nsresult CacheStorageService::DoomStorageEntries(nsCSubstring const& aContextKey, bool aDiskStorage, nsICacheEntryDoomCallback* aCallback) { mLock.AssertCurrentThreadOwns(); NS_ENSURE_TRUE(!mShutdown, NS_ERROR_NOT_INITIALIZED); nsAutoCString memoryStorageID(aContextKey); AppendMemoryStorageID(memoryStorageID); nsAutoPtr<CacheEntryTable> entries; if (aDiskStorage) { LOG((" dooming disk+memory storage of %s", aContextKey.BeginReading())); // Grab all entries in this storage sGlobalEntryTables->RemoveAndForget(aContextKey, entries); // Just remove the memory-only records table sGlobalEntryTables->Remove(memoryStorageID); } else { LOG((" dooming memory-only storage of %s", aContextKey.BeginReading())); // Grab the memory-only records table, EvictionRunnable will safely remove // entries one by one from the master hashtable on the background management // thread. Code at AddStorageEntry ensures a new entry will always replace // memory only entries that EvictionRunnable yet didn't manage to remove. sGlobalEntryTables->RemoveAndForget(memoryStorageID, entries); } nsRefPtr<EvictionRunnable> evict = new EvictionRunnable( aContextKey, entries.forget(), aDiskStorage, aCallback); return Dispatch(evict); }
bool net_IsValidHostName(const nsCSubstring &host) { const char *end = host.EndReading(); // Use explicit whitelists to select which characters we are // willing to send to lower-level DNS logic. This is more // self-documenting, and can also be slightly faster than the // blacklist approach, since DNS names are the common case, and // the commonest characters will tend to be near the start of // the list. // Whitelist for DNS names (RFC 1035) with extra characters added // for pragmatic reasons "$+_" // see https://bugzilla.mozilla.org/show_bug.cgi?id=355181#c2 if (net_FindCharNotInSet(host.BeginReading(), end, "abcdefghijklmnopqrstuvwxyz" ".-0123456789" "ABCDEFGHIJKLMNOPQRSTUVWXYZ$+_") == end) return true; // Might be a valid IPv6 link-local address containing a percent sign nsCAutoString strhost(host); PRNetAddr addr; return PR_StringToNetAddr(strhost.get(), &addr) == PR_SUCCESS; }
static void MorkUnescape(const nsCSubstring &aString, nsCString &aResult) { PRUint32 len = aString.Length(); // We optimize for speed over space here -- size the result buffer to // the size of the source, which is an upper bound on the size of the // unescaped string. // FIXME: Mork assume there will never be errors if (!EnsureStringLength(aResult, len)) { aResult.Truncate(); return; // out of memory. } char *result = aResult.BeginWriting(); const char *source = aString.BeginReading(); const char *sourceEnd = source + len; const char *startPos = nsnull; PRUint32 bytes; for (; source < sourceEnd; ++source) { char c = *source; if (c == '\\') { if (startPos) { bytes = source - startPos; memcpy(result, startPos, bytes); result += bytes; startPos = nsnull; } if (source < sourceEnd - 1) { *(result++) = *(++source); } } else if (c == '$') { if (startPos) { bytes = source - startPos; memcpy(result, startPos, bytes); result += bytes; startPos = nsnull; } if (source < sourceEnd - 2) { // Would be nice to use ToInteger() here, but it currently // requires a null-terminated string. char c2 = *(++source); char c3 = *(++source); if (ConvertChar(&c2) && ConvertChar(&c3)) { *(result++) = ((c2 << 4) | c3); } } } else if (!startPos) { startPos = source; } } if (startPos) { bytes = source - startPos; memcpy(result, startPos, bytes); result += bytes; } aResult.SetLength(result - aResult.BeginReading()); }
