Fix deprecated SHA* to EVP_MD* (#473)
[platform/core/dotnet/launcher.git] / NativeLauncher / util / utils.cc
index fff4cfb..9f34fb4 100644 (file)
  */
 
 #include <dirent.h>
+#include <fcntl.h>
 #include <sys/stat.h>
 #include <unistd.h>
 #include <limits.h>
 #include <strings.h>
+#include <pkgmgr_installer_info.h>
+#include <sys/smack.h>
+#include <sys/prctl.h>
+
+#include <openssl/evp.h>
+#include <openssl/crypto.h>
+
+#include <mntent.h>
 
 #include <cstdlib>
 #include <cstring>
 #include <unordered_map>
 #include <vector>
 #include <iterator>
+#include <fstream>
 #include <sstream>
 #include <map>
+#include <iomanip>
 
+#include "log.h"
 #include "utils.h"
 #include "path_manager.h"
 
@@ -43,9 +55,7 @@ static bool iCompare(const std::string& a, int aOffset, const std::string& b, in
 
 bool isManagedAssembly(const std::string& fileName)
 {
-       return (iCompare(fileName, fileName.size()-4, ".dll", 0, 4) ||
-                       iCompare(fileName, fileName.size()-4, ".exe", 0, 4)) &&
-                       !isNativeImage(fileName);
+       return iCompare(fileName, fileName.size()-4, ".dll", 0, 4) && !isNativeImage(fileName);
 }
 
 bool isNativeImage(const std::string& fileName)
@@ -53,18 +63,6 @@ bool isNativeImage(const std::string& fileName)
        return iCompare(fileName, fileName.size()-7, ".ni", 0, 3);
 }
 
-std::string readSelfPath()
-{
-       char buff[PATH_MAX];
-       ssize_t len = ::readlink("/proc/self/exe", buff, sizeof(buff)-1);
-       if (len != -1) {
-               buff[len] = '\0';
-               return std::string(buff);
-       }
-
-       return "";
-}
-
 std::string concatPath(const std::string& path1, const std::string& path2)
 {
        std::string path(path1);
@@ -88,17 +86,188 @@ void splitPath(const std::string& path, std::vector<std::string>& out)
        }
 }
 
-std::string absolutePath(const std::string& path)
+std::string getAbsolutePath(const std::string& path)
 {
        std::string absPath;
-       char realPath[PATH_MAX];
-       if (realpath(path.c_str(), realPath) != nullptr && realPath[0] != '\0')
+       char *realPath = realpath(path.c_str(), NULL);
+       if (realPath) {
                absPath.assign(realPath);
+               free(realPath);
+       }
 
