magic.man 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701
  1. .\" $File: magic.man,v 1.79 2013/04/22 15:30:10 christos Exp $
  2. .Dd April 22, 2013
  3. .Dt MAGIC __FSECTION__
  4. .Os
  5. .\" install as magic.4 on USG, magic.5 on V7, Berkeley and Linux systems.
  6. .Sh NAME
  7. .Nm magic
  8. .Nd file command's magic pattern file
  9. .Sh DESCRIPTION
  10. This manual page documents the format of the magic file as
  11. used by the
  12. .Xr file __CSECTION__
  13. command, version __VERSION__.
  14. The
  15. .Xr file __CSECTION__
  16. command identifies the type of a file using,
  17. among other tests,
  18. a test for whether the file contains certain
  19. .Dq "magic patterns" .
  20. The file
  21. .Pa __MAGIC__
  22. specifies what patterns are to be tested for, what message or
  23. MIME type to print if a particular pattern is found,
  24. and additional information to extract from the file.
  25. .Pp
  26. Each line of the file specifies a test to be performed.
  27. A test compares the data starting at a particular offset
  28. in the file with a byte value, a string or a numeric value.
  29. If the test succeeds, a message is printed.
  30. The line consists of the following fields:
  31. .Bl -tag -width ".Dv message"
  32. .It Dv offset
  33. A number specifying the offset, in bytes, into the file of the data
  34. which is to be tested.
  35. .It Dv type
  36. The type of the data to be tested.
  37. The possible values are:
  38. .Bl -tag -width ".Dv lestring16"
  39. .It Dv byte
  40. A one-byte value.
  41. .It Dv short
  42. A two-byte value in this machine's native byte order.
  43. .It Dv long
  44. A four-byte value in this machine's native byte order.
  45. .It Dv quad
  46. An eight-byte value in this machine's native byte order.
  47. .It Dv float
  48. A 32-bit single precision IEEE floating point number in this machine's native byte order.
  49. .It Dv double
  50. A 64-bit double precision IEEE floating point number in this machine's native byte order.
  51. .It Dv string
  52. A string of bytes.
  53. The string type specification can be optionally followed
  54. by /[WwcCtbT]*.
  55. The
  56. .Dq W
  57. flag compacts whitespace in the target, which must
  58. contain at least one whitespace character.
  59. If the magic has
  60. .Dv n
  61. consecutive blanks, the target needs at least
  62. .Dv n
  63. consecutive blanks to match.
  64. The
  65. .Dq w
  66. flag treats every blank in the magic as an optional blank.
  67. The
  68. .Dq c
  69. flag specifies case insensitive matching: lower case
  70. characters in the magic match both lower and upper case characters in the
  71. target, whereas upper case characters in the magic only match upper case
  72. characters in the target.
  73. The
  74. .Dq C
  75. flag specifies case insensitive matching: upper case
  76. characters in the magic match both lower and upper case characters in the
  77. target, whereas lower case characters in the magic only match upper case
  78. characters in the target.
  79. To do a complete case insensitive match, specify both
  80. .Dq c
  81. and
  82. .Dq C .
  83. The
  84. .Dq t
  85. flag forces the test to be done for text files, while the
  86. .Dq b
  87. flag forces the test to be done for binary files.
  88. The
  89. .Dq T
  90. flag causes the string to be trimmed, i.e. leading and trailing whitespace
  91. is deleted before the string is printed.
  92. .It Dv pstring
  93. A Pascal-style string where the first byte/short/int is interpreted as the
  94. unsigned length.
  95. The length defaults to byte and can be specified as a modifier.
  96. The following modifiers are supported:
  97. .Bl -tag -compact -width B
  98. .It B
  99. A byte length (default).
  100. .It H
  101. A 2 byte big endian length.
  102. .It h
  103. A 2 byte big little length.
  104. .It L
  105. A 4 byte big endian length.
  106. .It l
  107. A 4 byte big little length.
  108. .It J
  109. The length includes itself in its count.
  110. .El
  111. The string is not NUL terminated.
  112. .Dq J
  113. is used rather than the more
  114. valuable
  115. .Dq I
  116. because this type of length is a feature of the JPEG
  117. format.