void ReverseString(const nsCSubstring& source, nsCSubstring& result) { nsACString::const_iterator sourceBegin, sourceEnd; source.BeginReading(sourceBegin); source.EndReading(sourceEnd); result.SetLength(source.Length()); nsACString::iterator destEnd; result.EndWriting(destEnd); while (sourceBegin != sourceEnd) { *(--destEnd) = *sourceBegin; ++sourceBegin; } }
PRBool IsValidHTTPToken(const nsCSubstring& aToken) { if (aToken.IsEmpty()) { return PR_FALSE; } nsCSubstring::const_char_iterator iter, end; aToken.BeginReading(iter); aToken.EndReading(end); while (iter != end) { if (*iter <= 32 || *iter >= 127 || *iter == '(' || *iter == ')' || *iter == '<' || *iter == '>' || *iter == '@' || *iter == ',' || *iter == ';' || *iter == ':' || *iter == '\\' || *iter == '\"' || *iter == '/' || *iter == '[' || *iter == ']' || *iter == '?' || *iter == '=' || *iter == '{' || *iter == '}') { return PR_FALSE; } ++iter; } return PR_TRUE; }
nsresult NS_DeserializeObject(const nsCSubstring& str, nsISupports** obj) { // Base64 maps 3 binary bytes -> 4 ASCII bytes, so this calculation gives us // the right size. Compare also the comment in plbase64.h. PRUint32 size = (str.Length() * 3) / 4; char* buf = PL_Base64Decode(str.BeginReading(), str.Length(), nsnull); if (!buf) return NS_ERROR_OUT_OF_MEMORY; nsCOMPtr<nsIInputStream> stream; nsresult rv = NS_NewCStringInputStream(getter_AddRefs(stream), Substring(buf, buf + size)); PR_Free(buf); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr<nsIObjectInputStream> objstream = do_CreateInstance("@mozilla.org/binaryinputstream;1"); if (!objstream) return NS_ERROR_OUT_OF_MEMORY; objstream->SetInputStream(stream); return objstream->ReadObject(PR_TRUE, obj); }
nsresult NS_DeserializeObject(const nsCSubstring& str, nsISupports** obj) { // Base64 maps 3 binary bytes -> 4 ASCII bytes. If the original byte array // does not have length 0 mod 3, the input is padded with zeros and the // output is padded with a corresponding number of trailing '=' (which are // then sometimes dropped). To compute the correct length of the original // byte array, we have to subtract the number of trailing '=' and then // multiply by 3 and then divide by 4 (making sure this is an integer // division). PRUint32 size = str.Length(); if (size > 0 && str[size-1] == '=') { if (size > 1 && str[size-2] == '=') { size -= 2; } else { size -= 1; } } size = (size * 3) / 4; char* buf = PL_Base64Decode(str.BeginReading(), str.Length(), nullptr); if (!buf) return NS_ERROR_OUT_OF_MEMORY; nsCOMPtr<nsIInputStream> stream; nsresult rv = NS_NewCStringInputStream(getter_AddRefs(stream), Substring(buf, size)); PR_Free(buf); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr<nsIObjectInputStream> objstream = do_CreateInstance("@mozilla.org/binaryinputstream;1"); if (!objstream) return NS_ERROR_OUT_OF_MEMORY; objstream->SetInputStream(stream); return objstream->ReadObject(true, obj); }
