Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(275)

Side by Side Diff: net/base/net_util.cc

Issue 220253002: Add net/base/filename_util.h. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/base/net_util.h ('k') | net/base/net_util_posix.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/base/net_util.h" 5 #include "net/base/net_util.h"
6 6
7 #include <errno.h>
8
7 #include <algorithm> 9 #include <algorithm>
8 #include <iterator> 10 #include <iterator>
9 #include <map> 11 #include <map>
12 #include <set>
10 13
11 #include "build/build_config.h" 14 #include "build/build_config.h"
12 15
13 #if defined(OS_WIN) 16 #if defined(OS_WIN)
14 #include <windows.h> 17 #include <windows.h>
15 #include <iphlpapi.h> 18 #include <iphlpapi.h>
16 #include <winsock2.h> 19 #include <winsock2.h>
17 #pragma comment(lib, "iphlpapi.lib") 20 #pragma comment(lib, "iphlpapi.lib")
18 #elif defined(OS_POSIX) 21 #elif defined(OS_POSIX)
19 #include <fcntl.h> 22 #include <fcntl.h>
20 #if !defined(OS_ANDROID) 23 #if !defined(OS_ANDROID)
21 #include <ifaddrs.h> 24 #include <ifaddrs.h>
22 #endif 25 #endif
23 #include <net/if.h> 26 #include <net/if.h>
24 #include <netdb.h> 27 #include <netdb.h>
25 #include <netinet/in.h> 28 #include <netinet/in.h>
26 #endif 29 #endif
27 30
28 #include "base/basictypes.h" 31 #include "base/basictypes.h"
29 #include "base/file_util.h"
30 #include "base/files/file_path.h"
31 #include "base/i18n/file_util_icu.h"
32 #include "base/i18n/icu_string_conversions.h"
33 #include "base/i18n/time_formatting.h" 32 #include "base/i18n/time_formatting.h"
34 #include "base/json/string_escape.h" 33 #include "base/json/string_escape.h"
35 #include "base/lazy_instance.h" 34 #include "base/lazy_instance.h"
36 #include "base/logging.h" 35 #include "base/logging.h"
37 #include "base/memory/singleton.h" 36 #include "base/memory/singleton.h"
38 #include "base/message_loop/message_loop.h" 37 #include "base/message_loop/message_loop.h"
39 #include "base/metrics/histogram.h" 38 #include "base/metrics/histogram.h"
40 #include "base/path_service.h"
41 #include "base/stl_util.h" 39 #include "base/stl_util.h"
42 #include "base/strings/string_number_conversions.h" 40 #include "base/strings/string_number_conversions.h"
43 #include "base/strings/string_piece.h" 41 #include "base/strings/string_piece.h"
44 #include "base/strings/string_split.h" 42 #include "base/strings/string_split.h"
45 #include "base/strings/string_tokenizer.h" 43 #include "base/strings/string_tokenizer.h"
46 #include "base/strings/string_util.h" 44 #include "base/strings/string_util.h"
47 #include "base/strings/stringprintf.h" 45 #include "base/strings/stringprintf.h"
48 #include "base/strings/sys_string_conversions.h" 46 #include "base/strings/sys_string_conversions.h"
49 #include "base/strings/utf_offset_string_conversions.h" 47 #include "base/strings/utf_offset_string_conversions.h"
50 #include "base/strings/utf_string_conversions.h" 48 #include "base/strings/utf_string_conversions.h"
51 #include "base/synchronization/lock.h" 49 #include "base/synchronization/lock.h"
52 #include "base/sys_byteorder.h" 50 #include "base/sys_byteorder.h"
53 #include "base/time/time.h" 51 #include "base/time/time.h"
54 #include "base/values.h" 52 #include "base/values.h"
55 #include "grit/net_resources.h" 53 #include "grit/net_resources.h"
56 #include "url/gurl.h" 54 #include "url/gurl.h"
57 #include "url/url_canon.h" 55 #include "url/url_canon.h"
58 #include "url/url_canon_ip.h" 56 #include "url/url_canon_ip.h"
59 #include "url/url_parse.h" 57 #include "url/url_parse.h"
60 #if defined(OS_ANDROID) 58 #if defined(OS_ANDROID)
61 #include "net/android/network_library.h" 59 #include "net/android/network_library.h"
62 #endif 60 #endif
63 #include "net/base/dns_util.h" 61 #include "net/base/dns_util.h"
64 #include "net/base/escape.h" 62 #include "net/base/escape.h"
