| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| // Detecting mime types is a tricky business because we need to balance |
| // compatibility concerns with security issues. Here is a survey of how other |
| // browsers behave and then a description of how we intend to behave. |
| // |
| // HTML payload, no Content-Type header: |
| // * IE 7: Render as HTML |
| // * Firefox 2: Render as HTML |
| // * Safari 3: Render as HTML |
| // * Opera 9: Render as HTML |
| // |
| // Here the choice seems clear: |
| // => Chrome: Render as HTML |
| // |
| // HTML payload, Content-Type: "text/plain": |
| // * IE 7: Render as HTML |
| // * Firefox 2: Render as text |
| // * Safari 3: Render as text (Note: Safari will Render as HTML if the URL |
| // has an HTML extension) |
| // * Opera 9: Render as text |
| // |
| // Here we choose to follow the majority (and break some compatibility with IE). |
| // Many folks dislike IE's behavior here. |
| // => Chrome: Render as text |
| // We generalize this as follows. If the Content-Type header is text/plain |
| // we won't detect dangerous mime types (those that can execute script). |
| // |
| // HTML payload, Content-Type: "application/octet-stream": |
| // * IE 7: Render as HTML |
| // * Firefox 2: Download as application/octet-stream |
| // * Safari 3: Render as HTML |
| // * Opera 9: Render as HTML |
| // |
| // We follow Firefox. |
| // => Chrome: Download as application/octet-stream |
| // One factor in this decision is that IIS 4 and 5 will send |
| // application/octet-stream for .xhtml files (because they don't recognize |
| // the extension). We did some experiments and it looks like this doesn't occur |
| // very often on the web. We choose the more secure option. |
| // |
| // GIF payload, no Content-Type header: |
| // * IE 7: Render as GIF |
| // * Firefox 2: Render as GIF |
| // * Safari 3: Download as Unknown (Note: Safari will Render as GIF if the |
| // URL has an GIF extension) |
| // * Opera 9: Render as GIF |
| // |
| // The choice is clear. |
| // => Chrome: Render as GIF |
| // Once we decide to render HTML without a Content-Type header, there isn't much |
| // reason not to render GIFs. |
| // |
| // GIF payload, Content-Type: "text/plain": |
| // * IE 7: Render as GIF |
| // * Firefox 2: Download as application/octet-stream (Note: Firefox will |
| // Download as GIF if the URL has an GIF extension) |
| // * Safari 3: Download as Unknown (Note: Safari will Render as GIF if the |
| // URL has an GIF extension) |
| // * Opera 9: Render as GIF |
| // |
| // Displaying as text/plain makes little sense as the content will look like |
| // gibberish. Here, we could change our minds and download. |
| // => Chrome: Render as GIF |
| // |
| // GIF payload, Content-Type: "application/octet-stream": |
| // * IE 7: Render as GIF |
| // * Firefox 2: Download as application/octet-stream (Note: Firefox will |
| // Download as GIF if the URL has an GIF extension) |
| // * Safari 3: Download as Unknown (Note: Safari will Render as GIF if the |
| // URL has an GIF extension) |
| // * Opera 9: Render as GIF |
| // |
| // We used to render as GIF here, but the problem is that some sites want to |
| // trigger downloads by sending application/octet-stream (even though they |
| // should be sending Content-Disposition: attachment). Although it is safe |
| // to render as GIF from a security perspective, we actually get better |
| // compatibility if we don't sniff from application/octet stream at all. |
| // => Chrome: Download as application/octet-stream |
| // |
| // Note that our definition of HTML payload is much stricter than IE's |
| // definition and roughly the same as Firefox's definition. |
| |
| #include <string> |
| |
| #include "net/base/mime_sniffer.h" |
| |
| #include "base/containers/span.h" |
| #include "base/logging.h" |
| #include "base/stl_util.h" |
| #include "base/strings/string_util.h" |
| #include "nb/cpp14oncpp11.h" |
| #include "starboard/common/string.h" |
| #include "starboard/memory.h" |
| #include "starboard/types.h" |
| #include "url/gurl.h" |
| |
| namespace net { |
| |
| // The number of content bytes we need to use all our magic numbers. Feel free |
