t *last = in + inlen;
|
|
|
|
int rfin = 0;
|
|
|
|
|
2014-02-26 15:20:52 +01:00
|
|
|
if(inflater->ctx.bad) {
|
|
|
|
return NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
}
|
|
|
|
|
2014-01-25 10:24:15 +01:00
|
|
|
DEBUGF(fprintf(stderr, "nghtp2_hd_infalte_hd start state=%d\n",
|
|
|
|
inflater->state));
|
2014-02-13 15:26:09 +01:00
|
|
|
hd_inflate_keep_free(inflater);
|
2014-01-25 10:24:15 +01:00
|
|
|
*inflate_flags = NGHTTP2_HD_INFLATE_NONE;
|
2013-07-19 09:50:31 +02:00
|
|
|
for(; in != last;) {
|
2014-01-25 10:24:15 +01:00
|
|
|
switch(inflater->state) {
|
|
|
|
case NGHTTP2_HD_STATE_OPCODE:
|
|
|
|
if(*in & 0x80u) {
|
|
|
|
DEBUGF(fprintf(stderr, "Indexed repr\n"));
|
|
|
|
inflater->opcode = NGHTTP2_HD_OPCODE_INDEXED;
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_READ_INDEX;
|
|
|
|
} else {
|
|
|
|
if(*in == 0x40 || *in == 0) {
|
|
|
|
DEBUGF(fprintf(stderr, "Literal header repr - new name\n"));
|
|
|
|
inflater->opcode = NGHTTP2_HD_OPCODE_NEWNAME;
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_NEWNAME_CHECK_NAMELEN;
|
|
|
|
} else {
|
|
|
|
DEBUGF(fprintf(stderr, "Literal header repr - indexed name\n"));
|
|
|
|
inflater->opcode = NGHTTP2_HD_OPCODE_INDNAME;
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_READ_INDEX;
|
|
|
|
}
|
|
|
|
inflater->index_required = (*in & 0x40) == 0;
|
|
|
|
DEBUGF(fprintf(stderr, "indexing required=%d\n",
|
|
|
|
inflater->index_required != 0));
|
|
|
|
if(inflater->opcode == NGHTTP2_HD_OPCODE_NEWNAME) {
|
|
|
|
++in;
|
|
|
|
}
|
2013-11-16 09:05:18 +01:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->left = 0;
|
|
|
|
break;
|
|
|
|
case NGHTTP2_HD_STATE_READ_INDEX:
|
|
|
|
rfin = 0;
|
|
|
|
rv = hd_inflate_read_len(inflater, &rfin, in, last,
|
|
|
|
inflater->opcode == NGHTTP2_HD_OPCODE_INDEXED ?
|
|
|
|
7 : 6,
|
2014-01-26 09:53:04 +01:00
|
|
|
get_max_index(&inflater->ctx) + 1);
|
2014-01-25 10:24:15 +01:00
|
|
|
if(rv < 0) {
|
2013-08-22 18:28:01 +02:00
|
|
|
goto fail;
|
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
in += rv;
|
|
|
|
if(!rfin) {
|
|
|
|
return in - first;
|
|
|
|
}
|
|
|
|
DEBUGF(fprintf(stderr, "index=%zd\n", inflater->left));
|
|
|
|
if(inflater->opcode == NGHTTP2_HD_OPCODE_INDEXED) {
|
|
|
|
inflater->index = inflater->left;
|
|
|
|
if(inflater->index == 0) {
|
|
|
|
DEBUGF(fprintf(stderr, "Clearing reference set\n"));
|
2014-01-26 09:53:04 +01:00
|
|
|
clear_refset(&inflater->ctx);
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_OPCODE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
--inflater->index;
|
|
|
|
rv = hd_inflate_commit_indexed(inflater, nv_out);
|
|
|
|
if(rv < 0) {
|
2013-07-25 18:34:28 +02:00
|
|
|
goto fail;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_OPCODE;
|
|
|
|
/* If rv == 1, no header was emitted */
|
|
|
|
if(rv == 0) {
|
|
|
|
*inflate_flags |= NGHTTP2_HD_INFLATE_EMIT;
|
2014-01-16 15:41:13 +01:00
|
|
|
return in - first;
|
2013-10-24 14:52:02 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
} else {
|
|
|
|
inflater->index = inflater->left;
|
2014-02-26 15:20:52 +01:00
|
|
|
assert(inflater->index > 0);
|
2014-01-25 10:24:15 +01:00
|
|
|
--inflater->index;
|
2014-01-26 09:53:04 +01:00
|
|
|