65 #include "net/base/mime_util.h"
66 #include "net/base/net_module.h" 63 #include "net/base/net_module.h"
67 #include "net/base/registry_controlled_domains/registry_controlled_domain.h" 64 #include "net/base/registry_controlled_domains/registry_controlled_domain.h"
68 #if defined(OS_WIN) 65 #if defined(OS_WIN)
69 #include "net/base/winsock_init.h" 66 #include "net/base/winsock_init.h"
70 #endif 67 #endif
71 #include "net/http/http_content_disposition.h" 68 #include "net/http/http_content_disposition.h"
72 #include "third_party/icu/source/common/unicode/uidna.h" 69 #include "third_party/icu/source/common/unicode/uidna.h"
73 #include "third_party/icu/source/common/unicode/uniset.h" 70 #include "third_party/icu/source/common/unicode/uniset.h"
74 #include "third_party/icu/source/common/unicode/uscript.h" 71 #include "third_party/icu/source/common/unicode/uscript.h"
75 #include "third_party/icu/source/common/unicode/uset.h" 72 #include "third_party/icu/source/common/unicode/uset.h"
76 #include "third_party/icu/source/i18n/unicode/datefmt.h" 73 #include "third_party/icu/source/i18n/unicode/datefmt.h"
77 #include "third_party/icu/source/i18n/unicode/regex.h" 74 #include "third_party/icu/source/i18n/unicode/regex.h"
78 #include "third_party/icu/source/i18n/unicode/ulocdata.h" 75 #include "third_party/icu/source/i18n/unicode/ulocdata.h"
79 76
80 using base::Time; 77 using base::Time;
81 78
82 namespace net { 79 namespace net {
83 80
84 namespace { 81 namespace {
85 82
86 typedef std::vector<size_t> Offsets; 83 typedef std::vector<size_t> Offsets;
87 84
88 // what we prepend to get a file URL
89 static const base::FilePath::CharType kFileURLPrefix[] =
90 FILE_PATH_LITERAL("file:///");
91
92 // The general list of blocked ports. Will be blocked unless a specific 85 // The general list of blocked ports. Will be blocked unless a specific
93 // protocol overrides it. (Ex: ftp can use ports 20 and 21) 86 // protocol overrides it. (Ex: ftp can use ports 20 and 21)
94 static const int kRestrictedPorts[] = { 87 static const int kRestrictedPorts[] = {
95 1, // tcpmux 88 1, // tcpmux
96 7, // echo 89 7, // echo
97 9, // discard 90 9, // discard
98 11, // systat 91 11, // systat
99 13, // daytime 92 13, // daytime
100 15, // netstat 93 15, // netstat
101 17, // qotd 94 17, // qotd
(...skipping 647 matching lines...) Expand 10 before | Expand all | Expand 10 after
749 if (output_component) { 742 if (output_component) {
750 output_component->begin = static_cast<int>(output_component_begin); 743 output_component->begin = static_cast<int>(output_component_begin);
751 output_component->len = 744 output_component->len =
752 static_cast<int>(output->length() - output_component_begin); 745 static_cast<int>(output->length() - output_component_begin);
753 } 746 }
754 } else if (output_component) { 747 } else if (output_component) {
755 output_component->reset(); 748 output_component->reset();
756 } 749 }
757 } 750 }
758 751
759 void SanitizeGeneratedFileName(base::FilePath::StringType* filename,
760 bool replace_trailing) {
761 const base::FilePath::CharType kReplace[] = FILE_PATH_LITERAL("-");
762 if (filename->empty())
763 return;
764 if (replace_trailing) {
765 // Handle CreateFile() stripping trailing dots and spaces on filenames
766 // http://support.microsoft.com/kb/115827
767 size_t length = filename->size();
768 size_t pos = filename->find_last_not_of(FILE_PATH_LITERAL(" ."));
769 filename->resize((pos == std::string::npos) ? 0 : (pos + 1));
770 base::TrimWhitespace(*filename, base::TRIM_TRAILING, filename);
771 if (filename->empty())
772 return;
773 size_t trimmed = length - filename->size();
774 if (trimmed)
775 filename->insert(filename->end(), trimmed, kReplace[0]);
776 }
777 base::TrimString(*filename, FILE_PATH_LITERAL("."), filename);
778 if (filename->empty())
779 return;
780 // Replace any path information by changing path separators.