| // to increase this number if you add a longer magic number. |
| static const size_t kBytesRequiredForMagic = 42; |
| |
| struct MagicNumber { |
| const char* mime_type; |
| const char* magic; |
| size_t magic_len; |
| bool is_string; |
| const char* mask; // if set, must have same length as |magic| |
| }; |
| |
| #define MAGIC_NUMBER(mime_type, magic) \ |
| { (mime_type), (magic), sizeof(magic)-1, false, NULL } |
| |
| template <int MagicSize, int MaskSize> |
| class VerifySizes { |
| static_assert(MagicSize == MaskSize, "sizes must be equal"); |
| |
| public: |
| enum { SIZES = MagicSize }; |
| }; |
| |
| #define verified_sizeof(magic, mask) \ |
| VerifySizes<sizeof(magic), sizeof(mask)>::SIZES |
| |
| #define MAGIC_MASK(mime_type, magic, mask) \ |
| { (mime_type), (magic), verified_sizeof(magic, mask)-1, false, (mask) } |
| |
| // Magic strings are case insensitive and must not include '\0' characters |
| #define MAGIC_STRING(mime_type, magic) \ |
| { (mime_type), (magic), sizeof(magic)-1, true, NULL } |
| |
| static const MagicNumber kMagicNumbers[] = { |
| // Source: HTML 5 specification |
| MAGIC_NUMBER("application/pdf", "%PDF-"), |
| MAGIC_NUMBER("application/postscript", "%!PS-Adobe-"), |
| MAGIC_NUMBER("image/gif", "GIF87a"), |
| MAGIC_NUMBER("image/gif", "GIF89a"), |
| MAGIC_NUMBER("image/png", "\x89" "PNG\x0D\x0A\x1A\x0A"), |
| MAGIC_NUMBER("image/jpeg", "\xFF\xD8\xFF"), |
| MAGIC_NUMBER("image/bmp", "BM"), |
| // Source: Mozilla |
| MAGIC_NUMBER("text/plain", "#!"), // Script |
| MAGIC_NUMBER("text/plain", "%!"), // Script, similar to PS |
| MAGIC_NUMBER("text/plain", "From"), |
| MAGIC_NUMBER("text/plain", ">From"), |
| // Chrome specific |
| MAGIC_NUMBER("application/x-gzip", "\x1F\x8B\x08"), |
| MAGIC_NUMBER("audio/x-pn-realaudio", "\x2E\x52\x4D\x46"), |
| MAGIC_NUMBER("video/x-ms-asf", |
| "\x30\x26\xB2\x75\x8E\x66\xCF\x11\xA6\xD9\x00\xAA\x00\x62\xCE\x6C"), |
| MAGIC_NUMBER("image/tiff", "I I"), |
| MAGIC_NUMBER("image/tiff", "II*"), |
| MAGIC_NUMBER("image/tiff", "MM\x00*"), |
| MAGIC_NUMBER("audio/mpeg", "ID3"), |
| MAGIC_NUMBER("image/webp", "RIFF....WEBPVP"), |
| MAGIC_NUMBER("video/webm", "\x1A\x45\xDF\xA3"), |
| MAGIC_NUMBER("application/zip", "PK\x03\x04"), |
| MAGIC_NUMBER("application/x-rar-compressed", "Rar!\x1A\x07\x00"), |
| MAGIC_NUMBER("application/x-msmetafile", "\xD7\xCD\xC6\x9A"), |
| MAGIC_NUMBER("application/octet-stream", "MZ"), // EXE |
| // Sniffing for Flash: |
| // |
| // MAGIC_NUMBER("application/x-shockwave-flash", "CWS"), |
| // MAGIC_NUMBER("application/x-shockwave-flash", "FLV"), |
| // MAGIC_NUMBER("application/x-shockwave-flash", "FWS"), |
| // |
| // Including these magic number for Flash is a trade off. |
| // |
| // Pros: |
| // * Flash is an important and popular file format |
| // |
| // Cons: |
| // * These patterns are fairly weak |
| // * If we mistakenly decide something is Flash, we will execute it |
| // in the origin of an unsuspecting site. This could be a security |
| // vulnerability if the site allows users to upload content. |
| // |
| // On balance, we do not include these patterns. |
| }; |
| |
| // The number of content bytes we need to use all our Microsoft Office magic |
| // numbers. |
| static const size_t kBytesRequiredForOfficeMagic = 8; |
| |
| static const MagicNumber kOfficeMagicNumbers[] = { |
| MAGIC_NUMBER("CFB", "\xD0\xCF\x11\xE0\xA1\xB1\x1A\xE1"), |
| MAGIC_NUMBER("OOXML", "PK\x03\x04"), |
| }; |
| |
| enum OfficeDocType { |
| DOC_TYPE_WORD, |
| DOC_TYPE_EXCEL, |
| DOC_TYPE_POWERPOINT, |
| DOC_TYPE_NONE |
| }; |
| |
| struct OfficeExtensionType { |
| OfficeDocType doc_type; |
| const char* extension; |
| size_t extension_len; |
| }; |
| |
| #define OFFICE_EXTENSION(type, extension) \ |
| { (type), (extension), sizeof(extension) - 1 } |
| |
| static const OfficeExtensionType kOfficeExtensionTypes[] = { |
| OFFICE_EXTENSION(DOC_TYPE_WORD, ".doc"), |
| OFFICE_EXTENSION(DOC_TYPE_EXCEL, ".xls"), |
| OFFICE_EXTENSION(DOC_TYPE_POWERPOINT, ".ppt"), |
| OFFICE_EXTENSION(DOC_TYPE_WORD, ".docx"), |
| OFFICE_EXTENSION(DOC_TYPE_EXCEL, ".xlsx"), |
| OFFICE_EXTENSION(DOC_TYPE_POWERPOINT, ".pptx"), |
| }; |
| |
| static const MagicNumber kExtraMagicNumbers[] = { |