        return absPath;
 }
 
-std::string baseName(const std::string& path)
+std::string getRootPath(const std::string& pkgId)
+{
+       int ret = 0;
+       char *path = 0;
+       std::string rootPath;
+
+       pkgmgrinfo_pkginfo_h pkg_handle;
+       ret = pkgmgrGetPkgInfo(pkgId, &pkg_handle);
+       if (ret != 0) {
+               return rootPath;
+       }
+
+       ret = pkgmgrinfo_pkginfo_get_root_path(pkg_handle, &path);
+       if (ret != PMINFO_R_OK) {
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return rootPath;
+       }
+       rootPath = path;
+       pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+
+       return rootPath;
+}
+
+std::string getExecName(const std::string& pkgId)
+{
+       char *exec = NULL;
+       char *appId = 0;
+       std::string execName;
+
+       pkgmgrinfo_pkginfo_h pkg_handle;
+       int ret = pkgmgrGetPkgInfo(pkgId, &pkg_handle);
+       if (ret != 0) {
+               return execName;
+       }
+
+       ret = pkgmgrinfo_pkginfo_get_mainappid(pkg_handle, &appId);
+       if (ret != PMINFO_R_OK) {
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return execName;
+       }
+
+       pkgmgrinfo_appinfo_h app_handle;
+       ret = pkgmgrGetAppInfo(appId, &app_handle);
+       if (ret != 0) {
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return execName;
+       }
+
+       ret = pkgmgrinfo_appinfo_get_exec(app_handle, &exec);
+       if (ret != PMINFO_R_OK) {
+               pkgmgrinfo_appinfo_destroy_appinfo(app_handle);
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return execName;
+       }
+       execName = std::string(exec).substr(std::string(exec).rfind('/') + 1);
+
+       pkgmgrinfo_appinfo_destroy_appinfo(app_handle);
+       pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+
+       return execName;
+}
+
+std::string getAppType(const std::string& pkgId)
+{
+       char *appId = 0;
+       char *type = 0;
+       std::string appType;
+
+       pkgmgrinfo_pkginfo_h pkg_handle;
+       int ret = pkgmgrGetPkgInfo(pkgId, &pkg_handle);
+       if (ret != 0) {
+               return appType;
+       }
+
+       ret = pkgmgrinfo_pkginfo_get_mainappid(pkg_handle, &appId);
+       if (ret != PMINFO_R_OK) {
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return appType;
+       }
+
+       pkgmgrinfo_appinfo_h app_handle;
+       ret = pkgmgrGetAppInfo(appId, &app_handle);
+       if (ret != 0) {
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return appType;
+       }
+
+       ret = pkgmgrinfo_appinfo_get_apptype(app_handle, &type);
+       if (ret != PMINFO_R_OK) {
+               pkgmgrinfo_appinfo_destroy_appinfo(app_handle);
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return appType;
+       }
+       appType = type;
+
+       pkgmgrinfo_appinfo_destroy_appinfo(app_handle);
+       pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+
+       return appType;
+}
+
+std::string getMetadataValue(const std::string& pkgId, const std::string& key)
+{
+       char *value = NULL;
+       char *appId = 0;
+       std::string metadataValue;
+
+       pkgmgrinfo_pkginfo_h pkg_handle;
+       int ret = pkgmgrGetPkgInfo(pkgId, &pkg_handle);
+       if (ret != 0) {
+               return metadataValue;
+       }
+
+       ret = pkgmgrinfo_pkginfo_get_mainappid(pkg_handle, &appId);
+       if (ret != PMINFO_R_OK) {
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return metadataValue;
+       }
+
+       pkgmgrinfo_appinfo_h app_handle;
+       ret = pkgmgrGetAppInfo(appId, &app_handle);
+       if (ret != 0) {
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return metadataValue;
+       }
+
+       ret = pkgmgrinfo_appinfo_get_metadata_value(app_handle, key.c_str(), &value);
+       if (ret != PMINFO_R_OK) {
+               pkgmgrinfo_appinfo_destroy_appinfo(app_handle);
+               pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+               return metadataValue;
+       }
+       metadataValue = std::string(value);
+
+       pkgmgrinfo_appinfo_destroy_appinfo(app_handle);
+       pkgmgrinfo_pkginfo_destroy_pkginfo(pkg_handle);
+
+       return metadataValue;
+}
+
+bool isReadOnlyArea(const std::string& path)
+{
+       FILE *f = NULL;
+       struct mntent *m = NULL;
+
+       // "/opt/usr" is mounted to "RW" only
+       if (path.find("/opt/usr") != std::string::npos) {
+               return false;
+       }
+
+       // check whether "/" is mounted to RO or not
+       f = setmntent("/proc/mounts", "r");
+       if (!f) {
+               // return true for fail case to generate NI files under RW area.
+               return true;
+       }
+
+       while((m = getmntent(f))) {
+               if (m->mnt_dir != NULL && strcmp(m->mnt_dir, "/") == 0 &&
+                       m->mnt_opts != NULL && strstr(m->mnt_opts, "ro,") != NULL) {
+                       endmntent(f);
+                       return true;
+               }
+       }
+       endmntent(f);
+       return false;
+
+}
+
+std::string getBaseName(const std::string& path)
 {
        auto pos = path.find_last_of(PATH_SEPARATOR);
        if (pos != std::string::npos)
@@ -108,60 +277,98 @@ std::string baseName(const std::string& path)
        return path;
 }
 
-bool isFileExist(const std::string& path)
+std::string replaceAll(const std::string& str, const std::string& pattern, const std::string& replace)
 {
-       struct stat sb;
-       return stat(path.c_str(), &sb) == 0;
+       std::string result = str;
+       std::string::size_type pos = 0;
+       std::string::size_type offset = 0;
+
+       while ((pos = result.find(pattern, offset)) != std::string::npos) {
+               result.replace(result.begin() + pos, result.begin() + pos + pattern.size(), replace);
+               offset = pos + replace.size();
+       }
+
+       return result;
 }
 
