| | varnish-cache/lib/libvarnish/vsb.c |
0 |
|
/*- |
1 |
|
* Copyright (c) 2000-2008 Poul-Henning Kamp <phk@FreeBSD.org> |
2 |
|
* Copyright (c) 2000-2008 Dag-Erling Coïdan Smørgrav |
3 |
|
* All rights reserved. |
4 |
|
* |
5 |
|
* SPDX-License-Identifier: BSD-2-Clause-FreeBSD |
6 |
|
* |
7 |
|
* Redistribution and use in source and binary forms, with or without |
8 |
|
* modification, are permitted provided that the following conditions |
9 |
|
* are met: |
10 |
|
* 1. Redistributions of source code must retain the above copyright |
11 |
|
* notice, this list of conditions and the following disclaimer |
12 |
|
* in this position and unchanged. |
13 |
|
* 2. Redistributions in binary form must reproduce the above copyright |
14 |
|
* notice, this list of conditions and the following disclaimer in the |
15 |
|
* documentation and/or other materials provided with the distribution. |
16 |
|
* |
17 |
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND |
18 |
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
19 |
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
20 |
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
21 |
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
22 |
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
23 |
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
24 |
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
25 |
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
26 |
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
27 |
|
* SUCH DAMAGE. |
28 |
|
__FBSDID("$FreeBSD: head/sys/kern/subr_vsb.c 222004 2011-05-17 06:36:32Z phk $") |
29 |
|
*/ |
30 |
|
|
31 |
|
#include "config.h" |
32 |
|
|
33 |
|
#include <ctype.h> |
34 |
|
#include <stdarg.h> |
35 |
|
#include <stdio.h> |
36 |
|
#include <stdint.h> |
37 |
|
#include <stdlib.h> |
38 |
|
#include <string.h> |
39 |
|
#include <unistd.h> |
40 |
|
|
41 |
|
#include "vdef.h" |
42 |
|
#include "vas.h" // XXX Flexelint "not used" - but req'ed for assert() |
43 |
|
#include "vsb.h" |
44 |
|
|
45 |
|
#define KASSERT(e, m) assert(e) |
46 |
|
#define SBMALLOC(size) malloc(size) |
47 |
|
#define SBFREE(buf) free(buf) |
48 |
|
|
49 |
|
#define rndup2(x, y) (((x)+((y)-1))&(~((y)-1))) /* if y is powers of two */ |
50 |
|
|
51 |
|
/* |
52 |
|
* Predicates |
53 |
|
*/ |
54 |
|
#define VSB_ISDYNAMIC(s) ((s)->s_flags & VSB_DYNAMIC) |
55 |
|
#define VSB_ISDYNSTRUCT(s) ((s)->s_flags & VSB_DYNSTRUCT) |
56 |
|
#define VSB_HASROOM(s) ((s)->s_len < (s)->s_size - 1L) |
57 |
|
#define VSB_FREESPACE(s) ((s)->s_size - ((s)->s_len + 1L)) |
58 |
|
#define VSB_CANEXTEND(s) ((s)->s_flags & VSB_AUTOEXTEND) |
59 |
|
|
60 |
|
/* |
61 |
|
* Set / clear flags |
62 |
|
*/ |
63 |
|
#define VSB_SETFLAG(s, f) do { (s)->s_flags |= (f); } while (0) |
64 |
|
#define VSB_CLEARFLAG(s, f) do { (s)->s_flags &= ~(f); } while (0) |
65 |
|
|
66 |
|