  118. .It Dv date
  119. A four-byte value interpreted as a UNIX date.
  120. .It Dv qdate
  121. A eight-byte value interpreted as a UNIX date.
  122. .It Dv ldate
  123. A four-byte value interpreted as a UNIX-style date, but interpreted as
  124. local time rather than UTC.
  125. .It Dv qldate
  126. An eight-byte value interpreted as a UNIX-style date, but interpreted as
  127. local time rather than UTC.
  128. .It Dv qwdate
  129. An eight-byte value interpreted as a Windows-style date.
  130. .It Dv beid3
  131. A 32-bit ID3 length in big-endian byte order.
  132. .It Dv beshort
  133. A two-byte value in big-endian byte order.
  134. .It Dv belong
  135. A four-byte value in big-endian byte order.
  136. .It Dv bequad
  137. An eight-byte value in big-endian byte order.
  138. .It Dv befloat
  139. A 32-bit single precision IEEE floating point number in big-endian byte order.
  140. .It Dv bedouble
  141. A 64-bit double precision IEEE floating point number in big-endian byte order.
  142. .It Dv bedate
  143. A four-byte value in big-endian byte order,
  144. interpreted as a Unix date.
  145. .It Dv beqdate
  146. An eight-byte value in big-endian byte order,
  147. interpreted as a Unix date.
  148. .It Dv beldate
  149. A four-byte value in big-endian byte order,
  150. interpreted as a UNIX-style date, but interpreted as local time rather
  151. than UTC.
  152. .It Dv beqldate
  153. An eight-byte value in big-endian byte order,
  154. interpreted as a UNIX-style date, but interpreted as local time rather
  155. than UTC.
  156. .It Dv beqwdate
  157. An eight-byte value in big-endian byte order,
  158. interpreted as a Windows-style date.
  159. .It Dv bestring16
  160. A two-byte unicode (UCS16) string in big-endian byte order.
  161. .It Dv leid3
  162. A 32-bit ID3 length in little-endian byte order.
  163. .It Dv leshort
  164. A two-byte value in little-endian byte order.
  165. .It Dv lelong
  166. A four-byte value in little-endian byte order.
  167. .It Dv lequad
  168. An eight-byte value in little-endian byte order.
  169. .It Dv lefloat
  170. A 32-bit single precision IEEE floating point number in little-endian byte order.
  171. .It Dv ledouble
  172. A 64-bit double precision IEEE floating point number in little-endian byte order.
  173. .It Dv ledate
  174. A four-byte value in little-endian byte order,
  175. interpreted as a UNIX date.
  176. .It Dv leqdate
  177. An eight-byte value in little-endian byte order,
  178. interpreted as a UNIX date.
  179. .It Dv leldate
  180. A four-byte value in little-endian byte order,
  181. interpreted as a UNIX-style date, but interpreted as local time rather
  182. than UTC.
  183. .It Dv leqldate
  184. An eight-byte value in little-endian byte order,
  185. interpreted as a UNIX-style date, but interpreted as local time rather
  186. than UTC.
  187. .It Dv leqwdate
  188. An eight-byte value in little-endian byte order,
  189. interpreted as a Windows-style date.
  190. .It Dv lestring16
  191. A two-byte unicode (UCS16) string in little-endian byte order.
  192. .It Dv melong
  193. A four-byte value in middle-endian (PDP-11) byte order.
  194. .It Dv medate
  195. A four-byte value in middle-endian (PDP-11) byte order,
  196. interpreted as a UNIX date.