-std::string stripNiDLL(const std::string& path)
+std::string changeExtension(const std::string& path, const std::string& from, const std::string& to)
 {
-       std::string niPath(path);
-       if (path.size() < 5) return niPath;
-       if (!strncasecmp(path.c_str() + path.size() - 4, ".dll", 4))
-               niPath = path.substr(0, path.size()-4);
-       else if (!strncasecmp(path.c_str() + path.size() - 4, ".exe", 4))
-               niPath = path.substr(0, path.size()-4);
+       return path.substr(0, path.rfind(from)) + to;
+}
+
+bool isFile(const std::string& path)
+{
+       struct stat sb;
+       return lstat(path.c_str(), &sb) == 0;
+}
 
-       if (!strncasecmp(niPath.c_str() + niPath.size() - 3, ".ni", 3))
-               return niPath.substr(0, niPath.size()-3);
+bool isSymlinkFile(const std::string& path)
+{
+       struct stat sb;
+       if (lstat(path.c_str(), &sb) != 0) {
+               return false;
+       }
+       return (sb.st_mode & S_IFMT) == S_IFLNK;
+}
 
-       return niPath;
+bool isDirectory(const std::string& path)
+{
+       struct stat sb;
+       if (stat(path.c_str(), &sb) != 0) {
+               return false;
+       }
+       return (sb.st_mode & S_IFMT) == S_IFDIR;
 }
 
-void assembliesInDirectory(const std::vector<std::string>& directories, std::string& tpaList)
+std::string getAssemblyNameFromPath(const std::string& path)
 {
-       std::map<std::string, std::string> assemblyList;
-       std::map<std::string, std::string> tmpList;
+       std::string ret(getFileName(path));
 
-       auto reader = [&assemblyList, &tmpList] (const std::string& path, const char* name) {
-               if (isManagedAssembly(path) || isNativeImage(path)) {
-                       std::string dllName = stripNiDLL(name);
-                       std::pair<std::map<std::string, std::string>::iterator, bool> ret;
-                       ret = tmpList.insert(std::pair<std::string, std::string>(dllName, path));
-                       if (ret.second == false) {
-                               if (isNativeImage(path))
-                                       tmpList[dllName] = path;
+       if (ret.find_last_of(".") == std::string::npos)
+               return ret;
+       ret.erase(ret.find_last_of("."));
+
+       if (ret.size() > 3 && std::equal(ret.begin() + ret.size() - 3, ret.end(), ".ni"))
+               ret.erase(ret.size() - 3);
+
+       return ret;
+}
+
+void addAssembliesFromDirectories(const std::vector<std::string>& directories, std::string& list)
+{
+       std::vector<std::string> assems;
+       std::unordered_map<std::string, std::string> assemPaths;
+
+       auto reader = [&assems, &assemPaths](const std::string& path, const std::string& filename) {
+               if (isManagedAssembly(filename) || isNativeImage(filename)) {
+                       std::string assem = getAssemblyNameFromPath(filename);
+
+                       if (assemPaths.count(assem) == 0) {
+                               assems.push_back(assem);
+                               assemPaths[assem] = path;
+                       } else if (isManagedAssembly(assemPaths[assem]) && isNativeImage(filename)) {
+                               // Update only if a native image is found in the same directory.
+                               // For example, if we have two directories = { X, Y } where X contains A.dll and
+                               // Y contains both A.dll and A.ni.dll, always A.dll in X will be used.
+                               if (getBaseName(assemPaths[assem]).compare(getBaseName(path)) == 0)
+                                       assemPaths[assem] = path;
                        }
                }
        };
+       for (auto& directory : directories)
+               scanFilesInDirectory(directory, reader, 0);
 
-       for (auto directory : directories) {
-               scanFilesInDir(directory.c_str(), reader, 1);
-               // merge scaned dll list to tpa list.
-               // if the dll is already exist in the list, that is skipped.
-               assemblyList.insert(tmpList.begin(), tmpList.end());
-       }
+       if (!list.empty() && list.back() != ':')
+               list.push_back(':');
 
-       std::map<std::string, std::string>::iterator it;
-       for (it = assemblyList.begin(); it != assemblyList.end(); it++)
-               tpaList += it->second + ':';
+       for (auto& assem : assems)
+               list += assemPaths[assem] + ":";
 
-       if (tpaList.back() == ':')
-               tpaList.pop_back();
+       if (list.back() == ':')
+               list.pop_back();
 }
 