#define VSB_MINEXTENDSIZE 16 /* Should be power of 2. */ |
67 |
|
|
68 |
|
#ifdef PAGE_SIZE |
69 |
|
#define VSB_MAXEXTENDSIZE PAGE_SIZE |
70 |
|
#define VSB_MAXEXTENDINCR PAGE_SIZE |
71 |
|
#else |
72 |
|
#define VSB_MAXEXTENDSIZE 4096 |
73 |
|
#define VSB_MAXEXTENDINCR 4096 |
74 |
|
#endif |
75 |
|
|
76 |
|
/* |
77 |
|
* Debugging support |
78 |
|
*/ |
79 |
|
#if !defined(NDEBUG) |
80 |
|
static void |
81 |
2855434049 |
_assert_VSB_integrity(const char *fun, const struct vsb *s) |
82 |
|
{ |
83 |
|
|
84 |
2855434049 |
(void)fun; |
85 |
2855434049 |
(void)s; |
86 |
2855434049 |
KASSERT(s != NULL, |
87 |
|
("%s called with a NULL vsb pointer", fun)); |
88 |
2855434049 |
KASSERT(s->magic == VSB_MAGIC, |
89 |
|
("%s called with a bogus vsb pointer", fun)); |
90 |
2855434049 |
KASSERT(s->s_buf != NULL, |
91 |
|
("%s called with uninitialized or corrupt vsb", fun)); |
92 |
2855434049 |
KASSERT(s->s_len < s->s_size, |
93 |
|
("wrote past end of vsb (%d >= %d)", s->s_len, s->s_size)); |
94 |
2855434049 |
} |
95 |
|
|
96 |
|
static void |
97 |
2681548569 |
_assert_VSB_state(const char *fun, const struct vsb *s, int state) |
98 |
|
{ |
99 |
|
|
100 |
2681548569 |
(void)fun; |
101 |
2681548569 |
(void)s; |
102 |
2681548569 |
(void)state; |
103 |
2681548569 |
KASSERT((s->s_flags & VSB_FINISHED) == state, |
104 |
|
("%s called with %sfinished or corrupt vsb", fun, |
105 |
|
(state ? "un" : ""))); |
106 |
2681548569 |
} |
107 |
|
#define assert_VSB_integrity(s) _assert_VSB_integrity(__func__, (s)) |
108 |
|
#define assert_VSB_state(s, i) _assert_VSB_state(__func__, (s), (i)) |
109 |
|
#else |
110 |
|
#define assert_VSB_integrity(s) do { } while (0) |
111 |
|
#define assert_VSB_state(s, i) do { } while (0) |
112 |
|
#endif |
113 |
|
|
114 |
|
#ifdef CTASSERT |
115 |
|
CTASSERT(powerof2(VSB_MAXEXTENDSIZE)); |
116 |
|
CTASSERT(powerof2(VSB_MAXEXTENDINCR)); |
117 |
|
#endif |
118 |
|
|
119 |
|
static ssize_t |
120 |
129858811 |
VSB_extendsize(ssize_t size) |
121 |
|
{ |
122 |
|
ssize_t newsize; |
123 |
|
|
124 |
129858811 |
if (size < (int)VSB_MAXEXTENDSIZE) { |
125 |
128401130 |
newsize = VSB_MINEXTENDSIZE; |
126 |
307000220 |
while (newsize < size) |
127 |
178599090 |
newsize *= 2; |
128 |
128401130 |
} else { |
129 |
1457681 |
newsize = rndup2(size, VSB_MAXEXTENDINCR); |
130 |
|
} |
131 |
129858811 |
KASSERT(newsize >= size, ("%s: %d < %d\n", __func__, newsize, size)); |
132 |
129858811 |
return (newsize); |
133 |
|
} |
134 |
|
|
135 |
|
/* |
136 |
|
* Extend an vsb. |
137 |
|
*/ |
138 |
|
static ssize_t |
139 |
74585628 |
VSB_extend(struct vsb *s, ssize_t addlen) |
140 |
|
{ |
141 |
|
char *newbuf; |
142 |
|
ssize_t newsize; |
143 |
|
|
144 |
74585628 |
if (!VSB_CANEXTEND(s)) |
145 |
1320 |
return (-1); |
146 |
74584308 |
newsize = VSB_extendsize(s->s_size + addlen); |
147 |
74584308 |
if (VSB_ISDYNAMIC(s)) |
148 |
74584308 |