  197. .It Dv meldate
  198. A four-byte value in middle-endian (PDP-11) byte order,
  199. interpreted as a UNIX-style date, but interpreted as local time rather
  200. than UTC.
  201. .It Dv indirect
  202. Starting at the given offset, consult the magic database again.
  203. .It Dv name
  204. Define a
  205. .Dq named
  206. magic instance that can be called from another
  207. .Dv use
  208. magic entry, like a subroutine call.
  209. Named instance direct magic offsets are relative to the offset of the
  210. previous matched entry, but indirect offsets are relative to the beginning
  211. of the file as usual.
  212. Named magic entries always match.
  213. .It Dv use
  214. Recursively call the named magic starting from the current offset.
  215. If the name of the referenced begins with a
  216. .Dv ^
  217. then the endianness of the magic is switched; if the magic mentioned
  218. .Dv leshort
  219. for example,
  220. it is treated as
  221. .Dv beshort
  222. and vice versa.
  223. This is useful to avoid duplicating the rules for different endianness.
  224. .It Dv regex
  225. A regular expression match in extended POSIX regular expression syntax
  226. (like egrep).
  227. Regular expressions can take exponential time to process, and their
  228. performance is hard to predict, so their use is discouraged.
  229. When used in production environments, their performance
  230. should be carefully checked.
  231. The type specification can be optionally followed by
  232. .Dv /[c][s] .
  233. The
  234. .Dq c
  235. flag makes the match case insensitive, while the
  236. .Dq s
  237. flag update the offset to the start offset of the match, rather than the end.
  238. The regular expression is tested against line
  239. .Dv N + 1
  240. onwards, where
  241. .Dv N
  242. is the given offset.
  243. Line endings are assumed to be in the machine's native format.
  244. .Dv ^
  245. and
  246. .Dv $
  247. match the beginning and end of individual lines, respectively,
  248. not beginning and end of file.
  249. .It Dv search
  250. A literal string search starting at the given offset.
  251. The same modifier flags can be used as for string patterns.
  252. The modifier flags (if any) must be followed by
  253. .Dv /number
  254. the range, that is, the number of positions at which the match will be
  255. attempted, starting from the start offset.
  256. This is suitable for
  257. searching larger binary expressions with variable offsets, using
  258. .Dv \e
  259. escapes for special characters.
  260. The offset works as for regex.
  261. .It Dv default
  262. This is intended to be used with the test
  263. .Em x
  264. (which is always true) and it has no type.
  265. It matches when no other test at that continuation level has matched before.
  266. Clearing that matched tests for a continuation level, can be done using the
  267. .Dv clear
  268. test.
  269. .It Dv clear
  270. This test is always true and clears the match flag for that continuation level.
  271. It is intended to be used with the
  272. .Dv default
  273. test.
  274. .El
  275. .Pp
  276. For compatibility with the Single
  277. .Ux
  278. Standard, the type specifiers
  279. .Dv dC
  280. and
  281. .Dv d1
  282. are equivalent to
  283. .Dv byte ,
  284. the type specifiers
  285. .Dv uC
  286. and
  287. .Dv u1
  288. are equivalent to
  289. .Dv ubyte ,
  290. the type specifiers
  291. .Dv dS
  292. and
  293. .Dv d2
  294. are equivalent to
  295. .Dv short ,
  296. the type specifiers
  297. .Dv uS
  298. and
  299. .Dv u2
  300. are equivalent to
  301. .Dv ushort ,
  302. the type specifiers
  303. .Dv dI ,
  304. .Dv dL ,
  305. and
  306. .Dv d4
  307. are equivalent to
  308. .Dv long ,
  309. the type specifiers
  310. .Dv uI ,
  311. .Dv uL ,
  312. and
  313. .Dv u4
  314. are equivalent to
  315. .Dv ulong ,
  316. the type specifier
  317. .Dv d8
  318. is equivalent to
  319. .Dv quad ,
  320. the type specifier
  321. .Dv u8
  322. is equivalent to
  323. .Dv uquad ,
  324. and the type specifier
  325. .Dv s
  326. is equivalent to
  327. .Dv string .