-void scanFilesInDir(const std::string& directory, FileReader reader, unsigned int depth)
+void scanFilesInDirectory(const std::string& directory, FileReader reader, unsigned int depth)
 {
        DIR *dir;
        struct dirent* entry;
@@ -182,27 +389,500 @@ void scanFilesInDir(const std::string& directory, FileReader reader, unsigned in
                        case DT_DIR:
                                isDir = true;
                                break;
+                       // symlink is added to the list even if there is no original file.
+                       // It used to remove broken symlinks related to TAC
                        case DT_LNK:
+                               break;
                        case DT_UNKNOWN:
-                               struct stat sb;
-                               if (stat(path.c_str(), &sb) == -1)
-                                       continue;
-
-                               if (S_ISREG(sb.st_mode) || S_ISDIR(sb.st_mode))
-                                       break;
+                               continue;
                        default:
                                continue;
                }
                if (!isDir)
                        reader(path, entry->d_name);
-               else if (depth > 1 && strcmp(entry->d_name, ".") && strcmp(entry->d_name, ".."))
+               else if (depth > 0 && strcmp(entry->d_name, ".") && strcmp(entry->d_name, ".."))
                        innerDirectories.push_back(path);
        }
 
-       if (depth != 0)
+       if (depth > 0)
                for (auto& d : innerDirectories)
-                       scanFilesInDir(d.c_str(), reader, depth-1);
+                       scanFilesInDirectory(d, reader, depth - 1);
 