newbuf = realloc(s->s_buf, newsize); |
149 |
|
else |
150 |
0 |
newbuf = SBMALLOC(newsize); |
151 |
74584308 |
if (newbuf == NULL) |
152 |
0 |
return (-1); |
153 |
74584308 |
if (!VSB_ISDYNAMIC(s)) { |
154 |
0 |
memcpy(newbuf, s->s_buf, s->s_size); |
155 |
0 |
VSB_SETFLAG(s, VSB_DYNAMIC); |
156 |
0 |
} |
157 |
74584308 |
s->s_buf = newbuf; |
158 |
74584308 |
s->s_size = newsize; |
159 |
74584308 |
return (0); |
160 |
74585628 |
} |
161 |
|
|
162 |
|
static void |
163 |
2351557646 |
_vsb_indent(struct vsb *s) |
164 |
|
{ |
165 |
2355420910 |
if (s->s_indent == 0 || s->s_error != 0 || |
166 |
3863264 |
(s->s_len > 0 && s->s_buf[s->s_len - 1] != '\n')) |
167 |
2351278309 |
return; |
168 |
279337 |
if (VSB_FREESPACE(s) <= s->s_indent && |
169 |
372 |
VSB_extend(s, s->s_indent) < 0) { |
170 |
0 |
s->s_error = ENOMEM; |
171 |
0 |
return; |
172 |
|
} |
173 |
279337 |
memset(s->s_buf + s->s_len, ' ', s->s_indent); |
174 |
279337 |
s->s_len += s->s_indent; |
175 |
2351557646 |
} |
176 |
|
|
177 |
|
/* |
178 |
|
* Initialize the internals of an vsb. |
179 |
|
* If buf is non-NULL, it points to a static or already-allocated string |
180 |
|
* big enough to hold at least length characters. |
181 |
|
*/ |
182 |
|
static struct vsb * |
183 |
56504539 |
VSB_newbuf(struct vsb *s, char *buf, int length, int flags) |
184 |
|
{ |
185 |
|
|
186 |
56504539 |
memset(s, 0, sizeof(*s)); |
187 |
56504539 |
s->magic = VSB_MAGIC; |
188 |
56504539 |
s->s_flags = flags; |
189 |
56504539 |
s->s_size = length; |
190 |
56504539 |
s->s_buf = buf; |
191 |
|
|
192 |
56504539 |
if ((s->s_flags & VSB_AUTOEXTEND) == 0) { |
193 |
1229981 |
KASSERT(s->s_size > 1, |
194 |
|
("attempt to create a too small vsb")); |
195 |
1229981 |
} |
196 |
|
|
197 |
56504539 |
if (s->s_buf != NULL) |
198 |
1229985 |
return (s); |
199 |
|
|
200 |
55274554 |
if ((flags & VSB_AUTOEXTEND) != 0) |
201 |
55274530 |
s->s_size = VSB_extendsize(s->s_size); |
202 |
|
|
203 |
55274554 |
s->s_buf = SBMALLOC(s->s_size); |
204 |
55274554 |
if (s->s_buf == NULL) |
205 |
0 |
return (NULL); |
206 |
55274526 |
VSB_SETFLAG(s, VSB_DYNAMIC); |
207 |
55274526 |
return (s); |
208 |
56504511 |
} |
209 |
|
|
210 |
|
struct vsb * |
211 |
1229996 |
VSB_init(struct vsb *s, void *buf, ssize_t length) |
212 |
|
{ |
213 |
1229996 |
AN(s); |
214 |
1229996 |
AN(buf); |
215 |
|
|
216 |
1229996 |
KASSERT(length >= 0, |
217 |
|
("attempt to create an vsb of negative length (%zd)", length)); |
218 |
1229996 |
return (VSB_newbuf(s, buf, length, VSB_FIXEDLEN)); |
219 |
|
} |
220 |
|
|
221 |
|
/* |
222 |
|
* Allocate a dynamic vsb |
223 |
|
*/ |
224 |
|
struct vsb * |
225 |
55274528 |
VSB_new_auto(void) |
226 |
|
{ |
227 |
|
struct vsb *s; |
228 |
|
|
229 |
55274528 |
s = SBMALLOC(sizeof(*s)); |
230 |
55274528 |
if (s == NULL) |
231 |
0 |
return (NULL); |
232 |
55274528 |
if (VSB_newbuf(s, NULL, 0, VSB_AUTOEXTEND) == NULL) { |
