2 * Copyright (c) 2012 Samsung Electronics Co., Ltd All Rights Reserved
4 * Licensed under the Apache License, Version 2.0 (the License);
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an AS IS BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
22 #include "download-agent-debug.h"
23 #include "download-agent-mime-util.h"
24 #include "download-agent-pthread.h"
26 #define IS_PROHIBITED_CHAR(c) ((c) == '/' || (c) == '\\' || (c) == '?' || (c) == '%' || (c) == '*' || (c) == ':' || (c) == '|' || (c) == '"' || (c) == '<' || (c) == '>')
27 #define IS_SPACE_CHARACTER(c) ((c) == '\t')
29 #define MAX_EXT_NAME_LEN 12
30 #define MAX_EXT_TABLE_INDEX 18
31 Ext_translation_table ext_trans_table[MAX_EXT_TABLE_INDEX] = {
37 {"*.jpe", "*.jpg"},//5
42 {"CMakeLists.txt", "*.cmake"},//10
44 {"Makefile", "makefile"},
47 {"*.divx", "*.avi"},//15
51 /* This is samsung mime policy
52 * 1. if the mime is audio/m4a, the extension name is defined as "m4a" for launching music player
54 #ifdef _SAMSUNG_MIME_POLICY
55 #define MAX_SEC_MIME_TABLE_INDEX 1
56 struct sec_mime_table_t {
60 struct sec_mime_table_t sec_mime_table[MAX_SEC_MIME_TABLE_INDEX] = {
65 const char *ambiguous_MIME_Type_list[] = {
67 "application/octet-stream"
70 /* Because xdgmime is not thread safety, this mutex is necessary */
71 pthread_mutex_t mutex_for_xdgmime = PTHREAD_MUTEX_INITIALIZER;
73 da_bool_t is_ambiguous_MIME_Type(const char *in_mime_type)
79 int list_size = sizeof(ambiguous_MIME_Type_list) / sizeof(const char *);
80 for (index = 0 ; index < list_size ; index++) {
81 if (0 == strncmp(in_mime_type, ambiguous_MIME_Type_list[index],
82 strlen(ambiguous_MIME_Type_list[index]))) {
83 //DA_SECURE_LOGD("It is ambiguous! [%s]", ambiguous_MIME_Type_list[index]);
91 da_ret_t da_mime_get_ext_name(char *mime, char **ext)
93 da_ret_t ret = DA_RESULT_OK;
94 const char **extlist = DA_NULL;
95 const char *unaliased_mimetype = DA_NULL;
96 char ext_temp[DA_MAX_STR_LEN] = {0,};
101 if (DA_NULL == mime || DA_NULL == ext) {
102 ret = DA_ERR_INVALID_ARGUMENT;
103 DA_LOGE("Invalid mime type");
106 // DA_SECURE_LOGD("mime str[%s]ptr[%p]len[%d]",mime,mime,strlen(mime));
107 /* unaliased_mimetype means representative mime among similar types */
108 DA_MUTEX_LOCK(&mutex_for_xdgmime);
109 unaliased_mimetype = xdg_mime_unalias_mime_type(mime);
111 if (unaliased_mimetype == DA_NULL) {
112 ret = DA_ERR_INVALID_MIME_TYPE;
113 DA_LOGI("Invalid mime type : No unsaliased mime type");
114 DA_MUTEX_UNLOCK(&mutex_for_xdgmime);
117 DA_SECURE_LOGD("unaliased_mimetype[%s]\n", unaliased_mimetype);
119 /* Get extension name from shared-mime-info */
120 extlist = xdg_mime_get_file_names_from_mime_type(unaliased_mimetype);
121 DA_MUTEX_UNLOCK(&mutex_for_xdgmime);
122 if (extlist == DA_NULL || *extlist == DA_NULL) {
124 ret = DA_ERR_INVALID_MIME_TYPE;
125 DA_LOGV("No extension list");