781 ReplaceSubstringsAfterOffset(filename, 0, FILE_PATH_LITERAL("/"), kReplace);
782 ReplaceSubstringsAfterOffset(filename, 0, FILE_PATH_LITERAL("\\"), kReplace);
783 }
784
785 // Returns the filename determined from the last component of the path portion
786 // of the URL. Returns an empty string if the URL doesn't have a path or is
787 // invalid. If the generated filename is not reliable,
788 // |should_overwrite_extension| will be set to true, in which case a better
789 // extension should be determined based on the content type.
790 std::string GetFileNameFromURL(const GURL& url,
791 const std::string& referrer_charset,
792 bool* should_overwrite_extension) {
793 // about: and data: URLs don't have file names, but esp. data: URLs may
794 // contain parts that look like ones (i.e., contain a slash). Therefore we
795 // don't attempt to divine a file name out of them.
796 if (!url.is_valid() || url.SchemeIs("about") || url.SchemeIs("data"))
797 return std::string();
798
799 const std::string unescaped_url_filename = UnescapeURLComponent(
800 url.ExtractFileName(),
801 UnescapeRule::SPACES | UnescapeRule::URL_SPECIAL_CHARS);
802
803 // The URL's path should be escaped UTF-8, but may not be.
804 std::string decoded_filename = unescaped_url_filename;
805 if (!IsStringUTF8(decoded_filename)) {
806 // TODO(jshin): this is probably not robust enough. To be sure, we need
807 // encoding detection.
808 base::string16 utf16_output;
809 if (!referrer_charset.empty() &&
810 base::CodepageToUTF16(unescaped_url_filename,
811 referrer_charset.c_str(),
812 base::OnStringConversionError::FAIL,
813 &utf16_output)) {
814 decoded_filename = base::UTF16ToUTF8(utf16_output);
815 } else {
816 decoded_filename = base::WideToUTF8(
817 base::SysNativeMBToWide(unescaped_url_filename));
818 }
819 }
820 // If the URL contains a (possibly empty) query, assume it is a generator, and
821 // allow the determined extension to be overwritten.
822 *should_overwrite_extension = !decoded_filename.empty() && url.has_query();
823
824 return decoded_filename;
825 }
826
827 // Returns whether the specified extension is automatically integrated into the
828 // windows shell.
829 bool IsShellIntegratedExtension(const base::FilePath::StringType& extension) {
830 base::FilePath::StringType extension_lower = StringToLowerASCII(extension);
831
832 // http://msdn.microsoft.com/en-us/library/ms811694.aspx
833 // Right-clicking on shortcuts can be magical.
834 if ((extension_lower == FILE_PATH_LITERAL("local")) ||
835 (extension_lower == FILE_PATH_LITERAL("lnk")))
836 return true;
837
838 // http://www.juniper.net/security/auto/vulnerabilities/vuln2612.html
839 // Files become magical if they end in a CLSID, so block such extensions.