233 |
0 |
SBFREE(s); |
234 |
0 |
return (NULL); |
235 |
|
} |
236 |
55274528 |
VSB_SETFLAG(s, VSB_DYNSTRUCT); |
237 |
55274528 |
return (s); |
238 |
55274528 |
} |
239 |
|
|
240 |
|
/* |
241 |
|
* Clear an vsb and reset its position. |
242 |
|
*/ |
243 |
|
void |
244 |
85762793 |
VSB_clear(struct vsb *s) |
245 |
|
{ |
246 |
|
|
247 |
85762793 |
assert_VSB_integrity(s); |
248 |
|
/* don't care if it's finished or not */ |
249 |
|
|
250 |
85762793 |
VSB_CLEARFLAG(s, VSB_FINISHED); |
251 |
85762793 |
s->s_error = 0; |
252 |
85762793 |
s->s_len = 0; |
253 |
85762793 |
s->s_indent = 0; |
254 |
85762793 |
} |
255 |
|
|
256 |
|
/* |
257 |
|
* Append a byte to an vsb. This is the core function for appending |
258 |
|
* to an vsb and is the main place that deals with extending the |
259 |
|
* buffer and marking overflow. |
260 |
|
*/ |
261 |
|
static void |
262 |
1799277356 |
VSB_put_byte(struct vsb *s, int c) |
263 |
|
{ |
264 |
|
|
265 |
1799277356 |
assert_VSB_integrity(s); |
266 |
1799277356 |
assert_VSB_state(s, 0); |
267 |
|
|
268 |
1799277356 |
if (s->s_error != 0) |
269 |
0 |
return; |
270 |
1799277356 |
_vsb_indent(s); |
271 |
1799277356 |
if (VSB_FREESPACE(s) <= 0) { |
272 |
17410799 |
if (VSB_extend(s, 1) < 0) |
273 |
0 |
s->s_error = ENOMEM; |
274 |
17410799 |
if (s->s_error != 0) |
275 |
0 |
return; |
276 |
17410799 |
} |
277 |
1799277356 |
s->s_buf[s->s_len++] = (char)c; |
278 |
1799277356 |
} |
279 |
|
|
280 |
|
/* |
281 |
|
* Append a byte string to an vsb. |
282 |
|
*/ |
283 |
|
int |
284 |
109856588 |
VSB_bcat(struct vsb *s, const void *buf, ssize_t len) |
285 |
|
{ |
286 |
109856588 |
assert_VSB_integrity(s); |
287 |
109856588 |
assert_VSB_state(s, 0); |
288 |
|
|
289 |
109856588 |
assert(len >= 0); |
290 |
109856588 |
if (s->s_error != 0) |
291 |
0 |
return (-1); |
292 |
109856588 |
if (len == 0) |
293 |
6428065 |
return (0); |
294 |
103428523 |
_vsb_indent(s); |
295 |
103428523 |
if (len > VSB_FREESPACE(s)) { |
296 |
20278326 |
if (VSB_extend(s, len - VSB_FREESPACE(s)) < 0) |
297 |
320 |
s->s_error = ENOMEM; |
298 |
20278326 |
if (s->s_error != 0) |
299 |
320 |
return (-1); |
300 |
20278006 |
} |
301 |
103428203 |
memcpy(s->s_buf + s->s_len, buf, len); |
302 |
103428203 |
s->s_len += len; |
303 |
103428203 |
return (0); |
304 |
109856588 |
} |
305 |
|
|
306 |
|
/* |
307 |
|
* Append a string to an vsb. |
308 |
|
*/ |
309 |
|
int |
310 |
100808890 |
VSB_cat(struct vsb *s, const char *str) |
311 |
|
{ |
312 |
|
const char *nl; |
313 |
|
size_t l; |
314 |
|
|
315 |
100808890 |
assert_VSB_integrity(s); |
316 |
100808890 |
assert_VSB_state(s, 0); |
317 |
100808890 |
KASSERT(str != NULL, |
318 |
|
("%s called with a NULL str pointer", __func__)); |
319 |
|
|
320 |
100808890 |
if (s->s_error != 0) |
321 |
200 |
return (-1); |
322 |
|
|
323 |
100848939 |
while (s->s_indent > 0 && (nl = strchr(str, '\n')) != NULL) { |
