X-Git-Url: https://main.carlh.net/gitweb/?a=blobdiff_plain;f=src%2Futil.cc;h=f2728a38d25bbc042025e4e23f6def45e505d752;hb=781982ea9a78f88fef130dc08cd028b7e5f47937;hp=7138a075db5e29ab401a16fba7e631cc2ce0821f;hpb=9a9d4e014c16be88d72914a9480343445bc785a5;p=libdcp.git diff --git a/src/util.cc b/src/util.cc index 7138a075..f2728a38 100644 --- a/src/util.cc +++ b/src/util.cc @@ -26,17 +26,39 @@ #include #include #include +#include #include +#include +#include +#include +#include +#include #include "KM_util.h" #include "KM_fileio.h" #include "AS_DCP.h" #include "util.h" #include "exceptions.h" #include "types.h" +#include "argb_frame.h" +#include "certificates.h" +#include "gamma_lut.h" +#include "xyz_frame.h" -using namespace std; -using namespace boost; +using std::string; +using std::cout; +using std::stringstream; +using std::min; +using std::max; +using std::list; +using std::setw; +using std::setfill; +using boost::shared_ptr; +using boost::lexical_cast; +using namespace libdcp; +/** Create a UUID. + * @return UUID. + */ string libdcp::make_uuid () { @@ -47,21 +69,29 @@ libdcp::make_uuid () return string (buffer); } + +/** Create a digest for a file. + * @param filename File name. + * @param progress Pointer to a progress reporting function, or 0. The function will be called + * with a progress value between 0 and 1. + * @return Digest. + */ string -libdcp::make_digest (string filename, sigc::signal1* progress) +libdcp::make_digest (string filename, boost::function* progress) { - int const file_size = filesystem::file_size (filename); - Kumu::FileReader reader; if (ASDCP_FAILURE (reader.OpenRead (filename.c_str ()))) { - throw FileError ("could not open file to compute digest", filename); + boost::throw_exception (FileError ("could not open file to compute digest", filename)); } SHA_CTX sha; SHA1_Init (&sha); - - Kumu::ByteString read_buffer (65536); - int done = 0; + + int const buffer_size = 65536; + Kumu::ByteString read_buffer (buffer_size); + + Kumu::fsize_t done = 0; + Kumu::fsize_t const size = reader.Size (); while (1) { ui32_t read = 0; Kumu::Result_t r = reader.Read (read_buffer.Data(), read_buffer.Capacity(), &read); @@ -69,25 +99,29 @@ libdcp::make_digest (string filename, sigc::signal1* progress) if (r == Kumu::RESULT_ENDOFFILE) { break; } else if (ASDCP_FAILURE (r)) { - throw FileError ("could not read file to compute digest", filename); + boost::throw_exception (FileError ("could not read file to compute digest", filename)); } SHA1_Update (&sha, read_buffer.Data(), read); - done += read; if (progress) { - (*progress) (0.5 + (0.5 * done / file_size)); + (*progress) (float (done) / size); + done += read; } } byte_t byte_buffer[20]; SHA1_Final (byte_buffer, &sha); - stringstream s; char digest[64]; return Kumu::base64encode (byte_buffer, 20, digest, 64); } +/** Convert a content kind to a string which can be used in a + * node. + * @param kind ContentKind. + * @return string. + */ string libdcp::content_kind_to_string (ContentKind kind) { @@ -117,14 +151,21 @@ libdcp::content_kind_to_string (ContentKind kind) assert (false); } +/** Convert a string from a node to a libdcp ContentKind. + * Reasonably tolerant about varying case. + * @param type Content kind string. + * @return libdcp ContentKind. + */ libdcp::ContentKind libdcp::content_kind_from_string (string type) { + /* XXX: should probably just convert type to lower-case and have done with it */ + if (type == "feature") { return FEATURE; } else if (type == "short") { return SHORT; - } else if (type == "trailer") { + } else if (type == "trailer" || type == "Trailer") { return TRAILER; } else if (type == "test") { return TEST; @@ -132,7 +173,7 @@ libdcp::content_kind_from_string (string type) return TRANSITIONAL; } else if (type == "rating") { return RATING; - } else if (type == "teaser") { + } else if (type == "teaser" || type == "Teaser") { return TEASER; } else if (type == "policy") { return POLICY; @@ -144,13 +185,264 @@ libdcp::content_kind_from_string (string type) assert (false); } - + +/** Decompress a JPEG2000 image to a bitmap. + * @param