840 if (!extension_lower.empty() &&
841 (extension_lower[0] == FILE_PATH_LITERAL('{')) &&
842 (extension_lower[extension_lower.length() - 1] == FILE_PATH_LITERAL('}')))
843 return true;
844 return false;
845 }
846
847 // Returns whether the specified file name is a reserved name on windows.
848 // This includes names like "com2.zip" (which correspond to devices) and
849 // desktop.ini and thumbs.db which have special meaning to the windows shell.
850 bool IsReservedName(const base::FilePath::StringType& filename) {
851 // This list is taken from the MSDN article "Naming a file"
852 // http://msdn2.microsoft.com/en-us/library/aa365247(VS.85).aspx
853 // I also added clock$ because GetSaveFileName seems to consider it as a
854 // reserved name too.
855 static const char* const known_devices[] = {
856 "con", "prn", "aux", "nul", "com1", "com2", "com3", "com4", "com5",
857 "com6", "com7", "com8", "com9", "lpt1", "lpt2", "lpt3", "lpt4",
858 "lpt5", "lpt6", "lpt7", "lpt8", "lpt9", "clock$"
859 };
860 #if defined(OS_WIN)
861 std::string filename_lower = StringToLowerASCII(base::WideToUTF8(filename));
862 #elif defined(OS_POSIX)
863 std::string filename_lower = StringToLowerASCII(filename);
864 #endif
865
866 for (size_t i = 0; i < arraysize(known_devices); ++i) {
867 // Exact match.
868 if (filename_lower == known_devices[i])
869 return true;
870 // Starts with "DEVICE.".
871 if (filename_lower.find(std::string(known_devices[i]) + ".") == 0)
872 return true;
873 }
874
875 static const char* const magic_names[] = {
876 // These file names are used by the "Customize folder" feature of the shell.
877 "desktop.ini",
878 "thumbs.db",
879 };
880
881 for (size_t i = 0; i < arraysize(magic_names); ++i) {
882 if (filename_lower == magic_names[i])
883 return true;
884 }
885
886 return false;
887 }
888
889 // Examines the current extension in |file_name| and modifies it if necessary in
890 // order to ensure the filename is safe. If |file_name| doesn't contain an
891 // extension or if |ignore_extension| is true, then a new extension will be
892 // constructed based on the |mime_type|.
893 //
894 // We're addressing two things here:
895 //
896 // 1) Usability. If there is no reliable file extension, we want to guess a
897 // reasonable file extension based on the content type.
898 //
899 // 2) Shell integration. Some file extensions automatically integrate with the
900 // shell. We block these extensions to prevent a malicious web site from
901 // integrating with the user's shell.
902 void EnsureSafeExtension(const std::string& mime_type,
903 bool ignore_extension,
904 base::FilePath* file_name) {
905 // See if our file name already contains an extension.
906 base::FilePath::StringType extension = file_name->Extension();
907 if (!extension.empty())
908 extension.erase(extension.begin()); // Erase preceding '.'.
909
910 if ((ignore_extension || extension.empty()) && !mime_type.empty()) {
911 base::FilePath::StringType preferred_mime_extension;
912 std::vector<base::FilePath::StringType> all_mime_extensions;
913 // The GetPreferredExtensionForMimeType call will end up going to disk. Do
914 // this on another thread to avoid slowing the IO thread.
915 // http://crbug.com/61827
916 // TODO(asanka): Remove this ScopedAllowIO once all callers have switched
917 // over to IO safe threads.
918 base::ThreadRestrictions::ScopedAllowIO allow_io;
919 net::GetPreferredExtensionForMimeType(mime_type, &preferred_mime_extension);
920 net::GetExtensionsForMimeType(mime_type, &all_mime_extensions);
921 // If the existing extension is in the list of valid extensions for the
922 // given type, use it. This avoids doing things like pointlessly renaming
923 // "foo.jpg" to "foo.jpeg".