126 #ifdef _SAMSUNG_MIME_POLICY
127 for (i = 0; i < MAX_SEC_MIME_TABLE_INDEX; i++) {
128 if (strncmp(sec_mime_table[i].mime, mime, strlen(mime)) == 0) {
129 strncpy(ext_temp, sec_mime_table[i].ext, DA_MAX_STR_LEN-1);
135 } else { /* For drm case, this else statement is needed */
136 strncpy(ext_temp, *extlist, DA_MAX_STR_LEN - 1);
137 /* If only one extension name is existed, don't enter here */
138 while (*extlist != NULL) {
140 /* If there are existed many extension names,
141 * try to search common extension name from table
142 * with first mime type at extension list*/
143 for (i = 0; i < MAX_EXT_TABLE_INDEX; i++) {
144 if (strncmp(ext_trans_table[i].standard, *extlist,
145 strlen(*extlist)) == 0) {
146 memset(ext_temp, 0x00, DA_MAX_STR_LEN);
147 strncpy(ext_temp, ext_trans_table[i].normal, DA_MAX_STR_LEN-1);
151 DA_LOGV("index[%d]\n", i);
152 /* If there is a mime at extension transform table */
153 if (i < MAX_EXT_TABLE_INDEX)
159 if (strlen(ext_temp) < 1) {
160 /* If there is no mime string for OMA descriptor mime type */
161 if (strncmp(DD_MIME_STR, mime, strlen(DD_MIME_STR)) == 0) {
162 strncpy(ext_temp, DD_EXT_STR, DA_MAX_STR_LEN - 1);
164 /* If there is no extension name for "applicaion/vnd.oma.drm.messeages"
165 * at shared-mime-info*/
166 } else if (strncmp(DRM_MIME_MSG_STR, mime, strlen(DRM_MIME_MSG_STR)) ==
168 strncpy(ext_temp, DRM_EXT_STR, DA_MAX_STR_LEN - 1);
169 /* If there is extension name at extlist, the return value can have an error.*/
172 ret = DA_ERR_INVALID_MIME_TYPE;
173 DA_LOGI("Invalid mime type : no extension name at list");
176 if (ret != DA_RESULT_OK)
179 temp = strchr(ext_temp, '.');
185 DA_SECURE_LOGD("final extension name:[%s]", temp);
186 *ext = (char*)calloc(1, strlen(temp) + 1);
187 if (*ext != DA_NULL) {
188 strncpy(*ext, temp, strlen(temp));
190 ret = DA_ERR_FAIL_TO_MEMALLOC ;
197 da_bool_t da_get_extension_name_from_url(char *url, char **ext)
199 da_bool_t ret = DA_TRUE;
200 char *buff = DA_NULL;
201 char *temp_str = DA_NULL;
206 if (DA_NULL == url || DA_NULL == ext) {
208 DA_LOGE("Invalid Argument");
212 if ((temp_str = strrchr(url, '/'))) {
213 if ((buff = strrchr(temp_str, '.'))) {
217 /* check to exist "?" after extension name */
218 q = strrchr(buff, '?');
220 buf_len = strlen(buff) - strlen(q);
222 buf_len = strlen(buff);
224 /* check extention length refer to https://en.wikipedia.org/wiki/List_of_filename_extensions */
225 if (buf_len > MAX_EXT_NAME_LEN)
228 *ext = (char*) calloc(1, buf_len + 1) ;
230 if (DA_NULL == *ext) {
232 DA_LOGE("Memory Fail");
235 strncpy(*ext, buff, buf_len);
236 DA_SECURE_LOGD("extention name[%s]", *ext);
248 /* FIXME move this function to another file */
249 da_bool_t da_get_file_name_from_url(char *url, char **name)
251 da_bool_t ret = DA_TRUE;
252 char *buff = DA_NULL;
259 char name_buff[DA_MAX_FILE_NAME_LEN + 1] = {0,};
263 if (DA_NULL == url || DA_NULL == name) {