data JPEG2000 data. + * @param size Size of data in bytes. + * @param reduce A power of 2 by which to reduce the size of the decoded image; + * e.g. 0 reduces by (2^0 == 1), ie keeping the same size. + * 1 reduces by (2^1 == 2), ie halving the size of the image. + * This is useful for scaling 4K DCP images down to 2K. + * @return XYZ image. + */ +shared_ptr +libdcp::decompress_j2k (uint8_t* data, int64_t size, int reduce) +{ + opj_dinfo_t* decoder = opj_create_decompress (CODEC_J2K); + opj_dparameters_t parameters; + opj_set_default_decoder_parameters (¶meters); + parameters.cp_reduce = reduce; + opj_setup_decoder (decoder, ¶meters); + opj_cio_t* cio = opj_cio_open ((opj_common_ptr) decoder, data, size); + opj_image_t* image = opj_decode (decoder, cio); + if (!image) { + opj_destroy_decompress (decoder); + opj_cio_close (cio); + boost::throw_exception (DCPReadError ("could not decode JPEG2000 codestream of " + lexical_cast (size) + " bytes.")); + } + + opj_cio_close (cio); + + image->x1 = rint (float(image->x1) / pow (2, reduce)); + image->y1 = rint (float(image->y1) / pow (2, reduce)); + return shared_ptr (new XYZFrame (image)); +} + +/** @param s A string. + * @return true if the string contains only space, newline or tab characters, or is empty. + */ bool -libdcp::ends_with (string big, string little) +libdcp::empty_or_white_space (string s) +{ + for (size_t i = 0; i < s.length(); ++i) { + if (s[i] != ' ' && s[i] != '\n' && s[i] != '\t') { + return false; + } + } + + return true; +} + +void +libdcp::init () +{ + if (xmlSecInit() < 0) { + throw MiscError ("could not initialise xmlsec"); + } + +#ifdef XMLSEC_CRYPTO_DYNAMIC_LOADING + if (xmlSecCryptoDLLoadLibrary(BAD_CAST XMLSEC_CRYPTO) < 0) { + throw MiscError ("unable to load default xmlsec-crypto library"); + } +#endif + + if (xmlSecCryptoAppInit(0) < 0) { + throw MiscError ("could not initialise crypto"); + } + + if (xmlSecCryptoInit() < 0) { + throw MiscError ("could not initialise xmlsec-crypto"); + } +} + +/** Sign an XML node. This function takes a certificate chain (to prove that the sender is bona fide) and + * a private key with which to sign the node. + * + * @param parent Node to sign. + * @param certificates Certificate chain for the signer. + * @param signer_key Filename of the private key of the signer. + * @param ns Namespace to use for the signature XML nodes. + */ +void +libdcp::add_signature_value (xmlpp::Element* parent, CertificateChain const & certificates, boost::filesystem::path signer_key, string const & ns) +{ + parent->add_child("SignatureValue", ns); + + /* Add the certificate chain to a KeyInfo child node of parent */ + xmlpp::Element* key_info = parent->add_child("KeyInfo", ns); + list > c = certificates.leaf_to_root (); + for (list >::iterator i = c.begin(); i != c.end(); ++i) { + xmlpp::Element* data = key_info->add_child("X509Data", ns); + + { + xmlpp::Element* serial = data->add_child("X509IssuerSerial", ns); + serial->add_child("X509IssuerName", ns)->add_child_text((*i)->issuer ()); + serial->add_child("X509SerialNumber", ns)->add_child_text((*i)->serial ()); + } + + data->add_child("X509Certificate", ns)->add_child_text((*i)->certificate()); + } + + xmlSecDSigCtxPtr signature_context = xmlSecDSigCtxCreate (0); + if (signature_context == 0) { + throw MiscError ("could not create signature context"); + } + + signature_context->signKey = xmlSecCryptoAppKeyLoad (signer_key.c_str(), xmlSecKeyDataFormatPem, 0, 0, 0); + if (signature_context->signKey == 0) { + throw FileError ("could not load private key file", signer_key); + } + + /* XXX: set key name to the file name: is this right? */ + if (xmlSecKeySetName (signature_context->signKey, reinterpret_cast (signer_key.c_str())) < 0) { + throw MiscError ("could not set key name"); + } + + if (xmlSecDSigCtxSign (signature_context, parent->cobj ()) < 0) { + throw MiscError ("could not sign"); + } + + xmlSecDSigCtxDestroy (signature_context); +} + + +void +libdcp::add_signer (xmlpp::Element* parent, CertificateChain const & certificates, string const & ns) { - if (little.size() > big.size()) { - return false; + xmlpp::Element* signer = parent->add_child("Signer"); + + { + xmlpp::Element* data = signer->add_child("X509Data", ns); + + { + xmlpp::Element* serial_element = data->add_child("X509IssuerSerial", ns); + serial_element->add_child("X509IssuerName", ns)->add_child_text (certificates.leaf()->issuer()); + serial_element->add_child("X509SerialNumber", ns)->add_child_text (certificates.leaf()->serial()); + } + + data->add_child("X509SubjectName", ns)->add_child_text (certificates.leaf()->subject()); } +} + +/** @param signer_key Filename of private key to sign with */ +void +libdcp::sign (xmlpp::Element* parent, CertificateChain const & certificates, boost::filesystem::path signer_key, bool interop) +{ + add_signer (parent, certificates, "dsig"); + + xmlpp::Element* signature = parent->add_child("Signature", "dsig"); + + { + xmlpp::Element* signed_info = signature->add_child ("SignedInfo", "dsig"); + signed_info->add_child("CanonicalizationMethod", "dsig")->set_attribute ("Algorithm", "http://www.w3.org/TR/2001/REC-xml-c14n-20010315"); + + if (interop) { + signed_info->add_child("SignatureMethod", "dsig")->set_attribute("Algorithm", "http://www.w3.org/2000/09/xmldsig#rsa-sha1"); + } else { + signed_info->add_child("SignatureMethod", "dsig")->set_attribute("Algorithm", "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"); + } + + { + xmlpp::Element* reference = signed_info->add_child("Reference", "dsig"); + reference->set_attribute ("URI", ""); + { + xmlpp::Element* transforms = reference->add_child("Transforms", "dsig"); + transforms->add_child("Transform", "dsig")->set_attribute ( + "Algorithm", "http://www.w3.org/2000/09/xmldsig#enveloped-signature" + ); + } + reference->add_child("DigestMethod", "dsig")->set_attribute("Algorithm", "http://www.w3.org/2000/09/xmldsig#sha1"); + /* This will be filled in by the signing later */ + reference->add_child("DigestValue", "dsig"); + } + } + + add_signature_value (signature, certificates, signer_key, "dsig"); +} + +bool libdcp::operator== (libdcp::Size const & a, libdcp::Size const & b) +{ + return (a.width == b.width && a.height == b.height); +} + +bool libdcp::operator!= (libdcp::Size const & a, libdcp::Size const & b) +{ + return !(a == b); +} + +/** The base64 decode routine in KM_util.cpp gives different values to both + * this and the command-line base64 for some inputs. Not sure why. + */ +int +libdcp::base64_decode (string const & in, unsigned char* out, int out_length) +{ + BIO* b64 = BIO_new (BIO_f_base64 ()); - return big.compare (big.length() - little.length(), little.length(), little) == 0; + /* This means the input should have no newlines */ + BIO_set_flags (b64, BIO_FLAGS_BASE64_NO_NL); + + /* Copy our input string, removing newlines */ + char in_buffer[in.size() + 1]; + char* p = in_buffer; + for (size_t i = 0; i < in.size(); ++i) { + if (in[i] != '\n' && in[i] != '\r') { + *p++ = in[i]; + } + } + + BIO* bmem = BIO_new_mem_buf (in_buffer, p - in_buffer); + bmem = BIO_push (b64, bmem); + int const N = BIO_read (bmem, out, out_length); + BIO_free_all (bmem); + + return N; +} + +string +libdcp::tm_to_string (struct tm* tm) +{ + char buffer[64]; + strftime (buffer, 64, "%Y-%m-%dT%I:%M:%S", tm); + + int offset = 0; + +#ifdef LIBDCP_POSIX + offset = tm->tm_gmtoff / 60; +#else + TIME_ZONE_INFORMATION tz; + GetTimeZoneInformation (&tz); + offset = tz.Bias; +#endif + + return string (buffer) + utc_offset_to_string (offset); +} + +/** @param b Offset from UTC to local time in minutes. + * @return string of the form e.g. -01:00. + */ +string +libdcp::utc_offset_to_string (int b) +{ + bool const negative = (b < 0); + b = negative ? -b : b; + + int const hours = b / 60; + int const minutes = b % 60; + + stringstream o; + if (negative) { + o << "-"; + } else { + o << "+"; + } + + o << setw(2) << setfill('0') << hours << ":" << setw(2) << setfill('0') << minutes; + return o.str (); +} + +string +libdcp::ptime_to_string (boost::posix_time::ptime t) +{ + struct tm t_tm = boost::posix_time::to_tm (t); + return tm_to_string (&t_tm); }