nsresult CacheStorageService::DoomStorageEntries(nsCSubstring const& aContextKey, nsILoadContextInfo* aContext, bool aDiskStorage, nsICacheEntryDoomCallback* aCallback) { mLock.AssertCurrentThreadOwns(); NS_ENSURE_TRUE(!mShutdown, NS_ERROR_NOT_INITIALIZED); nsAutoCString memoryStorageID(aContextKey); AppendMemoryStorageID(memoryStorageID); if (aDiskStorage) { LOG((" dooming disk+memory storage of %s", aContextKey.BeginReading())); // Just remove all entries, CacheFileIOManager will take care of the files. sGlobalEntryTables->Remove(aContextKey); sGlobalEntryTables->Remove(memoryStorageID); if (aContext && !aContext->IsPrivate()) { LOG((" dooming disk entries")); CacheFileIOManager::EvictByContext(aContext); } } else { LOG((" dooming memory-only storage of %s", aContextKey.BeginReading())); class MemoryEntriesRemoval { public: static PLDHashOperator EvictEntry(const nsACString& aKey, CacheEntry* aEntry, void* aClosure) { CacheEntryTable* entries = static_cast<CacheEntryTable*>(aClosure); nsCString key(aKey); RemoveExactEntry(entries, key, aEntry, false); return PL_DHASH_NEXT; } }; // Remove the memory entries table from the global tables. // Since we store memory entries also in the disk entries table // we need to remove the memory entries from the disk table one // by one manually. nsAutoPtr<CacheEntryTable> memoryEntries; sGlobalEntryTables->RemoveAndForget(memoryStorageID, memoryEntries); CacheEntryTable* entries; sGlobalEntryTables->Get(aContextKey, &entries); if (memoryEntries && entries) memoryEntries->EnumerateRead(&MemoryEntriesRemoval::EvictEntry, entries); } // An artificial callback. This is a candidate for removal tho. In the new // cache any 'doom' or 'evict' function ensures that the entry or entries // being doomed is/are not accessible after the function returns. So there is // probably no need for a callback - has no meaning. But for compatibility // with the old cache that is still in the tree we keep the API similar to be // able to make tests as well as other consumers work for now. class Callback : public nsRunnable { public: Callback(nsICacheEntryDoomCallback* aCallback) : mCallback(aCallback) { } NS_IMETHODIMP Run() { mCallback->OnCacheEntryDoomed(NS_OK); return NS_OK; } nsCOMPtr<nsICacheEntryDoomCallback> mCallback; }; if (aCallback) { nsRefPtr<nsRunnable> callback = new Callback(aCallback); return NS_DispatchToCurrentThread(callback); } return NS_OK; }
nsresult CacheStorageService::AddStorageEntry(nsCSubstring const& aContextKey, nsIURI* aURI, const nsACString & aIdExtension, bool aWriteToDisk, bool aCreateIfNotExist, bool aReplace, CacheEntryHandle** aResult) { NS_ENSURE_ARG(aURI); nsresult rv; nsAutoCString entryKey; rv = CacheEntry::HashingKey(EmptyCString(), aIdExtension, aURI, entryKey); NS_ENSURE_SUCCESS(rv, rv); LOG(("CacheStorageService::AddStorageEntry [entryKey=%s, contextKey=%s]", entryKey.get(), aContextKey.BeginReading())); nsRefPtr<CacheEntry> entry; nsRefPtr<CacheEntryHandle> handle; { mozilla::MutexAutoLock lock(mLock); NS_ENSURE_FALSE(mShutdown, NS_ERROR_NOT_INITIALIZED); // Ensure storage table CacheEntryTable* entries; if (!sGlobalEntryTables->Get(aContextKey, &entries)) { entries = new CacheEntryTable(CacheEntryTable::ALL_ENTRIES); sGlobalEntryTables->Put(aContextKey, entries); LOG((" new storage entries table for context %s", aContextKey.BeginReading())); } bool entryExists = entries->Get(entryKey, getter_AddRefs(entry)); // check whether the file is already doomed if (entryExists && entry->IsFileDoomed() && !aReplace) { aReplace = true; } // If truncate is demanded, delete and doom the current entry if (entryExists && aReplace) { entries->Remove(entryKey); LOG((" dooming entry %p for %s because of OPEN_TRUNCATE", entry.get(), entryKey.get())); // On purpose called under the lock to prevent races of doom and open on I/O thread // No need to remove from both memory-only and all-entries tables. The new entry // will overwrite the shadow entry in its