265 DA_LOGE("Invalid Argument");
269 if (!strstr(url, "http") && !strstr(url, "https")) {
271 DA_LOGE("Invalid Argument");
275 buff = (char*) calloc(1, strlen(url) +1);
276 if (DA_NULL == buff) {
278 DA_LOGE("Memory Fail");
282 while ((c = url[i++]) != 0) {
284 char buffer[3] = {0,};
285 buffer[0] = url[i++];
286 buffer[1] = url[i++];
287 buff[j++] = (char)strtol(buffer, NULL, 16);
292 End = strstr(buff, "?");
293 if (DA_NULL != End) {
295 while (*(Start) != '/')
298 if ((*(Start) == '/') && ((len_name = (End - Start)) > 1)) {
300 if (DA_MAX_FILE_NAME_LEN <= len_name) {
301 strncpy(name_buff, Start, DA_MAX_FILE_NAME_LEN);
302 name_buff[DA_MAX_FILE_NAME_LEN] = '\0';
304 strncpy(name_buff, Start, len_name);
305 name_buff[len_name] = '\0';
309 goto ERR ; /*Name not found*/
312 int urlLen = strlen(buff);
314 Start_pos = urlLen - 1;
316 while (Start_pos > 0) {
317 if (buff[Start_pos] == '/')
322 if (Start_pos == 0 || urlLen - Start_pos <= 0) {
326 while (Start_pos < urlLen) {
327 name_buff[len_name++] = buff[Start_pos++];
328 if (DA_MAX_FILE_NAME_LEN <= len_name) {
329 name_buff[DA_MAX_FILE_NAME_LEN] = '\0';
336 End = strrchr(name_buff, '.');
339 // DA_SECURE_LOGD("file name BEFORE removing prohibited character = %s", name_buff);
340 delete_prohibited_char(name_buff, strlen(name_buff));
341 len_name = strlen(name_buff);
342 *name = (char*) calloc(1, len_name + 1);
344 strncpy(*name, name_buff, len_name);
346 // DA_SECURE_LOGD("Extracted file name : %s", *name);
355 void delete_prohibited_char(char *szTarget, int str_len)
357 char *chk_str = NULL;
362 if (szTarget == NULL || str_len <= 0 || strlen(szTarget) != str_len) {
363 DA_LOGE("Invaild Parameter\n");
367 chk_str = (char *)calloc(1, str_len + 1);
371 while (szTarget[j] != '\0') {
372 if (IS_PROHIBITED_CHAR(szTarget[j]) == DA_FALSE &&
373 IS_SPACE_CHARACTER(szTarget[j]) == DA_FALSE) {
374 chk_str[i] = szTarget[j];
381 tar_len = strlen(chk_str);
386 for (i = 0; i < tar_len; i++)
387 szTarget[i] = chk_str[i];
397 #ifdef _ENABLE_OMA_DRM
398 da_bool_t is_content_drm_dcf(char *content_type)
400 if (content_type == DA_NULL)
403 if (0 == strcmp(content_type, DRM_MIME_CONTENT_STR)) {
404 DA_LOGV("DRM_DM content");
411 da_bool_t is_content_drm_dm(char *content_type)
413 if (content_type == DA_NULL)
416 if (0 == strcmp(content_type, DRM_MIME_MSG_STR)) {
417 DA_LOGV("DRM_DM content");
425 da_ret_t get_extension_from_mime_type(char *mime_type, char **extension)
427 da_ret_t ret = DA_RESULT_OK;
431 if (DA_NULL == mime_type || DA_NULL == extension) {
432 DA_LOGE("received mime_type is null");
433 ret = DA_ERR_INVALID_ARGUMENT;
436 // DA_SECURE_LOGD("input mime type = %s", mime_type);
437 if (DA_RESULT_OK != (ret = da_mime_get_ext_name(mime_type, &ext))) {
438 DA_LOGE("can't find proper extension!");
442 // DA_SECURE_LOGD("found extension = %s", *extension);