| MAGIC_NUMBER("image/x-xbitmap", "#define"), |
| MAGIC_NUMBER("image/x-icon", "\x00\x00\x01\x00"), |
| MAGIC_NUMBER("image/svg+xml", "<?xml_version="), |
| MAGIC_NUMBER("audio/wav", "RIFF....WAVEfmt "), |
| MAGIC_NUMBER("video/avi", "RIFF....AVI LIST"), |
| MAGIC_NUMBER("audio/ogg", "OggS\0"), |
| MAGIC_MASK("video/mpeg", "\x00\x00\x01\xB0", "\xFF\xFF\xFF\xF0"), |
| MAGIC_MASK("audio/mpeg", "\xFF\xE0", "\xFF\xE0"), |
| MAGIC_NUMBER("video/3gpp", "....ftyp3g"), |
| MAGIC_NUMBER("video/3gpp", "....ftypavcl"), |
| MAGIC_NUMBER("video/mp4", "....ftyp"), |
| MAGIC_NUMBER("video/quicktime", "....moov"), |
| MAGIC_NUMBER("application/x-shockwave-flash", "CWS"), |
| MAGIC_NUMBER("application/x-shockwave-flash", "FWS"), |
| MAGIC_NUMBER("video/x-flv", "FLV"), |
| MAGIC_NUMBER("audio/x-flac", "fLaC"), |
| |
| // RAW image types. |
| MAGIC_NUMBER("image/x-canon-cr2", "II\x2a\x00\x10\x00\x00\x00CR"), |
| MAGIC_NUMBER("image/x-canon-crw", "II\x1a\x00\x00\x00HEAPCCDR"), |
| MAGIC_NUMBER("image/x-minolta-mrw", "\x00MRM"), |
| MAGIC_NUMBER("image/x-olympus-orf", "MMOR"), // big-endian |
| MAGIC_NUMBER("image/x-olympus-orf", "IIRO"), // little-endian |
| MAGIC_NUMBER("image/x-olympus-orf", "IIRS"), // little-endian |
| MAGIC_NUMBER("image/x-fuji-raf", "FUJIFILMCCD-RAW "), |
| MAGIC_NUMBER("image/x-panasonic-raw", |
| "IIU\x00\x08\x00\x00\x00"), // Panasonic .raw |
| MAGIC_NUMBER("image/x-panasonic-raw", |
| "IIU\x00\x18\x00\x00\x00"), // Panasonic .rw2 |
| MAGIC_NUMBER("image/x-phaseone-raw", "MMMMRaw"), |
| MAGIC_NUMBER("image/x-x3f", "FOVb"), |
| }; |
| |
| // Our HTML sniffer differs slightly from Mozilla. For example, Mozilla will |
| // decide that a document that begins "<!DOCTYPE SOAP-ENV:Envelope PUBLIC " is |
| // HTML, but we will not. |
| |
| #define MAGIC_HTML_TAG(tag) \ |
| MAGIC_STRING("text/html", "<" tag) |
| |
| static const MagicNumber kSniffableTags[] = { |
| // XML processing directive. Although this is not an HTML mime type, we sniff |
| // for this in the HTML phase because text/xml is just as powerful as HTML and |
| // we want to leverage our white space skipping technology. |
| MAGIC_NUMBER("text/xml", "<?xml"), // Mozilla |
| // DOCTYPEs |
| MAGIC_HTML_TAG("!DOCTYPE html"), // HTML5 spec |
| // Sniffable tags, ordered by how often they occur in sniffable documents. |
| MAGIC_HTML_TAG("script"), // HTML5 spec, Mozilla |
| MAGIC_HTML_TAG("html"), // HTML5 spec, Mozilla |
| MAGIC_HTML_TAG("!--"), |
| MAGIC_HTML_TAG("head"), // HTML5 spec, Mozilla |
| MAGIC_HTML_TAG("iframe"), // Mozilla |
| MAGIC_HTML_TAG("h1"), // Mozilla |
| MAGIC_HTML_TAG("div"), // Mozilla |
| MAGIC_HTML_TAG("font"), // Mozilla |
| MAGIC_HTML_TAG("table"), // Mozilla |
| MAGIC_HTML_TAG("a"), // Mozilla |
| MAGIC_HTML_TAG("style"), // Mozilla |
| MAGIC_HTML_TAG("title"), // Mozilla |
| MAGIC_HTML_TAG("b"), // Mozilla |
| MAGIC_HTML_TAG("body"), // Mozilla |
| MAGIC_HTML_TAG("br"), |
| MAGIC_HTML_TAG("p"), // Mozilla |
| }; |
| |
| // Compare content header to a magic number where magic_entry can contain '.' |
| // for single character of anything, allowing some bytes to be skipped. |
| static bool MagicCmp(const char* magic_entry, const char* content, size_t len) { |
| while (len) { |
| if ((*magic_entry != '.') && (*magic_entry != *content)) |
| return false; |
| ++magic_entry; |
| ++content; |
| --len; |
| } |
| return true; |
| } |
| |
| // Like MagicCmp() except that it ANDs each byte with a mask before |
| // the comparison, because there are some bits we don't care about. |
| static bool MagicMaskCmp(const char* magic_entry, |
| const char* content, |
| size_t len, |
| const char* mask) { |
| while (len) { |
| if ((*magic_entry != '.') && (*magic_entry != (*mask & *content))) |
| return false; |
| ++magic_entry; |
| ++content; |
| ++mask; |
| --len; |
| } |
| return true; |
| } |
| |
| static bool MatchMagicNumber(const char* content, |
| size_t size, |
| const MagicNumber& magic_entry, |
| std::string* result) { |
| const size_t len = magic_entry.magic_len; |
| |
| // Keep kBytesRequiredForMagic honest. |
| DCHECK_LE(len, kBytesRequiredForMagic); |
| |
| // To compare with magic strings, we need to compute strlen(content), but |