  328. In addition, the type specifier
  329. .Dv dQ
  330. is equivalent to
  331. .Dv quad
  332. and the type specifier
  333. .Dv uQ
  334. is equivalent to
  335. .Dv uquad .
  336. .Pp
  337. Each top-level magic pattern (see below for an explanation of levels)
  338. is classified as text or binary according to the types used.
  339. Types
  340. .Dq regex
  341. and
  342. .Dq search
  343. are classified as text tests, unless non-printable characters are used
  344. in the pattern.
  345. All other tests are classified as binary.
  346. A top-level
  347. pattern is considered to be a test text when all its patterns are text
  348. patterns; otherwise, it is considered to be a binary pattern.
  349. When
  350. matching a file, binary patterns are tried first; if no match is
  351. found, and the file looks like text, then its encoding is determined
  352. and the text patterns are tried.
  353. .Pp
  354. The numeric types may optionally be followed by
  355. .Dv \*[Am]
  356. and a numeric value,
  357. to specify that the value is to be AND'ed with the
  358. numeric value before any comparisons are done.
  359. Prepending a
  360. .Dv u
  361. to the type indicates that ordered comparisons should be unsigned.
  362. .It Dv test
  363. The value to be compared with the value from the file.
  364. If the type is
  365. numeric, this value
  366. is specified in C form; if it is a string, it is specified as a C string
  367. with the usual escapes permitted (e.g. \en for new-line).
  368. .Pp
  369. Numeric values
  370. may be preceded by a character indicating the operation to be performed.
  371. It may be
  372. .Dv = ,
  373. to specify that the value from the file must equal the specified value,
  374. .Dv \*[Lt] ,
  375. to specify that the value from the file must be less than the specified
  376. value,
  377. .Dv \*[Gt] ,
  378. to specify that the value from the file must be greater than the specified
  379. value,
  380. .Dv \*[Am] ,
  381. to specify that the value from the file must have set all of the bits
  382. that are set in the specified value,
  383. .Dv ^ ,
  384. to specify that the value from the file must have clear any of the bits
  385. that are set in the specified value, or
  386. .Dv ~ ,
  387. the value specified after is negated before tested.
  388. .Dv x ,
  389. to specify that any value will match.
  390. If the character is omitted, it is assumed to be
  391. .Dv = .
  392. Operators
  393. .Dv \*[Am] ,
  394. .Dv ^ ,
  395. and
  396. .Dv ~
  397. don't work with floats and doubles.
  398. The operator
  399. .Dv !\&
  400. specifies that the line matches if the test does
  401. .Em not
  402. succeed.
  403. .Pp
  404. Numeric values are specified in C form; e.g.
  405. .Dv 13
  406. is decimal,
  407. .Dv 013
  408. is octal, and
  409. .Dv 0x13
  410. is hexadecimal.
  411. .Pp
  412. For string values, the string from the
  413. file must match the specified string.
  414. The operators
  415. .Dv = ,
  416. .Dv \*[Lt]
  417. and
  418. .Dv \*[Gt]
  419. (but not
  420. .Dv \*[Am] )
  421. can be applied to strings.
  422. The length used for matching is that of the string argument
  423. in the magic file.
  424. This means that a line can match any non-empty string (usually used to
  425. then print the string), with
  426. .Em \*[Gt]\e0
  427. (because all non-empty strings are greater than the empty string).
  428. .Pp
  429. The special test
  430. .Em x
  431. always evaluates to true.
  432. .It Dv message
  433. The message to be printed if the comparison succeeds.
  434. If the string contains a
  435. .Xr printf 3
  436. format specification, the value from the file (with any specified masking
  437. performed) is printed using the message as the format string.