324 |
40249 |
l = (nl - str) + 1; |
325 |
40249 |
if (VSB_bcat(s, str, l) < 0) |
326 |
0 |
return (-1); |
327 |
40249 |
str += l; |
328 |
|
} |
329 |
|
|
330 |
100808690 |
l = strlen(str); |
331 |
100808690 |
return (VSB_bcat(s, str, l)); |
332 |
100808890 |
} |
333 |
|
|
334 |
|
/* |
335 |
|
* Format the given argument list and append the resulting string to an vsb. |
336 |
|
*/ |
337 |
|
int |
338 |
449077444 |
VSB_vprintf(struct vsb *s, const char *fmt, va_list ap) |
339 |
|
{ |
340 |
|
va_list ap_copy; |
341 |
|
int len; |
342 |
|
|
343 |
449077444 |
assert_VSB_integrity(s); |
344 |
449077444 |
assert_VSB_state(s, 0); |
345 |
|
|
346 |
449077444 |
KASSERT(fmt != NULL, |
347 |
|
("%s called with a NULL format string", __func__)); |
348 |
|
|
349 |
449077444 |
if (s->s_error != 0) |
350 |
0 |
return (-1); |
351 |
449077444 |
_vsb_indent(s); |
352 |
|
|
353 |
|
/* |
354 |
|
* For the moment, there is no way to get vsnprintf(3) to hand |
355 |
|
* back a character at a time, to push everything into |
356 |
|
* VSB_putc_func() as was done for the kernel. |
357 |
|
* |
358 |
|
* In userspace, while drains are useful, there's generally |
359 |
|
* not a problem attempting to malloc(3) on out of space. So |
360 |
|
* expand a userland vsb if there is not enough room for the |
361 |
|
* data produced by VSB_[v]printf(3). |
362 |
|
*/ |
363 |
|
|
364 |
449077444 |
do { |
365 |
485971859 |
va_copy(ap_copy, ap); |
366 |
971943718 |
len = vsnprintf(&s->s_buf[s->s_len], VSB_FREESPACE(s) + 1, |
367 |
485971859 |
fmt, ap_copy); |
368 |
485971859 |
va_end(ap_copy); |
369 |
485971859 |
if (len < 0) { |
370 |
0 |
s->s_error = errno; |
371 |
0 |
return (-1); |
372 |
|
} |
373 |
522868081 |
} while (len > VSB_FREESPACE(s) && |
374 |
36896222 |
VSB_extend(s, len - VSB_FREESPACE(s)) == 0); |
375 |
|
|
376 |
|
/* |
377 |
|
* s->s_len is the length of the string, without the terminating nul. |
378 |
|
* When updating s->s_len, we must subtract 1 from the length that |
379 |
|
* we passed into vsnprintf() because that length includes the |
380 |
|
* terminating nul. |
381 |
|
* |
382 |
|
* vsnprintf() returns the amount that would have been copied, |
383 |
|
* given sufficient space, so don't over-increment s_len. |
384 |
|
*/ |
385 |
449077444 |
s->s_len += vmin_t(ssize_t, len, VSB_FREESPACE(s)); |
386 |
449077444 |
if (!VSB_HASROOM(s) && !VSB_CANEXTEND(s)) |
387 |
1000 |
s->s_error = ENOMEM; |
388 |
|
|
389 |
449077444 |
KASSERT(s->s_len < s->s_size, |
390 |
|
("wrote past end of vsb (%d >= %d)", s->s_len, s->s_size)); |
391 |
|
|
392 |
449077444 |
if (s->s_error != 0) |
393 |
1066 |
return (-1); |
394 |
449076394 |
return (0); |
395 |
449077460 |
} |
396 |
|
|
397 |
|
/* |
398 |
|
* Format the given arguments and append the resulting string to an vsb. |
399 |
|
*/ |
400 |
|
int |
401 |
243017883 |
VSB_printf(struct vsb *s, const char *fmt, ...) |