inflater->ent_name = nghttp2_hd_table_get(&inflater->ctx,
|
|
|
|
inflater->index);
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_CHECK_VALUELEN;
|
2013-10-24 14:52:02 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
break;
|
|
|
|
case NGHTTP2_HD_STATE_NEWNAME_CHECK_NAMELEN:
|
|
|
|
hd_inflate_set_huffman_encoded(inflater, in);
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_NEWNAME_READ_NAMELEN;
|
|
|
|
inflater->left = 0;
|
|
|
|
DEBUGF(fprintf(stderr, "huffman encoded=%d\n",
|
|
|
|
inflater->huffman_encoded != 0));
|
|
|
|
/* Fall through */
|
|
|
|
case NGHTTP2_HD_STATE_NEWNAME_READ_NAMELEN:
|
|
|
|
rfin = 0;
|
|
|
|
rv = hd_inflate_read_len(inflater, &rfin, in, last, 7,
|
|
|
|
NGHTTP2_HD_MAX_NAME);
|
|
|
|
if(rv < 0) {
|
2013-07-25 18:34:28 +02:00
|
|
|
goto fail;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
in += rv;
|
|
|
|
if(!rfin) {
|
|
|
|
DEBUGF(fprintf(stderr, "integer not fully decoded. current=%zd\n",
|
|
|
|
inflater->left));
|
|
|
|
return in - first;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
rv = 0;
|
|
|
|
if(inflater->huffman_encoded) {
|
|
|
|
nghttp2_hd_huff_decode_context_init(&inflater->huff_decode_ctx,
|
2014-01-26 09:53:04 +01:00
|
|
|
inflater->ctx.side);
|
2014-01-25 10:24:15 +01:00
|
|
|
rv = nghttp2_buffer_reserve(&inflater->namebuf,
|
|
|
|
guess_huff_decode_len(inflater->left));
|
|
|
|
if(rv != 0) {
|
2013-10-20 16:59:15 +02:00
|
|
|
goto fail;
|
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_NEWNAME_READ_NAMEHUFF;
|
2013-10-20 16:59:15 +02:00
|
|
|
} else {
|
2014-01-25 10:24:15 +01:00
|
|
|
rv = nghttp2_buffer_reserve(&inflater->namebuf, inflater->left);
|
|
|
|
if(rv != 0) {
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_NEWNAME_READ_NAME;
|
2013-08-25 10:39:29 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
break;
|
|
|
|
case NGHTTP2_HD_STATE_NEWNAME_READ_NAMEHUFF:
|
|
|
|
rv = hd_inflate_read_huff(inflater, &inflater->namebuf, in, last);
|
|
|
|
if(rv < 0) {
|
2013-10-20 16:59:15 +02:00
|
|
|
goto fail;
|
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
in += rv;
|
|
|
|
DEBUGF(fprintf(stderr, "%zd bytes read\n", rv));
|
|
|
|
if(inflater->left) {
|
|
|
|
DEBUGF(fprintf(stderr, "still %zd bytes to go\n", inflater->left));
|
|
|
|
return in - first;
|
|
|
|
}
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_CHECK_VALUELEN;
|
|
|
|
break;
|
|
|
|
case NGHTTP2_HD_STATE_NEWNAME_READ_NAME:
|
|
|
|
rv = hd_inflate_read(inflater, &inflater->namebuf, in, last);
|
|
|
|
if(rv < 0) {
|
2013-07-25 18:34:28 +02:00
|
|
|
goto fail;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
in += rv;
|
|
|
|
DEBUGF(fprintf(stderr, "%zd bytes read\n", rv));
|
|
|
|
if(inflater->left) {
|
|
|
|
DEBUGF(fprintf(stderr, "still %zd bytes to go\n", inflater->left));
|
|
|
|
return in - first;
|
2013-10-14 16:38:12 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_CHECK_VALUELEN;
|
|
|
|
break;
|
|
|
|
case NGHTTP2_HD_STATE_CHECK_VALUELEN:
|
|
|
|
hd_inflate_set_huffman_encoded(inflater, in);
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_READ_VALUELEN;
|
|
|
|
inflater->left = 0;
|
|
|
|
DEBUGF(fprintf(stderr, "huffman encoded=%d\n",
|
|
|
|
inflater->huffman_encoded != 0));
|
|
|
|
/* Fall through */
|
|
|