  438. If the string begins with
  439. .Dq \eb ,
  440. the message printed is the remainder of the string with no whitespace
  441. added before it: multiple matches are normally separated by a single
  442. space.
  443. .El
  444. .Pp
  445. An APPLE 4+4 character APPLE creator and type can be specified as:
  446. .Bd -literal -offset indent
  447. !:apple CREATYPE
  448. .Ed
  449. .Pp
  450. A MIME type is given on a separate line, which must be the next
  451. non-blank or comment line after the magic line that identifies the
  452. file type, and has the following format:
  453. .Bd -literal -offset indent
  454. !:mime MIMETYPE
  455. .Ed
  456. .Pp
  457. i.e. the literal string
  458. .Dq !:mime
  459. followed by the MIME type.
  460. .Pp
  461. An optional strength can be supplied on a separate line which refers to
  462. the current magic description using the following format:
  463. .Bd -literal -offset indent
  464. !:strength OP VALUE
  465. .Ed
  466. .Pp
  467. The operand
  468. .Dv OP
  469. can be:
  470. .Dv + ,
  471. .Dv - ,
  472. .Dv * ,
  473. or
  474. .Dv /
  475. and
  476. .Dv VALUE
  477. is a constant between 0 and 255.
  478. This constant is applied using the specified operand
  479. to the currently computed default magic strength.
  480. .Pp
  481. Some file formats contain additional information which is to be printed
  482. along with the file type or need additional tests to determine the true
  483. file type.
  484. These additional tests are introduced by one or more
  485. .Em \*[Gt]
  486. characters preceding the offset.
  487. The number of
  488. .Em \*[Gt]
  489. on the line indicates the level of the test; a line with no
  490. .Em \*[Gt]
  491. at the beginning is considered to be at level 0.
  492. Tests are arranged in a tree-like hierarchy:
  493. if the test on a line at level
  494. .Em n
  495. succeeds, all following tests at level
  496. .Em n+1
  497. are performed, and the messages printed if the tests succeed, until a line
  498. with level
  499. .Em n
  500. (or less) appears.
  501. For more complex files, one can use empty messages to get just the
  502. "if/then" effect, in the following way:
  503. .Bd -literal -offset indent
  504. 0 string MZ
  505. \*[Gt]0x18 leshort \*[Lt]0x40 MS-DOS executable
  506. \*[Gt]0x18 leshort \*[Gt]0x3f extended PC executable (e.g., MS Windows)
  507. .Ed
  508. .Pp
  509. Offsets do not need to be constant, but can also be read from the file
  510. being examined.
  511. If the first character following the last
  512. .Em \*[Gt]
  513. is a
  514. .Em \&(
  515. then the string after the parenthesis is interpreted as an indirect offset.
  516. That means that the number after the parenthesis is used as an offset in
  517. the file.
  518. The value at that offset is read, and is used again as an offset
  519. in the file.
  520. Indirect offsets are of the form:
  521. .Em (( x [.[bislBISL]][+\-][ y ]) .
  522. The value of
  523. .Em x
  524. is used as an offset in the file.
  525. A byte, id3 length, short or long is read at that offset depending on the
  526. .Em [bislBISLm]
  527. type specifier.
  528. The capitalized types interpret the number as a big endian
  529. value, whereas the small letter versions interpret the number as a little
  530. endian value;
  531. the
  532. .Em m
  533. type interprets the number as a middle endian (PDP-11) value.
  534. To that number the value of
  535. .Em y
  536. is added and the result is used as an offset in the file.