| // content might not actually have a null terminator. In that case, we |
| // pretend the length is content_size. |
| const char* end = |
| static_cast<const char*>(SbMemoryFindByte(content, '\0', size)); |
| const size_t content_strlen = |
| (end != NULL) ? static_cast<size_t>(end - content) : size; |
| |
| bool match = false; |
| if (magic_entry.is_string) { |
| if (content_strlen >= len) { |
| // Do a case-insensitive prefix comparison. |
| DCHECK_EQ(SbStringGetLength(magic_entry.magic), len); |
| match = base::EqualsCaseInsensitiveASCII(magic_entry.magic, |
| base::StringPiece(content, len)); |
| } |
| } else { |
| if (size >= len) { |
| if (!magic_entry.mask) { |
| match = MagicCmp(magic_entry.magic, content, len); |
| } else { |
| match = MagicMaskCmp(magic_entry.magic, content, len, magic_entry.mask); |
| } |
| } |
| } |
| |
| if (match) { |
| result->assign(magic_entry.mime_type); |
| return true; |
| } |
| return false; |
| } |
| |
| static bool CheckForMagicNumbers(const char* content, |
| size_t size, |
| base::span<const MagicNumber> magic_numbers, |
| std::string* result) { |
| for (const MagicNumber& magic : magic_numbers) { |
| if (MatchMagicNumber(content, size, magic, result)) |
| return true; |
| } |
| return false; |
| } |
| |
| // Truncates |size| to |max_size| and returns true if |size| is at least |
| // |max_size|. |
| static bool TruncateSize(const size_t max_size, size_t* size) { |
| // Keep kMaxBytesToSniff honest. |
| DCHECK_LE(static_cast<int>(max_size), kMaxBytesToSniff); |
| |
| if (*size >= max_size) { |
| *size = max_size; |
| return true; |
| } |
| return false; |
| } |
| |
| // Returns true and sets result if the content appears to be HTML. |
| // Clears have_enough_content if more data could possibly change the result. |
| static bool SniffForHTML(const char* content, |
| size_t size, |
| bool* have_enough_content, |
| std::string* result) { |
| // For HTML, we are willing to consider up to 512 bytes. This may be overly |
| // conservative as IE only considers 256. |
| *have_enough_content &= TruncateSize(512, &size); |
| |
| // We adopt a strategy similar to that used by Mozilla to sniff HTML tags, |
| // but with some modifications to better match the HTML5 spec. |
| const char* const end = content + size; |
| const char* pos; |
| for (pos = content; pos < end; ++pos) { |
| if (!base::IsAsciiWhitespace(*pos)) |
| break; |
| } |
| // |pos| now points to first non-whitespace character (or at end). |
| return CheckForMagicNumbers(pos, end - pos, kSniffableTags, result); |
| } |
| |
| // Returns true and sets result if the content matches any of kMagicNumbers. |
| // Clears have_enough_content if more data could possibly change the result. |
| static bool SniffForMagicNumbers(const char* content, |
| size_t size, |
| bool* have_enough_content, |
| std::string* result) { |
| *have_enough_content &= TruncateSize(kBytesRequiredForMagic, &size); |
| |
| // Check our big table of Magic Numbers |
| return CheckForMagicNumbers(content, size, kMagicNumbers, result); |
| } |
| |
| // Returns true and sets result if the content matches any of |
| // kOfficeMagicNumbers, and the URL has the proper extension. |
| // Clears |have_enough_content| if more data could possibly change the result. |
| static bool SniffForOfficeDocs(const char* content, |
| size_t size, |
| const GURL& url, |
| bool* have_enough_content, |
| std::string* result) { |
| *have_enough_content &= TruncateSize(kBytesRequiredForOfficeMagic, &size); |
| |
| // Check our table of magic numbers for Office file types. |
| std::string office_version; |
| if (!CheckForMagicNumbers(content, size, kOfficeMagicNumbers, |
| &office_version)) |
| return false; |
| |
| OfficeDocType type = DOC_TYPE_NONE; |
| base::StringPiece url_path = url.path_piece(); |
| for (const auto& office_extension : kOfficeExtensionTypes) { |
| if (url_path.length() < office_extension.extension_len) |
| continue; |
| |
| base::StringPiece extension = |
| url_path.substr(url_path.length() - office_extension.extension_len); |
| if (base::EqualsCaseInsensitiveASCII( |
| extension, base::StringPiece(office_extension.extension, |
| office_extension.extension_len))) { |