924 if (std::find(all_mime_extensions.begin(),
925 all_mime_extensions.end(),
926 extension) != all_mime_extensions.end()) {
927 // leave |extension| alone
928 } else if (!preferred_mime_extension.empty()) {
929 extension = preferred_mime_extension;
930 }
931 }
932
933 #if defined(OS_WIN)
934 static const base::FilePath::CharType default_extension[] =
935 FILE_PATH_LITERAL("download");
936
937 // Rename shell-integrated extensions.
938 // TODO(asanka): Consider stripping out the bad extension and replacing it
939 // with the preferred extension for the MIME type if one is available.
940 if (IsShellIntegratedExtension(extension))
941 extension.assign(default_extension);
942 #endif
943
944 *file_name = file_name->ReplaceExtension(extension);
945 }
946
947 bool FilePathToString16(const base::FilePath& path, base::string16* converted) {
948 #if defined(OS_WIN)
949 return base::WideToUTF16(
950 path.value().c_str(), path.value().size(), converted);
951 #elif defined(OS_POSIX)
952 std::string component8 = path.AsUTF8Unsafe();
953 return !component8.empty() &&
954 base::UTF8ToUTF16(component8.c_str(), component8.size(), converted);
955 #endif
956 }
957
958 bool IPNumberPrefixCheck(const IPAddressNumber& ip_number, 752 bool IPNumberPrefixCheck(const IPAddressNumber& ip_number,
959 const unsigned char* ip_prefix, 753 const unsigned char* ip_prefix,
960 size_t prefix_length_in_bits) { 754 size_t prefix_length_in_bits) {
961 // Compare all the bytes that fall entirely within the prefix. 755 // Compare all the bytes that fall entirely within the prefix.
962 int num_entire_bytes_in_prefix = prefix_length_in_bits / 8; 756 int num_entire_bytes_in_prefix = prefix_length_in_bits / 8;
963 for (int i = 0; i < num_entire_bytes_in_prefix; ++i) { 757 for (int i = 0; i < num_entire_bytes_in_prefix; ++i) {
964 if (ip_number[i] != ip_prefix[i]) 758 if (ip_number[i] != ip_prefix[i])
965 return false; 759 return false;
966 } 760 }
967 761
(...skipping 18 matching lines...) Expand all
986 const FormatUrlType kFormatUrlOmitAll = kFormatUrlOmitUsernamePassword | 780 const FormatUrlType kFormatUrlOmitAll = kFormatUrlOmitUsernamePassword |
987 kFormatUrlOmitHTTP | kFormatUrlOmitTrailingSlashOnBareHostname; 781 kFormatUrlOmitHTTP | kFormatUrlOmitTrailingSlashOnBareHostname;
988 782
989 static base::LazyInstance<std::multiset<int> >::Leaky 783 static base::LazyInstance<std::multiset<int> >::Leaky
990 g_explicitly_allowed_ports = LAZY_INSTANCE_INITIALIZER; 784 g_explicitly_allowed_ports = LAZY_INSTANCE_INITIALIZER;
991 785
992 size_t GetCountOfExplicitlyAllowedPorts() { 786 size_t GetCountOfExplicitlyAllowedPorts() {
993 return g_explicitly_allowed_ports.Get().size(); 787 return g_explicitly_allowed_ports.Get().size();
994 } 788 }
995 789
996 GURL FilePathToFileURL(const base::FilePath& path) {
997 // Produce a URL like "file:///C:/foo" for a regular file, or
998 // "file://///server/path" for UNC. The URL canonicalizer will fix up the
999 // latter case to be the canonical UNC form: "file://server/path"
1000 base::FilePath::StringType url_string(kFileURLPrefix);
1001 if (!path.IsAbsolute()) {
1002 base::FilePath current_dir;
1003 PathService::Get(base::DIR_CURRENT, &current_dir);
1004 url_string.append(current_dir.value());
1005 url_string.push_back(base::FilePath::kSeparators[0]);
1006 }
1007 url_string.append(path.value());
1008
1009 // Now do replacement of some characters. Since we assume the input is a
1010 // literal filename, anything the URL parser might consider special should
1011 // be escaped here.