  537. The default type if one is not specified is long.
  538. .Pp
  539. That way variable length structures can be examined:
  540. .Bd -literal -offset indent
  541. # MS Windows executables are also valid MS-DOS executables
  542. 0 string MZ
  543. \*[Gt]0x18 leshort \*[Lt]0x40 MZ executable (MS-DOS)
  544. # skip the whole block below if it is not an extended executable
  545. \*[Gt]0x18 leshort \*[Gt]0x3f
  546. \*[Gt]\*[Gt](0x3c.l) string PE\e0\e0 PE executable (MS-Windows)
  547. \*[Gt]\*[Gt](0x3c.l) string LX\e0\e0 LX executable (OS/2)
  548. .Ed
  549. .Pp
  550. This strategy of examining has a drawback: You must make sure that
  551. you eventually print something, or users may get empty output (like, when
  552. there is neither PE\e0\e0 nor LE\e0\e0 in the above example)
  553. .Pp
  554. If this indirect offset cannot be used directly, simple calculations are
  555. possible: appending
  556. .Em [+-*/%\*[Am]|^]number
  557. inside parentheses allows one to modify
  558. the value read from the file before it is used as an offset:
  559. .Bd -literal -offset indent
  560. # MS Windows executables are also valid MS-DOS executables
  561. 0 string MZ
  562. # sometimes, the value at 0x18 is less that 0x40 but there's still an
  563. # extended executable, simply appended to the file
  564. \*[Gt]0x18 leshort \*[Lt]0x40
  565. \*[Gt]\*[Gt](4.s*512) leshort 0x014c COFF executable (MS-DOS, DJGPP)
  566. \*[Gt]\*[Gt](4.s*512) leshort !0x014c MZ executable (MS-DOS)
  567. .Ed
  568. .Pp
  569. Sometimes you do not know the exact offset as this depends on the length or
  570. position (when indirection was used before) of preceding fields.
  571. You can specify an offset relative to the end of the last up-level
  572. field using
  573. .Sq \*[Am]
  574. as a prefix to the offset:
  575. .Bd -literal -offset indent
  576. 0 string MZ
  577. \*[Gt]0x18 leshort \*[Gt]0x3f
  578. \*[Gt]\*[Gt](0x3c.l) string PE\e0\e0 PE executable (MS-Windows)
  579. # immediately following the PE signature is the CPU type
  580. \*[Gt]\*[Gt]\*[Gt]\*[Am]0 leshort 0x14c for Intel 80386
  581. \*[Gt]\*[Gt]\*[Gt]\*[Am]0 leshort 0x184 for DEC Alpha
  582. .Ed
  583. .Pp
  584. Indirect and relative offsets can be combined:
  585. .Bd -literal -offset indent
  586. 0 string MZ
  587. \*[Gt]0x18 leshort \*[Lt]0x40
  588. \*[Gt]\*[Gt](4.s*512) leshort !0x014c MZ executable (MS-DOS)
  589. # if it's not COFF, go back 512 bytes and add the offset taken
  590. # from byte 2/3, which is yet another way of finding the start
  591. # of the extended executable
  592. \*[Gt]\*[Gt]\*[Gt]\*[Am](2.s-514) string LE LE executable (MS Windows VxD driver)
  593. .Ed
  594. .Pp
  595. Or the other way around:
  596. .Bd -literal -offset indent
  597. 0 string MZ
  598. \*[Gt]0x18 leshort \*[Gt]0x3f
  599. \*[Gt]\*[Gt](0x3c.l) string LE\e0\e0 LE executable (MS-Windows)
  600. # at offset 0x80 (-4, since relative offsets start at the end
  601. # of the up-level match) inside the LE header, we find the absolute
  602. # offset to the code area, where we look for a specific signature
  603. \*[Gt]\*[Gt]\*[Gt](\*[Am]0x7c.l+0x26) string UPX \eb, UPX compressed
  604. .Ed
  605. .Pp
  606. Or even both!
  607. .Bd -literal -offset indent
  608. 0 string MZ
  609. \*[Gt]0x18 leshort \*[Gt]0x3f
  610. \*[Gt]\*[Gt](0x3c.l) string LE\e0\e0 LE executable (MS-Windows)
  611. # at offset 0x58 inside the LE header, we find the relative offset
  612. # to a data area where we look for a specific signature
  613. \*[Gt]\*[Gt]\*[Gt]\*[Am](\*[Am]0x54.l-3) string UNACE \eb, ACE self-extracting archive
  614. .Ed
  615. .Pp
  616. If you have to deal with offset/length pairs in your file, even the
  617. second value in a parenthesized expression can be taken from the file itself,
  618. using another set of parentheses.