        closedir(dir);
 }
 
+void copySmackAndOwnership(const std::string& fromPath, const std::string& toPath, bool isSymlink)
+{
+       char* label = NULL;
+       struct stat info;
+
+       if (isSymlink) {
+               // change smack label for symbolic link.
+               if (smack_lgetlabel(fromPath.c_str(), &label, SMACK_LABEL_ACCESS) == 0) {
+                       if (smack_lsetlabel(toPath.c_str(), label, SMACK_LABEL_ACCESS) < 0) {
+                               _SERR("Fail to set smack label");
+                       }
+                       free(label);
+               }
+
+               // change owner and groupsfor symbolic link.
+               // change mode is skipped for symlink because permission of symlink file is meaningless.
+               if (!lstat(fromPath.c_str(), &info)) {
+                       if (lchown(toPath.c_str(), info.st_uid, info.st_gid) == -1)
+                               _SERR("Failed to change owner and group name");
+               }
+       } else {
+               // change smack label
+               if (smack_getlabel(fromPath.c_str(), &label, SMACK_LABEL_ACCESS) == 0) {
+                       if (smack_setlabel(toPath.c_str(), label, SMACK_LABEL_ACCESS) < 0) {
+                               _SERR("Fail to set smack label");
+                       }
+                       free(label);
+               }
+
+               // change owner, groups and mode for generated ni file.
+               if (!stat(fromPath.c_str(), &info)) {
+                       if (chown(toPath.c_str(), info.st_uid, info.st_gid) == -1)
+                               _SERR("Failed to change owner and group name");
+                       if (chmod(toPath.c_str(), info.st_mode) == -1)
+                               _SERR("Failed to change mode");
+               }
+       }
+}
+
+static bool setOwnership(const bf::path& path, uid_t uid, gid_t gid)
+{
+       int fd = open(path.c_str(), O_RDONLY);
+       if (fd < 0) {
+               _ERR("Can't open directory: %s", path.c_str());
+               return false;
+       }
+       int ret = fchown(fd, uid, gid);
+       close(fd);
+       if (ret != 0) {
+               _ERR("Failed to change owner of: %s", path.c_str());
+               return false;
+       }
+       return true;
+}
+
+static bool setDirPermissions(const bf::path& path, bf::perms permissions)
+{
+       bs::error_code error;
+       bf::permissions(path, permissions, error);
+       if (error) {
+               _ERR("Failed to set permissions for directory: %s, %s", path.c_str(), error.message().c_str());
+               return false;
+       }
+       return true;
+}
+
+static bool setDirOwnershipAndPermissions(const bf::path& path, bf::perms permissions, uid_t uid, gid_t gid)
+{
+       if (!setOwnership(path, uid, gid)) {
+               _ERR("Failed to change owner: %s, (uid: %d, gid: %d)", path.c_str(), uid, gid);
+               return false;
+       }
+       if (!setDirPermissions(path, permissions)) {
+               _ERR("Failed to change permission: %s, (%d)", path.c_str(), permissions);
+               return false;
+       }
+       return true;
+}
+
+static bool copyOwnershipAndPermissions(const bf::path& path, const bf::path& path2)
+{
+       if (!exist(path)) {
+               _ERR("Failed to copy ownership and permissions from %s to %s", path.c_str(), path2.c_str());
+               return false;
+       }
+       bs::error_code error;
+       bf::perms permissions = bf::status(path, error).permissions();
+       if (error) {
+               _ERR("Failed to copy ownership and permissions : %s", error.message().c_str());
+               return false;
+       }
+       struct stat stats;
+       if (stat(path.c_str(), &stats) != 0) {
+               return false;
+       }
+       if (!setDirOwnershipAndPermissions(path2, permissions, stats.st_uid, stats.st_gid)) {
+               _ERR("Failed to copy ownership and permissions from %s to %s", path.c_str(), path2.c_str());
+               return false;
+       }
+       return true;
+}
+
+bool exist(const bf::path& path)
+{
+       bs::error_code error;
+       int ret = bf::exists(path, error);
+       if (error) {
+               if ((error.value() != bs::errc::success) && (error.value() != bs::errc::no_such_file_or_directory)) {
+                       _ERR("Failed to check %s exists : %s", path.c_str(), error.message().c_str());
+               }
+       }
+       return ret;
+}
+
+bool createDir(const bf::path& path)
+{
+       if (exist(path)) {
+               return true;
+       }
+       bs::error_code error;
+       bf::create_directories(path, error);
+       if (error) {
+               _ERR("Failed to create directory: %s", error.message().c_str());
+               return false;
+       }
+       return true;
+}
+
+bool copyDir(const bf::path& path1, const bf::path& path2, FSFlag flags)
+{
+       try {
+               // Check whether the function call is valid
+               if (!exist(path1) || !bf::is_directory(path1)) {
+                       _ERR("Source directory %s does not exist or is not a directory", path1.c_str());
+                       return false;
+               }
+               if (!exist(path2)) {
+                       // Create the destination directory
+                       if (!createDir(path2)) {
+                               _ERR("Unable to create destination directory %s", path2.c_str());
+                               return false;
+                       }
+                       if (flags & FS_PRESERVE_OWNERSHIP_AND_PERMISSIONS) {