1012
1013 // must be the first substitution since others will introduce percents as the
1014 // escape character
1015 ReplaceSubstringsAfterOffset(&url_string, 0,
1016 FILE_PATH_LITERAL("%"), FILE_PATH_LITERAL("%25"));
1017
1018 // semicolon is supposed to be some kind of separator according to RFC 2396
1019 ReplaceSubstringsAfterOffset(&url_string, 0,
1020 FILE_PATH_LITERAL(";"), FILE_PATH_LITERAL("%3B"));
1021
1022 ReplaceSubstringsAfterOffset(&url_string, 0,
1023 FILE_PATH_LITERAL("#"), FILE_PATH_LITERAL("%23"));
1024
1025 ReplaceSubstringsAfterOffset(&url_string, 0,
1026 FILE_PATH_LITERAL("?"), FILE_PATH_LITERAL("%3F"));
1027
1028 #if defined(OS_POSIX)
1029 ReplaceSubstringsAfterOffset(&url_string, 0,
1030 FILE_PATH_LITERAL("\\"), FILE_PATH_LITERAL("%5C"));
1031 #endif
1032
1033 return GURL(url_string);
1034 }
1035
1036 std::string GetSpecificHeader(const std::string& headers, 790 std::string GetSpecificHeader(const std::string& headers,
1037 const std::string& name) { 791 const std::string& name) {
1038 // We want to grab the Value from the "Key: Value" pairs in the headers, 792 // We want to grab the Value from the "Key: Value" pairs in the headers,
1039 // which should look like this (no leading spaces, \n-separated) (we format 793 // which should look like this (no leading spaces, \n-separated) (we format
1040 // them this way in url_request_inet.cc): 794 // them this way in url_request_inet.cc):
1041 // HTTP/1.1 200 OK\n 795 // HTTP/1.1 200 OK\n
1042 // ETag: "6d0b8-947-24f35ec0"\n 796 // ETag: "6d0b8-947-24f35ec0"\n
1043 // Content-Length: 2375\n 797 // Content-Length: 2375\n
1044 // Content-Type: text/html; charset=UTF-8\n 798 // Content-Type: text/html; charset=UTF-8\n
1045 // Last-Modified: Sun, 03 Sep 2006 04:34:43 GMT\n 799 // Last-Modified: Sun, 03 Sep 2006 04:34:43 GMT\n
(...skipping 148 matching lines...) Expand 10 before | Expand all | Expand 10 after
1194 base::string16 StripWWW(const base::string16& text) { 948 base::string16 StripWWW(const base::string16& text) {
1195 const base::string16 www(base::ASCIIToUTF16("www.")); 949 const base::string16 www(base::ASCIIToUTF16("www."));
1196 return StartsWith(text, www, true) ? text.substr(www.length()) : text; 950 return StartsWith(text, www, true) ? text.substr(www.length()) : text;
1197 } 951 }
1198 952
1199 base::string16 StripWWWFromHost(const GURL& url) { 953 base::string16 StripWWWFromHost(const GURL& url) {
1200 DCHECK(url.is_valid()); 954 DCHECK(url.is_valid());
1201 return StripWWW(base::ASCIIToUTF16(url.host())); 955 return StripWWW(base::ASCIIToUTF16(url.host()));
1202 } 956 }
1203 957
1204 bool IsSafePortablePathComponent(const base::FilePath& component) {
1205 base::string16 component16;
1206 base::FilePath::StringType sanitized = component.value();
1207 SanitizeGeneratedFileName(&sanitized, true);
1208 base::FilePath::StringType extension = component.Extension();
1209 if (!extension.empty())
1210 extension.erase(extension.begin()); // Erase preceding '.'.