402 |
|
{ |
403 |
|
va_list ap; |
404 |
|
int result; |
405 |
|
|
406 |
243017883 |
va_start(ap, fmt); |
407 |
243017883 |
result = VSB_vprintf(s, fmt, ap); |
408 |
243017883 |
va_end(ap); |
409 |
243017883 |
return (result); |
410 |
|
} |
411 |
|
|
412 |
|
/* |
413 |
|
* Append a character to an vsb. |
414 |
|
*/ |
415 |
|
int |
416 |
1799291575 |
VSB_putc(struct vsb *s, int c) |
417 |
|
{ |
418 |
|
|
419 |
1799291575 |
VSB_put_byte(s, c); |
420 |
1799291575 |
if (s->s_error != 0) |
421 |
0 |
return (-1); |
422 |
1799291575 |
return (0); |
423 |
1799291575 |
} |
424 |
|
|
425 |
|
/* |
426 |
|
* Check if an vsb has an error. |
427 |
|
*/ |
428 |
|
int |
429 |
48548 |
VSB_error(const struct vsb *s) |
430 |
|
{ |
431 |
|
|
432 |
48548 |
return (s->s_error); |
433 |
|
} |
434 |
|
|
435 |
|
/* |
436 |
|
* Finish off an vsb. |
437 |
|
*/ |
438 |
|
int |
439 |
108445765 |
VSB_finish(struct vsb *s) |
440 |
|
{ |
441 |
|
|
442 |
108445765 |
assert_VSB_integrity(s); |
443 |
108445765 |
assert_VSB_state(s, 0); |
444 |
|
|
445 |
108445765 |
s->s_buf[s->s_len] = '\0'; |
446 |
108445765 |
VSB_SETFLAG(s, VSB_FINISHED); |
447 |
108445765 |
errno = s->s_error; |
448 |
108445765 |
if (s->s_error) |
449 |
1320 |
return (-1); |
450 |
108444445 |
return (0); |
451 |
108445765 |
} |
452 |
|
|
453 |
|
/* |
454 |
|
* Return a pointer to the vsb data. |
455 |
|
*/ |
456 |
|
char * |
457 |
111972555 |
VSB_data(const struct vsb *s) |
458 |
|
{ |
459 |
|
|
460 |
111972555 |
assert_VSB_integrity(s); |
461 |
111972555 |
assert_VSB_state(s, VSB_FINISHED); |
462 |
|
|
463 |
111972555 |
return (s->s_buf); |
464 |
|
} |
465 |
|
|
466 |
|
/* |
467 |
|
* Return the length of the vsb data. |
468 |
|
*/ |
469 |
|
ssize_t |
470 |
41347310 |
VSB_len(const struct vsb *s) |
471 |
|
{ |
472 |
|
|
473 |
41347310 |
assert_VSB_integrity(s); |
474 |
|
/* don't care if it's finished or not */ |
475 |
|
|
476 |
41347310 |
if (s->s_error != 0) |
477 |
0 |
return (-1); |
478 |
41347310 |
return (s->s_len); |
479 |
41347310 |
} |
480 |
|
|
481 |
|
void |
482 |
1193030 |
VSB_fini(struct vsb *s) |
483 |
|
{ |
484 |
|
|
485 |
1193030 |
assert_VSB_integrity(s); |
486 |
1193030 |
assert(!VSB_ISDYNAMIC(s)); |
487 |
1193030 |
assert(!VSB_ISDYNSTRUCT(s)); |
488 |
1193030 |
memset(s, 0, sizeof(*s)); |
489 |
1193030 |
} |
490 |
|
|
491 |
|
void |
492 |
45786121 |
VSB_destroy(struct vsb **s) |
493 |
|
{ |
494 |
|
|
495 |
45786121 |
AN(s); |
496 |
45786121 |
assert_VSB_integrity(*s); |
497 |
45786121 |
assert(VSB_ISDYNAMIC(*s)); |
498 |
45786121 |
assert(VSB_ISDYNSTRUCT(*s)); |
499 |
45786121 |
SBFREE((*s)->s_buf); |
500 |
45786121 |
memset(*s, 0, sizeof(**s)); |
501 |
45786121 |
SBFREE(*s); |
502 |
45786121 |
*s = NULL; |
503 |
45786121 |
} |
504 |
|
|
505 |
|
/* |
506 |
|
* Quote a string |
507 |
|
*/ |
508 |
|
|
509 |
|
static void |
510 |
154978 |