  619. Note that this additional indirect offset is always relative to the
  620. start of the main indirect offset.
  621. .Bd -literal -offset indent
  622. 0 string MZ
  623. \*[Gt]0x18 leshort \*[Gt]0x3f
  624. \*[Gt]\*[Gt](0x3c.l) string PE\e0\e0 PE executable (MS-Windows)
  625. # search for the PE section called ".idata"...
  626. \*[Gt]\*[Gt]\*[Gt]\*[Am]0xf4 search/0x140 .idata
  627. # ...and go to the end of it, calculated from start+length;
  628. # these are located 14 and 10 bytes after the section name
  629. \*[Gt]\*[Gt]\*[Gt]\*[Gt](\*[Am]0xe.l+(-4)) string PK\e3\e4 \eb, ZIP self-extracting archive
  630. .Ed
  631. .Pp
  632. If you have a list of known avalues at a particular continuation level,
  633. and you want to provide a switch-like default case:
  634. .Bd -literal -offset indent
  635. # clear that continuation level match
  636. \*[Gt]18 clear
  637. \*[Gt]18 lelong 1 one
  638. \*[Gt]18 lelong 2 two
  639. \*[Gt]18 default x
  640. # print default match
  641. \*[Gt]\*[Gt]18 lelong x unmatched 0x%x
  642. .Ed
  643. .Sh SEE ALSO
  644. .Xr file __CSECTION__
  645. \- the command that reads this file.
  646. .Sh BUGS
  647. The formats
  648. .Dv long ,
  649. .Dv belong ,
  650. .Dv lelong ,
  651. .Dv melong ,
  652. .Dv short ,
  653. .Dv beshort ,
  654. and
  655. .Dv leshort
  656. do not depend on the length of the C data types
  657. .Dv short
  658. and
  659. .Dv long
  660. on the platform, even though the Single
  661. .Ux
  662. Specification implies that they do. However, as OS X Mountain Lion has
  663. passed the Single
  664. .Ux
  665. Specification validation suite, and supplies a version of
  666. .Xr file __CSECTION__
  667. in which they do not depend on the sizes of the C data types and that is
  668. built for a 64-bit environment in which
  669. .Dv long
  670. is 8 bytes rather than 4 bytes, presumably the validation suite does not
  671. test whether, for example
  672. .Dv long
  673. refers to an item with the same size as the C data type
  674. .Dv long .
  675. There should probably be
  676. .Dv type
  677. names
  678. .Dv int8 ,
  679. .Dv uint8 ,
  680. .Dv int16 ,
  681. .Dv uint16 ,
  682. .Dv int32 ,
  683. .Dv uint32 ,
  684. .Dv int64 ,
  685. and
  686. .Dv uint64 ,
  687. and specified-byte-order variants of them,
  688. to make it clearer that those types have specified widths.
  689. .\"
  690. .\" From: guy@sun.uucp (Guy Harris)
  691. .\" Newsgroups: net.bugs.usg
  692. .\" Subject: /etc/magic's format isn't well documented
  693. .\" Message-ID: <2752@sun.uucp>
  694. .\" Date: 3 Sep 85 08:19:07 GMT
  695. .\" Organization: Sun Microsystems, Inc.
  696. .\" Lines: 136
  697. .\"
  698. .\" Here's a manual page for the format accepted by the "file" made by adding
  699. .\" the changes I posted to the S5R2 version.
  700. .\"
  701. .\" Modified for Ian Darwin's version of the file command.