+                               copyOwnershipAndPermissions(path1, path2);
+                       }
+               } else {
+                       if (!(flags & (FS_MERGE_SKIP | FS_MERGE_OVERWRITE))) {
+                               _ERR("Destination directory %s already exists", path2.c_str());
+                               return false;
+                       }
+                       if (flags & (FS_MERGE_OVERWRITE | FS_PRESERVE_OWNERSHIP_AND_PERMISSIONS)) {
+                               copyOwnershipAndPermissions(path1, path2);
+                       }
+               }
+       } catch (const bf::filesystem_error& error) {
+               _ERR("Failed to copy directory: %s", error.what());
+               return false;
+       }
+
+       // Iterate through the source directory
+       try {
+               for (bf::directory_iterator file(path1); file != bf::directory_iterator(); ++file) {
+                       bf::path current(file->path());
+                       bf::path target = path2 / current.filename();
+                       if (bf::is_symlink(bf::symlink_status(current))) {
+                               if ((flags & (FS_MERGE_SKIP | FS_MERGE_OVERWRITE)) && exist(target)) {
+                                       continue;
+                               }
+                               bs::error_code error;
+                               bf::copy_symlink(current, target, error);
+                               if (error) {
+                                       _ERR("Failed to copy symlink: %s, %s", current.c_str(), error.message().c_str());
+                                       return false;
+                               }
+                       } else if (bf::is_directory(current)) {
+                               // Found directory: Recursion
+                               if (!copyDir(current, target, flags)) {
+                                       return false;
+                               }
+                       } else {
+                               if ((flags & FS_MERGE_SKIP) && exist(target)) {
+                                       continue;
+                               }
+                               bf::path destination = target;
+                               if (flags & FS_COMMIT_COPY_FILE) {
+                                       destination = bf::unique_path(target.parent_path() / "%%%%-%%%%-%%%%-%%%%");
+                               }
+                               if (flags & FS_MERGE_OVERWRITE) {
+                                       bf::copy_file(current, destination, bf::copy_option::overwrite_if_exists);
+                               } else {
+                                       bf::copy_file(current, destination);
+                               }
+                               if (flags & FS_PRESERVE_OWNERSHIP_AND_PERMISSIONS) {
+                                       copyOwnershipAndPermissions(current, destination);
+                               }
+                               if (flags & FS_COMMIT_COPY_FILE) {
+                                       if (flags & FS_MERGE_OVERWRITE) {
+                                               bf::remove(target);
+                                       }
+                                       bf::rename(destination, target);
+                               }
+                       }
+               }
+       } catch (const bf::filesystem_error& error) {
+               _ERR("Failed to copy directory: %s", error.what());
+               return false;
+       }
+
+       return true;
+}
+
+bool copyFile(const bf::path& path1, const bf::path& path2)
+{
+       bs::error_code error;
+       if (!exist(path1)) {
+               return false;
+       }
+       bf::copy_file(path1, path2, bf::copy_option::overwrite_if_exists, error);
+       if (error) {
+               _ERR("copy file %s due to error [%s]", path1.c_str(), error.message().c_str());
+               return false;
+       }
+       return true;
+}
+
+bool moveFile(const bf::path& path1, const bf::path& path2)
+{
+       if (!exist(path1) || exist(path2)) {
+               return false;
+       }
+       bs::error_code error;
+       bf::rename(path1, path2, error);
+       if (error) {
+               _ERR("Cannot move file: %s. Will copy/remove... with error [%s]", path1.c_str(), error.message().c_str());
+               bf::copy_file(path1, path2, bf::copy_option::overwrite_if_exists, error);
+               if (error) {
+                       _ERR("Cannot copy file %s due to error [%s]", path1.c_str(), error.message().c_str());
+                       return false;
+               }
+               bf::remove_all(path1, error);
+               if (error) {
+                       _ERR("Cannot remove old file when coping: %s with error [%s]", path1.c_str(), error.message().c_str());
+                       return false;
+               }
+       }
+       return true;
+}
+
+bool removeFile(const bf::path& path)
+{
+       if (!exist(path)) {
+               return true;
+       }
+       bs::error_code error;
+       bf::remove(path, error);
+       if (error) {
+               _ERR("Cannot remove: %s, %s", path.c_str(), error.message().c_str());
+               return false;
+       }
+       return true;
+}
+
+bool removeAll(const bf::path& path)
+{
+       if (!exist(path)) {
+               return true;
+       }
+       bs::error_code error;
+       bf::remove_all(path, error);
+       if (error) {
+               _ERR("Cannot remove: %s, %s", path.c_str(), error.message().c_str());