1211 return !component.empty() &&
1212 (component == component.BaseName()) &&
1213 (component == component.StripTrailingSeparators()) &&
1214 FilePathToString16(component, &component16) &&
1215 file_util::IsFilenameLegal(component16) &&
1216 !IsShellIntegratedExtension(extension) &&
1217 (sanitized == component.value()) &&
1218 !IsReservedName(component.value());
1219 }
1220
1221 bool IsSafePortableRelativePath(const base::FilePath& path) {
1222 if (path.empty() || path.IsAbsolute() || path.EndsWithSeparator())
1223 return false;
1224 std::vector<base::FilePath::StringType> components;
1225 path.GetComponents(&components);
1226 if (components.empty())
1227 return false;
1228 for (size_t i = 0; i < components.size() - 1; ++i) {
1229 if (!IsSafePortablePathComponent(base::FilePath(components[i])))
1230 return false;
1231 }
1232 return IsSafePortablePathComponent(path.BaseName());
1233 }
1234
1235 void GenerateSafeFileName(const std::string& mime_type,
1236 bool ignore_extension,
1237 base::FilePath* file_path) {
1238 // Make sure we get the right file extension
1239 EnsureSafeExtension(mime_type, ignore_extension, file_path);
1240
1241 #if defined(OS_WIN)
1242 // Prepend "_" to the file name if it's a reserved name
1243 base::FilePath::StringType leaf_name = file_path->BaseName().value();
1244 DCHECK(!leaf_name.empty());
1245 if (IsReservedName(leaf_name)) {
1246 leaf_name = base::FilePath::StringType(FILE_PATH_LITERAL("_")) + leaf_name;
1247 *file_path = file_path->DirName();
1248 if (file_path->value() == base::FilePath::kCurrentDirectory) {
1249 *file_path = base::FilePath(leaf_name);
1250 } else {
1251 *file_path = file_path->Append(leaf_name);
1252 }
1253 }
1254 #endif
1255 }
1256
1257 base::string16 GetSuggestedFilename(const GURL& url,
1258 const std::string& content_disposition,
1259 const std::string& referrer_charset,
1260 const std::string& suggested_name,
1261 const std::string& mime_type,
1262 const std::string& default_name) {
1263 // TODO: this function to be updated to match the httpbis recommendations.
1264 // Talk to abarth for the latest news.
1265
1266 // We don't translate this fallback string, "download". If localization is
1267 // needed, the caller should provide localized fallback in |default_name|.
1268 static const base::FilePath::CharType kFinalFallbackName[] =
1269 FILE_PATH_LITERAL("download");
1270 std::string filename; // In UTF-8
1271 bool overwrite_extension = false;
1272
1273 // Try to extract a filename from content-disposition first.
1274 if (!content_disposition.empty()) {
1275 HttpContentDisposition header(content_disposition, referrer_charset);
1276 filename = header.filename();
1277 }
1278
1279 // Then try to use the suggested name.
1280 if (filename.empty() && !suggested_name.empty())
1281 filename = suggested_name;
1282
1283 // Now try extracting the filename from the URL. GetFileNameFromURL() only
1284 // looks at the last component of the URL and doesn't return the hostname as a
1285 // failover.
1286 if (filename.empty())
1287 filename = GetFileNameFromURL(url, referrer_charset, &overwrite_extension);
1288
1289 // Finally try the URL hostname, but only if there's no default specified in
1290 // |default_name|. Some schemes (e.g.: file:, about:, data:) do not have a
1291 // host name.