vsb_quote_hex(struct vsb *s, const uint8_t *u, size_t len) |
511 |
|
{ |
512 |
|
const uint8_t *w; |
513 |
|
|
514 |
154978 |
VSB_cat(s, "0x"); |
515 |
371765 |
for (w = u; w < u + len; w++) |
516 |
349490 |
if (*w != 0x00) |
517 |
132703 |
break; |
518 |
154978 |
if (w == u + len && len > 4) { |
519 |
680 |
VSB_cat(s, "0...0"); |
520 |
680 |
} else { |
521 |
26679994 |
for (w = u; w < u + len; w++) |
522 |
26525696 |
VSB_printf(s, "%02x", *w); |
523 |
|
} |
524 |
154978 |
} |
525 |
|
|
526 |
|
void |
527 |
9943299 |
VSB_quote_pfx(struct vsb *s, const char *pfx, const void *v, int len, int how) |
528 |
|
{ |
529 |
9943299 |
const uint8_t *p = v; |
530 |
|
const uint8_t *q; |
531 |
9943299 |
int quote = 0; |
532 |
|
int nl; |
533 |
|
|
534 |
9943299 |
nl = how & |
535 |
|
(VSB_QUOTE_JSON|VSB_QUOTE_HEX|VSB_QUOTE_CSTR|VSB_QUOTE_UNSAFE); |
536 |
9943299 |
AZ(nl & (nl - 1)); // Only one bit can be set |
537 |
|
|
538 |
9943299 |
if (how & VSB_QUOTE_ESCHEX) |
539 |
4706966 |
AZ(how & (VSB_QUOTE_JSON|VSB_QUOTE_HEX)); |
540 |
|
|
541 |
9943299 |
if (how & VSB_QUOTE_UNSAFE) |
542 |
4695727 |
how |= VSB_QUOTE_NONL; |
543 |
|
|
544 |
9943299 |
assert(p != NULL); |
545 |
9943299 |
if (len == -1) |
546 |
4771481 |
len = strlen(v); |
547 |
|
|
548 |
9943299 |
if (len == 0 && (how & VSB_QUOTE_CSTR)) { |
549 |
8160 |
VSB_printf(s, "%s\"\"", pfx); |
550 |
8160 |
if ((how & VSB_QUOTE_NONL)) |
551 |
0 |
VSB_putc(s, '\n'); |
552 |
8160 |
} |
553 |
|
|
554 |
9943299 |
if (len == 0) |
555 |
322998 |
return; |
556 |
|
|
557 |
9620301 |
VSB_cat(s, pfx); |
558 |
|
|
559 |
9620301 |
if (how & VSB_QUOTE_HEX) { |
560 |
154978 |
vsb_quote_hex(s, v, len); |
561 |
154978 |
if (how & VSB_QUOTE_NONL) |
562 |
40 |
VSB_putc(s, '\n'); |
563 |
154978 |
return; |
564 |
|
} |
565 |
|
|
566 |
9465323 |
if (how & VSB_QUOTE_CSTR) |
567 |
4448550 |
VSB_putc(s, '"'); |
568 |
|
|
569 |
199649319 |
for (q = p; q < p + len; q++) { |
570 |
|
if ( |
571 |
193028976 |
*q < 0x20 || |
572 |
190452405 |
*q == '"' || |
573 |
190418654 |
*q == '\\' || |
574 |
190410292 |
(*q == '?' && (how & VSB_QUOTE_CSTR)) || |
575 |
190183996 |
(*q > 0x7e && !(how & VSB_QUOTE_JSON)) |
576 |
|
) { |
577 |
2839705 |
quote++; |
578 |
2839705 |
break; |
579 |
|
} |
580 |
190183996 |
} |
581 |
|
|
582 |
9465323 |
if (!quote) { |
583 |
6625623 |
VSB_bcat(s, p, len); |
584 |
6625623 |
if ((how & VSB_QUOTE_NONL) && |
585 |
3043055 |
p[len-1] != '\n') |
586 |
3043052 |
(void)VSB_putc(s, '\n'); |
587 |
6625627 |
if (how & VSB_QUOTE_CSTR) |
588 |
3022110 |
VSB_putc(s, '"'); |
589 |
6625627 |
return; |
590 |
|
} |
591 |
|
|
592 |
2839700 |
nl = 0; |
593 |
628760981 |
for (q = p; q < p + len; q++) { |
594 |
625921281 |
if (nl) |
595 |
6510175 |
VSB_cat(s, pfx); |
596 |
625921281 |
nl = 0; |
597 |
625921281 |
switch (*q) { |
598 |
|
case '?': |
599 |
|
/* Avoid C Trigraph insanity */ |
600 |
950454 |