|
case NGHTTP2_HD_STATE_READ_VALUELEN:
|
|
|
|
rfin = 0;
|
|
|
|
rv = hd_inflate_read_len(inflater, &rfin, in, last, 7,
|
|
|
|
NGHTTP2_HD_MAX_VALUE);
|
|
|
|
if(rv < 0) {
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
in += rv;
|
|
|
|
if(!rfin) {
|
|
|
|
return in - first;
|
|
|
|
}
|
|
|
|
DEBUGF(fprintf(stderr, "valuelen=%zd\n", inflater->left));
|
|
|
|
if(inflater->left == 0) {
|
|
|
|
if(inflater->opcode == NGHTTP2_HD_OPCODE_NEWNAME) {
|
|
|
|
rv = hd_inflate_commit_newname(inflater, nv_out);
|
|
|
|
} else {
|
|
|
|
rv = hd_inflate_commit_indname(inflater, nv_out);
|
2013-10-20 16:59:15 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
if(rv != 0) {
|
|
|
|
goto fail;
|
2013-10-20 16:59:15 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_OPCODE;
|
|
|
|
*inflate_flags |= NGHTTP2_HD_INFLATE_EMIT;
|
2014-01-16 15:41:13 +01:00
|
|
|
return in - first;
|
2014-01-25 10:24:15 +01:00
|
|
|
}
|
|
|
|
if(inflater->huffman_encoded) {
|
|
|
|
nghttp2_hd_huff_decode_context_init(&inflater->huff_decode_ctx,
|
2014-01-26 09:53:04 +01:00
|
|
|
inflater->ctx.side);
|
2014-01-25 10:24:15 +01:00
|
|
|
rv = nghttp2_buffer_reserve(&inflater->valuebuf,
|
|
|
|
guess_huff_decode_len(inflater->left));
|
|
|
|
inflater->state = NGHTTP2_HD_STATE_READ_VALUEHUFF;
|
2013-07-19 09:50:31 +02:00
|
|
|
} else {
|
2014-01-25 10:24:15 +01:00
|
|
|
rv = nghttp2_buffer_reserve(&inflater->valuebuf, inflater->left);
|
|
|
|
if(rv != 0) {
|
|
|
|
goto fail;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_READ_VALUE;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
break;
|
|
|
|
case NGHTTP2_HD_STATE_READ_VALUEHUFF:
|
|
|
|
rv = hd_inflate_read_huff(inflater, &inflater->valuebuf, in, last);
|
|
|
|
if(rv < 0) {
|
2013-07-25 18:34:28 +02:00
|
|
|
goto fail;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
in += rv;
|
|
|
|
DEBUGF(fprintf(stderr, "%zd bytes read\n", rv));
|
|
|
|
if(inflater->left) {
|
|
|
|
DEBUGF(fprintf(stderr, "still %zd bytes to go\n", inflater->left));
|
|
|
|
return in - first;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
if(inflater->opcode == NGHTTP2_HD_OPCODE_NEWNAME) {
|
|
|
|
rv = hd_inflate_commit_newname(inflater, nv_out);
|
|
|
|
} else {
|
|
|
|
rv = hd_inflate_commit_indname(inflater, nv_out);
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
if(rv != 0) {
|
2013-07-25 18:34:28 +02:00
|
|
|
goto fail;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_OPCODE;
|
|
|
|
*inflate_flags |= NGHTTP2_HD_INFLATE_EMIT;
|
|
|
|
return in - first;
|
|
|
|
case NGHTTP2_HD_STATE_READ_VALUE:
|
|
|
|
rv = hd_inflate_read(inflater, &inflater->valuebuf, in, last);
|
|
|
|
if(rv < 0) {
|
|
|
|
DEBUGF(fprintf(stderr, "value read failure %zd: %s\n",
|
|
|
|
rv, nghttp2_strerror(rv)));
|
2013-10-14 16:38:12 +02:00
|
|
|
goto fail;
|
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
in += rv;
|
|
|
|
DEBUGF(fprintf(stderr, "%zd bytes read\n", rv));
|
|
|
|
if(inflater->left) {
|
|
|
|
DEBUGF(fprintf(stderr, "still %zd bytes to go\n", inflater->left));
|
2014-01-16 15:41:13 +01:00
|
|
|
return in - first;
|
2014-01-25 10:24:15 +01:00
|
|
|
}
|
|
|
|
if(inflater->opcode == NGHTTP2_HD_OPCODE_NEWNAME) {
|
|
|
|
rv = hd_inflate_commit_newname(inflater, nv_out);