1292 if (filename.empty() &&
1293 default_name.empty() &&
1294 url.is_valid() &&
1295 !url.host().empty()) {
1296 // TODO(jungshik) : Decode a 'punycoded' IDN hostname. (bug 1264451)
1297 filename = url.host();
1298 }
1299
1300 bool replace_trailing = false;
1301 base::FilePath::StringType result_str, default_name_str;
1302 #if defined(OS_WIN)
1303 replace_trailing = true;
1304 result_str = base::UTF8ToUTF16(filename);
1305 default_name_str = base::UTF8ToUTF16(default_name);
1306 #else
1307 result_str = filename;
1308 default_name_str = default_name;
1309 #endif
1310 SanitizeGeneratedFileName(&result_str, replace_trailing);
1311 if (result_str.find_last_not_of(FILE_PATH_LITERAL("-_")) ==
1312 base::FilePath::StringType::npos) {
1313 result_str = !default_name_str.empty() ? default_name_str :
1314 base::FilePath::StringType(kFinalFallbackName);
1315 overwrite_extension = false;
1316 }
1317 file_util::ReplaceIllegalCharactersInPath(&result_str, '-');
1318 base::FilePath result(result_str);
1319 GenerateSafeFileName(mime_type, overwrite_extension, &result);
1320
1321 base::string16 result16;
1322 if (!FilePathToString16(result, &result16)) {
1323 result = base::FilePath(default_name_str);
1324 if (!FilePathToString16(result, &result16)) {
1325 result = base::FilePath(kFinalFallbackName);
1326 FilePathToString16(result, &result16);
1327 }
1328 }
1329 return result16;
1330 }
1331
1332 base::FilePath GenerateFileName(const GURL& url,
1333 const std::string& content_disposition,
1334 const std::string& referrer_charset,
1335 const std::string& suggested_name,
1336 const std::string& mime_type,
1337 const std::string& default_file_name) {
1338 base::string16 file_name = GetSuggestedFilename(url,
1339 content_disposition,
1340 referrer_charset,
1341 suggested_name,
1342 mime_type,
1343 default_file_name);
1344
1345 #if defined(OS_WIN)
1346 base::FilePath generated_name(file_name);
1347 #else
1348 base::FilePath generated_name(
1349 base::SysWideToNativeMB(base::UTF16ToWide(file_name)));
1350 #endif
1351
1352 #if defined(OS_CHROMEOS)
1353 // When doing file manager operations on ChromeOS, the file paths get
1354 // normalized in WebKit layer, so let's ensure downloaded files have
1355 // normalized names. Otherwise, we won't be able to handle files with NFD
1356 // utf8 encoded characters in name.
1357 file_util::NormalizeFileNameEncoding(&generated_name);
1358 #endif
1359
1360 DCHECK(!generated_name.empty());
1361
1362 return generated_name;
1363 }
1364 958
1365 bool IsPortAllowedByDefault(int port) { 959 bool IsPortAllowedByDefault(int port) {
1366 int array_size = arraysize(kRestrictedPorts); 960 int array_size = arraysize(kRestrictedPorts);
1367 for (int i = 0; i < array_size; i++) { 961 for (int i = 0; i < array_size; i++) {
1368 if (kRestrictedPorts[i] == port) { 962 if (kRestrictedPorts[i] == port) {
1369 return false; 963 return false;
1370 } 964 }
1371 } 965 }
1372 return true; 966 return true;
1373 } 967 }
(...skipping 850 matching lines...) Expand 10 before | Expand all | Expand 10 after
2224 } 1818 }
2225 return a1.size() * CHAR_BIT; 1819 return a1.size() * CHAR_BIT;
2226 } 1820 }
2227 1821
2228 unsigned MaskPrefixLength(const IPAddressNumber& mask) { 1822 unsigned MaskPrefixLength(const IPAddressNumber& mask) {
2229 IPAddressNumber all_ones(mask.size(), 0xFF); 1823 IPAddressNumber all_ones(mask.size(), 0xFF);
2230 return CommonPrefixLength(mask, all_ones); 1824 return CommonPrefixLength(mask, all_ones);
2231 } 1825 }
2232 1826
2233 } // namespace net 1827 } // namespace net
OLDNEW
« no previous file with comments | « net/base/net_util.h ('k') | net/base/net_util_posix.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698