+               return false;
+       }
+       return true;
+}
+
+void setCmdName(const std::string& name)
+{
+       #define PRC_NAME_LENGTH         16
+
+       char processName[PRC_NAME_LENGTH] = {0, };
+
+       if (name.empty())
+               return;
+
+       memset(processName, '\0', PRC_NAME_LENGTH);
+       snprintf(processName, PRC_NAME_LENGTH, "%s", name.c_str());
+       prctl(PR_SET_NAME, processName);
+}
+
+std::string getFileName(const std::string& path)
+{
+       std::string ret(path);
+       size_t index = ret.find_last_of(PATH_SEPARATOR);
+       return index == std::string::npos ? ret : ret.substr(index + 1);
+}
+
+std::string SHA256(const std::string& path)
+{
+       int bytesRead = 0;
+       const int bufSize = 32768;
+
+       unsigned int digest_len = 0;
+       unsigned char* digest = NULL;
+
+       std::stringstream ss;
+       EVP_MD_CTX *mdctx = NULL;
+       std::string output = "";
+
+       FILE *file = fopen(path.c_str(), "rb");
+       if (!file) {
+               return output;
+       }
+
+       char *buffer = (char*)malloc(bufSize);
+       if (!buffer) {
+               goto cleanup4;
+       }
+
+       mdctx = EVP_MD_CTX_new();
+       if (mdctx == NULL) {
+               _ERR("Message Digest Context creation NULL");
+               goto cleanup3;
+       }
+
+       digest = (unsigned char*)OPENSSL_malloc(EVP_MD_size(EVP_sha256()));
+       if (!digest) {
+               _ERR("Memory Allocation for SHA256 failed");
+               goto cleanup2;
+       }
+
+       if (!EVP_DigestInit_ex(mdctx, EVP_sha256(), NULL)) {
+               _ERR("Message Digest init failed");
+               goto cleanup1;
+       }
+
+       while ((bytesRead = fread(buffer, 1, bufSize, file))) {
+               if (!EVP_DigestUpdate(mdctx, buffer, bytesRead)) {
+                       _ERR("Message Digest update failed");
+                       goto cleanup1;
+               }
+       }
+
+       if (!EVP_DigestFinal_ex(mdctx, digest, &digest_len)) {
+               _ERR("Message Digest Finalization falied");
+               goto cleanup1;
+       }
+
+       for (unsigned int i = 0; i < digest_len; i++) {
+               ss << std::hex << std::setw(2) << std::setfill('0') << (int)digest[i];
+       }
+       output = ss.str();
+
+cleanup1:
+       EVP_MD_CTX_free(mdctx);
+cleanup2:
+       OPENSSL_free(digest);
+cleanup3:
+       free(buffer);
+cleanup4:
+       fclose(file);
+
+       return output;
+}
+
+int pkgmgrGetPkgInfo(const std::string& pkgId, pkgmgrinfo_pkginfo_h* handle)
+{
+       uid_t uid = 0;
+       int ret = 0;
+
+       if (pkgmgr_installer_info_get_target_uid(&uid) < 0) {
+               _ERR("Failed to get UID");
+               return -1;
+       }
+
+       ret = pkgmgrinfo_pkginfo_get_usr_pkginfo(pkgId.c_str(), uid, handle);
+       if (ret != PMINFO_R_OK) {
+               _ERR("Failed to get pkginfo (%d)", ret);
+               return -1;
+       }
+
+       return 0;
+}
+
+int pkgmgrGetAppInfo(const std::string& appId, pkgmgrinfo_appinfo_h* handle)
+{
+       uid_t uid = 0;
+       int ret = 0;
+
+       if (pkgmgr_installer_info_get_target_uid(&uid) < 0) {
+               _ERR("Failed to get UID");
+               return -1;
+       }
+
+       ret = pkgmgrinfo_appinfo_get_usr_appinfo(appId.c_str(), uid, handle);
+       if (ret != PMINFO_R_OK) {
+               _ERR("Failed to get appinfo (%d)", ret);
+               return -1;
+       }
+
+       return 0;
+}
+
+int pkgmgrMDFilterForeach(pkgmgrinfo_appinfo_metadata_filter_h handle,
+                                                       pkgmgrinfo_app_list_cb app_cb,
+                                                       void *user_data)
+{
+       uid_t uid = 0;
+       int ret = 0;
+
+       if (pkgmgr_installer_info_get_target_uid(&uid) < 0) {
+               _ERR("Failed to get UID");
+               return -1;
+       }
+
+
+       ret = pkgmgrinfo_appinfo_usr_metadata_filter_foreach(handle, app_cb, user_data, uid);
+       if (ret != PMINFO_R_OK) {
+               _ERR("Failed to execute the metadata filter query (%d)", ret);
+               return -1;
+       }
+
+       return 0;
+}
+
+void printHWClockLog(const char* format, ...)
+{
+       char buf[1024] = {0,};
+       va_list ap;
+
+       va_start(ap, format);
+       vsnprintf(buf, sizeof(buf), format, ap);
+       va_end(ap);
+
+       prctl(PR_TASK_PERF_USER_TRACE, buf, strlen(buf));
+}
+
+const char* getNCDBStartupHook()
+{
+       return "/home/owner/share/tmp/sdk_tools/netcoredbg/ncdbhook.dll";
+}
+
+bool isNCDBStartupHookProvided()
+{
+       char *env = nullptr;
+       env = getenv("DOTNET_STARTUP_HOOKS");
+       if (env == nullptr)
+               return false;
+
+       // Note, `DOTNET_STARTUP_HOOKS` env could provide list of dlls with ':' delimiter,
+       // for example: "/path1/name1.dll:/path2/name2.dll"
+       while (*env != '\0')
+       {
+               const char *ncdbCur = getNCDBStartupHook();
+               while (*ncdbCur != '\0' && *env != '\0' && *env != ':')
+               {
+                       if (*ncdbCur != *env)
+                               break;
+
+                       ncdbCur++;
+                       env++;
+
+                       if (*ncdbCur == '\0' && (*env == '\0' || *env == ':'))
+                               return true;
+               }
+               while (*env != '\0' && *env != ':')
+               {
+                       env++;
+               }
+               if (*env == ':')
+                       env++;
+       }
+
+       return false;
+}