|
2013-07-19 09:50:31 +02:00
|
|
|
} else {
|
2014-01-25 10:24:15 +01:00
|
|
|
rv = hd_inflate_commit_indname(inflater, nv_out);
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2013-08-28 14:33:57 +02:00
|
|
|
if(rv != 0) {
|
2013-07-25 18:34:28 +02:00
|
|
|
goto fail;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->state = NGHTTP2_HD_STATE_OPCODE;
|
|
|
|
*inflate_flags |= NGHTTP2_HD_INFLATE_EMIT;
|
|
|
|
return in - first;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
assert(in == last);
|
|
|
|
if(in_final) {
|
2014-02-11 08:00:59 +01:00
|
|
|
if(inflater->state != NGHTTP2_HD_STATE_OPCODE) {
|
|
|
|
rv = NGHTTP2_ERR_HEADER_COMP;
|
|
|
|
goto fail;
|
|
|
|
}
|
2014-01-26 09:53:04 +01:00
|
|
|
for(; inflater->end_headers_index < inflater->ctx.hd_table.len;
|
2014-01-25 10:24:15 +01:00
|
|
|
++inflater->end_headers_index) {
|
|
|
|
nghttp2_hd_entry *ent;
|
2014-01-26 09:53:04 +01:00
|
|
|
ent = nghttp2_hd_ringbuf_get(&inflater->ctx.hd_table,
|
2014-01-25 10:24:15 +01:00
|
|
|
inflater->end_headers_index);
|
2014-01-16 15:41:13 +01:00
|
|
|
|
2014-01-25 10:24:15 +01:00
|
|
|
if((ent->flags & NGHTTP2_HD_FLAG_REFSET) &&
|
|
|
|
(ent->flags & NGHTTP2_HD_FLAG_EMIT) == 0) {
|
2014-01-26 09:53:04 +01:00
|
|
|
emit_indexed_header(nv_out, ent);
|
2014-01-25 10:24:15 +01:00
|
|
|
*inflate_flags |= NGHTTP2_HD_INFLATE_EMIT;
|
|
|
|
return in - first;
|
|
|
|
}
|
|
|
|
ent->flags &= ~NGHTTP2_HD_FLAG_EMIT;
|
2013-10-12 14:49:01 +02:00
|
|
|
}
|
2014-01-25 10:24:15 +01:00
|
|
|
*inflate_flags |= NGHTTP2_HD_INFLATE_FINAL;
|
2013-10-12 14:49:01 +02:00
|
|
|
}
|
2014-01-16 15:41:13 +01:00
|
|
|
return in - first;
|
2013-07-25 18:34:28 +02:00
|
|
|
fail:
|
2014-01-26 09:53:04 +01:00
|
|
|
inflater->ctx.bad = 1;
|
2013-07-25 18:34:28 +02:00
|
|
|
return rv;
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
|
2014-01-26 09:53:04 +01:00
|
|
|
int nghttp2_hd_inflate_end_headers(nghttp2_hd_inflater *inflater)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2014-01-16 15:41:13 +01:00
|
|
|
hd_inflate_keep_free(inflater);
|
|
|
|
inflater->end_headers_index = 0;
|
2013-07-19 09:50:31 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int nghttp2_hd_emit_indname_block(uint8_t **buf_ptr, size_t *buflen_ptr,
|
2013-07-26 17:58:38 +02:00
|
|
|
size_t *offset_ptr, size_t index,
|
2013-07-19 09:50:31 +02:00
|
|
|
const uint8_t *value, size_t valuelen,
|
2013-10-14 16:38:12 +02:00
|
|
|
int inc_indexing,
|
|
|
|
nghttp2_hd_side side)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2013-07-19 18:24:34 +02:00
|
|
|
return emit_indname_block(buf_ptr, buflen_ptr, offset_ptr,
|
2013-10-14 16:38:12 +02:00
|
|
|
index, value, valuelen, inc_indexing,
|
|
|
|
side);
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|
|
|
|
|
2013-07-19 18:24:34 +02:00
|
|
|
int nghttp2_hd_emit_newname_block(uint8_t **buf_ptr, size_t *buflen_ptr,
|
2013-07-19 09:50:31 +02:00
|
|
|
size_t *offset_ptr, nghttp2_nv *nv,
|
2013-10-14 16:38:12 +02:00
|
|
|
int inc_indexing,
|
|
|
|
nghttp2_hd_side side)
|
2013-07-19 09:50:31 +02:00
|
|
|
{
|
2013-10-14 16:38:12 +02:00
|
|
|
return emit_newname_block(buf_ptr, buflen_ptr, offset_ptr, nv, inc_indexing,
|
|
|
|
side);
|
2013-07-19 09:50:31 +02:00
|
|
|
}
|