| type = office_extension.doc_type; |
| break; |
| } |
| } |
| |
| if (type == DOC_TYPE_NONE) |
| return false; |
| |
| if (office_version == "CFB") { |
| switch (type) { |
| case DOC_TYPE_WORD: |
| *result = "application/msword"; |
| return true; |
| case DOC_TYPE_EXCEL: |
| *result = "application/vnd.ms-excel"; |
| return true; |
| case DOC_TYPE_POWERPOINT: |
| *result = "application/vnd.ms-powerpoint"; |
| return true; |
| case DOC_TYPE_NONE: |
| NOTREACHED(); |
| return false; |
| } |
| } else if (office_version == "OOXML") { |
| switch (type) { |
| case DOC_TYPE_WORD: |
| *result = "application/vnd.openxmlformats-officedocument." |
| "wordprocessingml.document"; |
| return true; |
| case DOC_TYPE_EXCEL: |
| *result = "application/vnd.openxmlformats-officedocument." |
| "spreadsheetml.sheet"; |
| return true; |
| case DOC_TYPE_POWERPOINT: |
| *result = "application/vnd.openxmlformats-officedocument." |
| "presentationml.presentation"; |
| return true; |
| case DOC_TYPE_NONE: |
| NOTREACHED(); |
| return false; |
| } |
| } |
| |
| NOTREACHED(); |
| return false; |
| } |
| |
| static bool IsOfficeType(const std::string& type_hint) { |
| return (type_hint == "application/msword" || |
| type_hint == "application/vnd.ms-excel" || |
| type_hint == "application/vnd.ms-powerpoint" || |
| type_hint == "application/vnd.openxmlformats-officedocument." |
| "wordprocessingml.document" || |
| type_hint == "application/vnd.openxmlformats-officedocument." |
| "spreadsheetml.sheet" || |
| type_hint == "application/vnd.openxmlformats-officedocument." |
| "presentationml.presentation" || |
| type_hint == "application/vnd.ms-excel.sheet.macroenabled.12" || |
| type_hint == "application/vnd.ms-word.document.macroenabled.12" || |
| type_hint == "application/vnd.ms-powerpoint.presentation." |
| "macroenabled.12" || |
| type_hint == "application/mspowerpoint" || |
| type_hint == "application/msexcel" || |
| type_hint == "application/vnd.ms-word" || |
| type_hint == "application/vnd.ms-word.document.12" || |
| type_hint == "application/vnd.msword"); |
| } |
| |
| // This function checks for files that have a Microsoft Office MIME type |
| // set, but are not actually Office files. |
| // |
| // If this is not actually an Office file, |*result| is set to |
| // "application/octet-stream", otherwise it is not modified. |
| // |
| // Returns false if additional data is required to determine the file type, or |
| // true if there is enough data to make a decision. |
| static bool SniffForInvalidOfficeDocs(const char* content, |
| size_t size, |
| const GURL& url, |
| std::string* result) { |
| if (!TruncateSize(kBytesRequiredForOfficeMagic, &size)) |
| return false; |
| |
| // Check our table of magic numbers for Office file types. If it does not |
| // match one, the MIME type was invalid. Set it instead to a safe value. |
| std::string office_version; |
| if (!CheckForMagicNumbers(content, size, kOfficeMagicNumbers, |
| &office_version)) { |
| *result = "application/octet-stream"; |
| } |
| |
| // We have enough information to determine if this was a Microsoft Office |
| // document or not, so sniffing is completed. |
| return true; |
| } |
| |
| // Byte order marks |
| static const MagicNumber kMagicXML[] = { |
| MAGIC_STRING("application/atom+xml", "<feed"), |
| MAGIC_STRING("application/rss+xml", "<rss"), // UTF-8 |
| }; |
| |
| // Returns true and sets result if the content appears to contain XHTML or a |
| // feed. |
| // Clears have_enough_content if more data could possibly change the result. |
| // |
| // TODO(evanm): this is similar but more conservative than what Safari does, |
| // while HTML5 has a different recommendation -- what should we do? |
| // TODO(evanm): this is incorrect for documents whose encoding isn't a superset |
| // of ASCII -- do we care? |
| static bool SniffXML(const char* content, |
| size_t size, |
| bool* have_enough_content, |
| std::string* result) { |
| // We allow at most 300 bytes of content before we expect the opening tag. |
| *have_enough_content &= TruncateSize(300, &size); |
| const char* pos = content; |
| const char* const end = content + size; |
| |
| // This loop iterates through tag-looking offsets in the file. |