if (how & VSB_QUOTE_CSTR && !(how & VSB_QUOTE_JSON)) |
601 |
318880 |
(void)VSB_putc(s, '\\'); |
602 |
950454 |
(void)VSB_putc(s, *q); |
603 |
950454 |
break; |
604 |
|
case '\\': |
605 |
|
case '"': |
606 |
6315174 |
if (!(how & VSB_QUOTE_UNSAFE)) |
607 |
4160966 |
(void)VSB_putc(s, '\\'); |
608 |
6315174 |
(void)VSB_putc(s, *q); |
609 |
6315174 |
break; |
610 |
|
case '\n': |
611 |
26065015 |
if (how & VSB_QUOTE_CSTR) { |
612 |
18202120 |
VSB_printf(s, "\\n\"\n%s\"", pfx); |
613 |
26065015 |
} else if (how & VSB_QUOTE_JSON) { |
614 |
58120 |
VSB_cat(s, "\\n"); |
615 |
7862895 |
} else if (how & VSB_QUOTE_NONL) { |
616 |
7804255 |
VSB_putc(s, *q); |
617 |
7804255 |
nl = 1; |
618 |
7804255 |
} else { |
619 |
520 |
VSB_cat(s, "\\n"); |
620 |
|
} |
621 |
26065015 |
break; |
622 |
|
case '\r': |
623 |
3132730 |
VSB_cat(s, "\\r"); |
624 |
3132730 |
break; |
625 |
|
case '\t': |
626 |
8638043 |
VSB_cat(s, "\\t"); |
627 |
8638043 |
break; |
628 |
|
default: |
629 |
580819865 |
if (0x20 <= *q && *q <= 0x7e) |
630 |
580467329 |
VSB_putc(s, *q); |
631 |
352536 |
else if (*q > 0x7e && (how & VSB_QUOTE_JSON)) |
632 |
160 |
VSB_putc(s, *q); |
633 |
352376 |
else if (how & VSB_QUOTE_JSON) |
634 |
280 |
VSB_printf(s, "\\u%04x", *q); |
635 |
352096 |
else if (how & VSB_QUOTE_ESCHEX) |
636 |
349536 |
VSB_printf(s, "\\x%02x", *q); |
637 |
|
else |
638 |
2560 |
VSB_printf(s, "\\%03o", *q); |
639 |
580819865 |
break; |
640 |
|
} |
641 |
625921281 |
} |
642 |
2839700 |
if (how & VSB_QUOTE_CSTR) |
643 |
1426440 |
VSB_putc(s, '"'); |
644 |
2839700 |
if ((how & VSB_QUOTE_NONL) && !nl) |
645 |
103170 |
VSB_putc(s, '\n'); |
646 |
9943303 |
} |
647 |
|
|
648 |
|
void |
649 |
5086766 |
VSB_quote(struct vsb *s, const void *v, int len, int how) |
650 |
|
{ |
651 |
5086766 |
VSB_quote_pfx(s, "", v, len, how); |
652 |
5086766 |
} |
653 |
|
|
654 |
|
/* |
655 |
|
* Indentation |
656 |
|
*/ |
657 |
|
|
658 |
|
void |
659 |
95552 |
VSB_indent(struct vsb *s, int i) |
660 |
|
{ |
661 |
|
|
662 |
95552 |
assert_VSB_integrity(s); |
663 |
95552 |
if (s->s_indent + i < 0) |
664 |
0 |
s->s_error = EINVAL; |
665 |
|
else |
666 |
95552 |
s->s_indent += i; |
667 |
95552 |
} |
668 |
|
|
669 |
|
int |
670 |
2693257 |
VSB_tofile(const struct vsb *s, int fd) |
671 |
|
{ |
672 |
|
const char *p; |
673 |
|
ssize_t r; |
674 |
|
size_t sz; |
675 |
|
|
676 |
2693257 |
assert_VSB_integrity(s); |
677 |
2693257 |
assert_VSB_state(s, VSB_FINISHED); |
678 |
2693257 |
assert(s->s_len >= 0); |
679 |
2693257 |
r = 0; |
680 |
2693257 |
p = s->s_buf; |
681 |
2693257 |
sz = (typeof(sz))s->s_len; |
682 |
5386126 |
while (sz > 0) { |
683 |
2693138 |
r = write(fd, p, sz); |
684 |
2693138 |
if (r < 0) |
685 |
269 |
return (-1); |
686 |
2692869 |
assert((typeof(sz))r <= sz); |
687 |
2692869 |
p += r; |
688 |
2692869 |
sz -= r; |
689 |
|
} |
690 |
2692988 |
return (0); |
691 |
2693257 |
} |