ctor. entry->DoomAlreadyRemoved(); entry = nullptr; entryExists = false; } if (entryExists && entry->SetUsingDisk(aWriteToDisk)) { RecordMemoryOnlyEntry(entry, !aWriteToDisk, true /* overwrite */); } // Ensure entry for the particular URL, if not read/only if (!entryExists && (aCreateIfNotExist || aReplace)) { // Entry is not in the hashtable or has just been truncated... entry = new CacheEntry(aContextKey, aURI, aIdExtension, aWriteToDisk); entries->Put(entryKey, entry); LOG((" new entry %p for %s", entry.get(), entryKey.get())); } if (entry) { // Here, if this entry was not for a long time referenced by any consumer, // gets again first 'handles count' reference. handle = entry->NewHandle(); } } handle.forget(aResult); return NS_OK; }
static nsresult rdf_BlockingWrite(nsIOutputStream* stream, const nsCSubstring& s) { return rdf_BlockingWrite(stream, s.BeginReading(), s.Length()); }
nsresult CacheStorageService::AddStorageEntry(nsCSubstring const& aContextKey, nsIURI* aURI, const nsACString & aIdExtension, bool aWriteToDisk, bool aCreateIfNotExist, bool aReplace, CacheEntry** aResult) { NS_ENSURE_ARG(aURI); nsresult rv; nsAutoCString entryKey; rv = CacheEntry::HashingKey(EmptyCString(), aIdExtension, aURI, entryKey); NS_ENSURE_SUCCESS(rv, rv); LOG(("CacheStorageService::AddStorageEntry [entryKey=%s, contextKey=%s]", entryKey.get(), aContextKey.BeginReading())); nsRefPtr<CacheEntry> entry; { mozilla::MutexAutoLock lock(mLock); NS_ENSURE_FALSE(mShutdown, NS_ERROR_NOT_INITIALIZED); // Ensure storage table CacheEntryTable* entries; if (!sGlobalEntryTables->Get(aContextKey, &entries)) { entries = new CacheEntryTable(); sGlobalEntryTables->Put(aContextKey, entries); LOG((" new storage entries table for context %s", aContextKey.BeginReading())); } bool entryExists = entries->Get(entryKey, getter_AddRefs(entry)); // Check entry that is memory-only is also in related memory-only hashtable. // If not, it has been evicted and we will truncate it ; doom is pending for it, // this consumer just made it sooner then the entry has actually been removed // from the master hash table. // (This can be bypassed when entry is about to be replaced anyway.) if (entryExists && !entry->UsingDisk() && !aReplace) { nsAutoCString memoryStorageID(aContextKey); AppendMemoryStorageID(memoryStorageID); CacheEntryTable* memoryEntries; aReplace = sGlobalEntryTables->Get(memoryStorageID, &memoryEntries) && memoryEntries->GetWeak(entryKey) != entry; #ifdef MOZ_LOGGING if (aReplace) { LOG((" memory-only entry %p for %s already doomed, replacing", entry.get(), entryKey.get())); } #endif } // If truncate is demanded, delete and doom the current entry if (entryExists && aReplace) { entries->Remove(entryKey); LOG((" dooming entry %p for %s because of OPEN_TRUNCATE", entry.get(), entryKey.get())); // On purpose called under the lock to prevent races of doom and open on I/O thread entry->DoomAlreadyRemoved(); entry = nullptr; entryExists = false; } if (entryExists && entry->SetUsingDisk(aWriteToDisk)) { RecordMemoryOnlyEntry(entry, !aWriteToDisk, true /* overwrite */); } // Ensure entry for the particular URL, if not read/only if (!entryExists && (aCreateIfNotExist || aReplace)) { // Entry is not in the hashtable or has just been truncated... entry = new CacheEntry(aContextKey, aURI, aIdExtension, aWriteToDisk); entries->Put(entryKey, entry); LOG((" new entry %p for %s", entry.get(), entryKey.get())); } } entry.forget(aResult); return NS_OK; }