| // We want to skip XML processing instructions (of the form "<?xml ...") |
| // and stop at the first "plain" tag, then make a decision on the mime-type |
| // based on the name (or possibly attributes) of that tag. |
| const int kMaxTagIterations = 5; |
| for (int i = 0; i < kMaxTagIterations && pos < end; ++i) { |
| pos = reinterpret_cast<const char*>(SbMemoryFindByte(pos, '<', end - pos)); |
| if (!pos) |
| return false; |
| |
| static CONSTEXPR base::StringPiece kXmlPrefix("<?xml"); |
| static CONSTEXPR base::StringPiece kDocTypePrefix("<!DOCTYPE"); |
| |
| base::StringPiece current(pos, end - pos); |
| if (base::EqualsCaseInsensitiveASCII(current.substr(0, kXmlPrefix.size()), |
| kXmlPrefix)) { |
| // Skip XML declarations. |
| ++pos; |
| continue; |
| } |
| |
| if (base::EqualsCaseInsensitiveASCII( |
| current.substr(0, kDocTypePrefix.size()), kDocTypePrefix)) { |
| // Skip DOCTYPE declarations. |
| ++pos; |
| continue; |
| } |
| |
| if (CheckForMagicNumbers(pos, end - pos, kMagicXML, result)) |
| return true; |
| |
| // TODO(evanm): handle RSS 1.0, which is an RDF format and more difficult |
| // to identify. |
| |
| // If we get here, we've hit an initial tag that hasn't matched one of the |
| // above tests. Abort. |
| return true; |
| } |
| |
| // We iterated too far without finding a start tag. |
| // If we have more content to look at, we aren't going to change our mind by |
| // seeing more bytes from the network. |
| return pos < end; |
| } |
| |
| // Byte order marks |
| static const MagicNumber kByteOrderMark[] = { |
| MAGIC_NUMBER("text/plain", "\xFE\xFF"), // UTF-16BE |
| MAGIC_NUMBER("text/plain", "\xFF\xFE"), // UTF-16LE |
| MAGIC_NUMBER("text/plain", "\xEF\xBB\xBF"), // UTF-8 |
| }; |
| |
| // Returns true and sets result to "application/octet-stream" if the content |
| // appears to be binary data. Otherwise, returns false and sets "text/plain". |
| // Clears have_enough_content if more data could possibly change the result. |
| static bool SniffBinary(const char* content, |
| size_t size, |
| bool* have_enough_content, |
| std::string* result) { |
| // There is no concensus about exactly how to sniff for binary content. |
| // * IE 7: Don't sniff for binary looking bytes, but trust the file extension. |
| // * Firefox 3.5: Sniff first 4096 bytes for a binary looking byte. |
| // Here, we side with FF, but with a smaller buffer. This size was chosen |
| // because it is small enough to comfortably fit into a single packet (after |
| // allowing for headers) and yet large enough to account for binary formats |
| // that have a significant amount of ASCII at the beginning (crbug.com/15314). |
| const bool is_truncated = TruncateSize(kMaxBytesToSniff, &size); |
| |
| // First, we look for a BOM. |
| std::string unused; |
| if (CheckForMagicNumbers(content, size, kByteOrderMark, &unused)) { |
| // If there is BOM, we think the buffer is not binary. |
| result->assign("text/plain"); |
| return false; |
| } |
| |
| // Next we look to see if any of the bytes "look binary." |
| if (LooksLikeBinary(content, size)) { |
| result->assign("application/octet-stream"); |
| return true; |
| } |
| |
| // No evidence either way. Default to non-binary and, if truncated, clear |
| // have_enough_content because there could be a binary looking byte in the |
| // truncated data. |
| *have_enough_content &= is_truncated; |
| result->assign("text/plain"); |
| return false; |
| } |
| |
| static bool IsUnknownMimeType(const std::string& mime_type) { |
| // TODO(tc): Maybe reuse some code in net/http/http_response_headers.* here. |
| // If we do, please be careful not to alter the semantics at all. |
| static const char* const kUnknownMimeTypes[] = { |
| // Empty mime types are as unknown as they get. |
| "", |
| // The unknown/unknown type is popular and uninformative |
| "unknown/unknown", |
| // The second most popular unknown mime type is application/unknown |
| "application/unknown", |
| // Firefox rejects a mime type if it is exactly */* |
| "*/*", |
| }; |
| for (const char* const unknown_mime_type : kUnknownMimeTypes) { |
| if (mime_type == unknown_mime_type) |
| return true; |
| } |
| if (mime_type.find('/') == std::string::npos) { |
| // Firefox rejects a mime type if it does not contain a slash |
| return true; |
| } |
| return false; |
| } |
| |
| // Returns true and sets result if the content appears to be a crx (Chrome |
| // extension) file. |
| // Clears have_enough_content if more data could possibly change the result. |
| static bool SniffCRX(const char* content, |
| size_t size, |
| const GURL& url, |
| const std::string& type_hint, |
| bool* have_enough_content, |
| std::string* result) { |
| // Technically, the crx magic number is just Cr24, but the bytes after that |
| // are a version number which changes infrequently. Including it in the |
| // sniffing gives us less room for error. If the version number ever changes, |
| // we can just add an entry to this list. |
| static const struct MagicNumber kCRXMagicNumbers[] = { |
| MAGIC_NUMBER("application/x-chrome-extension", "Cr24\x02\x00\x00\x00"), |
| MAGIC_NUMBER("application/x-chrome-extension", "Cr24\x03\x00\x00\x00")}; |
| |
| // Only consider files that have the extension ".crx". |
| if (!base::EndsWith(url.path_piece(), ".crx", base::CompareCase::SENSITIVE)) |
| return false; |
| |
| *have_enough_content &= TruncateSize(kBytesRequiredForMagic, &size); |
| return CheckForMagicNumbers(content, size, kCRXMagicNumbers, result); |
| } |
| |
| bool ShouldSniffMimeType(const GURL& url, const std::string& mime_type) { |
| bool sniffable_scheme = url.is_empty() || |
| url.SchemeIsHTTPOrHTTPS() || |
| url.SchemeIs("ftp") || |
| #if defined(OS_ANDROID) |
| url.SchemeIs("content") || |
| #endif |
| url.SchemeIsFile() || |
| url.SchemeIsFileSystem(); |
| if (!sniffable_scheme) |
| return false; |
| |
| static const char* const kSniffableTypes[] = { |
| // Many web servers are misconfigured to send text/plain for many |
| // different types of content. |
| "text/plain", |
| // We want to sniff application/octet-stream for |
| // application/x-chrome-extension, but nothing else. |
| "application/octet-stream", |
| // XHTML and Atom/RSS feeds are often served as plain xml instead of |
| // their more specific mime types. |
| "text/xml", |
| "application/xml", |
| // Check for false Microsoft Office MIME types. |
| "application/msword", |
| "application/vnd.ms-excel", |
| "application/vnd.ms-powerpoint", |
| "application/vnd.openxmlformats-officedocument.wordprocessingml.document", |
| "application/vnd.openxmlformats-officedocument.spreadsheetml.sheet", |
| "application/vnd.openxmlformats-officedocument.presentationml.presentation", |
| "application/vnd.ms-excel.sheet.macroenabled.12", |
| "application/vnd.ms-word.document.macroenabled.12", |
| "application/vnd.ms-powerpoint.presentation.macroenabled.12", |
| "application/mspowerpoint", |
| "application/msexcel", |
| "application/vnd.ms-word", |
| "application/vnd.ms-word.document.12", |
| "application/vnd.msword", |
| }; |
| for (const char* const sniffable_type : kSniffableTypes) { |
| if (mime_type == sniffable_type) |
| return true; |
| } |
| if (IsUnknownMimeType(mime_type)) { |
| // The web server didn't specify a content type or specified a mime |
| // type that we ignore. |
| return true; |
| } |
| return false; |
| } |
| |
| bool SniffMimeType(const char* content, |
| size_t content_size, |
| const GURL& url, |
| const std::string& type_hint, |
| ForceSniffFileUrlsForHtml force_sniff_file_url_for_html, |
| std::string* result) { |
| DCHECK_LT(content_size, 1000000U); // sanity check |
| DCHECK(content); |
| DCHECK(result); |
| |
| // By default, we assume we have enough content. |
| // Each sniff routine may unset this if it wasn't provided enough content. |
| bool have_enough_content = true; |
| |
| // By default, we'll return the type hint. |
| // Each sniff routine may modify this if it has a better guess.. |
| result->assign(type_hint); |
| |
| // If the file has a Microsoft Office MIME type, we should only check that it |
| // is a valid Office file. Because this is the only reason we sniff files |
| // with a Microsoft Office MIME type, we can return early. |
| if (IsOfficeType(type_hint)) |
| return SniffForInvalidOfficeDocs(content, content_size, url, result); |
| |
| // Cache information about the type_hint |
| bool hint_is_unknown_mime_type = IsUnknownMimeType(type_hint); |
| |
| // First check for HTML, unless it's a file URL and |
| // |allow_sniffing_files_urls_as_html| is false. |
| if (hint_is_unknown_mime_type && |
| (!url.SchemeIsFile() || |
| force_sniff_file_url_for_html == ForceSniffFileUrlsForHtml::kEnabled)) { |
| // We're only willing to sniff HTML if the server has not supplied a mime |
| // type, or if the type it did supply indicates that it doesn't know what |
| // the type should be. |
| if (SniffForHTML(content, content_size, &have_enough_content, result)) |
| return true; // We succeeded in sniffing HTML. No more content needed. |
| } |
| |
| // We're only willing to sniff for binary in 3 cases: |
| // 1. The server has not supplied a mime type. |
| // 2. The type it did supply indicates that it doesn't know what the type |
| // should be. |
| // 3. The type is "text/plain" which is the default on some web servers and |
| // could be indicative of a mis-configuration that we shield the user from. |
| const bool hint_is_text_plain = (type_hint == "text/plain"); |
| if (hint_is_unknown_mime_type || hint_is_text_plain) { |
| if (!SniffBinary(content, content_size, &have_enough_content, result)) { |
| // If the server said the content was text/plain and it doesn't appear |
| // to be binary, then we trust it. |
| if (hint_is_text_plain) { |
| return have_enough_content; |
| } |
| } |
| } |
| |
| // If we have plain XML, sniff XML subtypes. |
| if (type_hint == "text/xml" || type_hint == "application/xml") { |
| // We're not interested in sniffing these types for images and the like. |
| // Instead, we're looking explicitly for a feed. If we don't find one |
| // we're done and return early. |
| if (SniffXML(content, content_size, &have_enough_content, result)) |
| return true; |
| return have_enough_content; |
| } |
| |
| // CRX files (Chrome extensions) have a special sniffing algorithm. It is |
| // tighter than the others because we don't have to match legacy behavior. |
| if (SniffCRX(content, content_size, url, type_hint, |
| &have_enough_content, result)) |
| return true; |
| |
| // Check the file extension and magic numbers to see if this is an Office |
| // document. This needs to be checked before the general magic numbers |
| // because zip files and Office documents (OOXML) have the same magic number. |
| if (SniffForOfficeDocs(content, content_size, url, |
| &have_enough_content, result)) |
| return true; // We've matched a magic number. No more content needed. |
| |
| // We're not interested in sniffing for magic numbers when the type_hint |
| // is application/octet-stream. Time to bail out. |
| if (type_hint == "application/octet-stream") |
| return have_enough_content; |
| |
| // Now we look in our large table of magic numbers to see if we can find |
| // anything that matches the content. |
| if (SniffForMagicNumbers(content, content_size, |
| &have_enough_content, result)) |
| return true; // We've matched a magic number. No more content needed. |
| |
| return have_enough_content; |
| } |
| |
| bool SniffMimeTypeFromLocalData(const char* content, |
| size_t size, |
| std::string* result) { |
| // First check the extra table. |
| if (CheckForMagicNumbers(content, size, kExtraMagicNumbers, result)) |
| return true; |
| // Finally check the original table. |
| return CheckForMagicNumbers(content, size, kMagicNumbers, result); |
| } |
| |
| bool LooksLikeBinary(const char* content, size_t size) { |
| // The definition of "binary bytes" is from the spec at |
| // https://mimesniff.spec.whatwg.org/#binary-data-byte |
| // |
| // The bytes which are considered to be "binary" are all < 0x20. Encode them |
| // one bit per byte, with 1 for a "binary" bit, and 0 for a "text" bit. The |
| // least-significant bit represents byte 0x00, the most-significant bit |
| // represents byte 0x1F. |
| const uint32_t kBinaryBits = |
| ~(1u << '\t' | 1u << '\n' | 1u << '\r' | 1u << '\f' | 1u << '\x1b'); |
| for (size_t i = 0; i < size; ++i) { |
| uint8_t byte = static_cast<uint8_t>(content[i]); |
| if (byte < 0x20 && (kBinaryBits & (1u << byte))) |
| return true; |
| } |
| return false; |
| } |
| |
| } // namespace net |