123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195 |
- #------------------------------------------------------------------------------
- # $File: jpeg,v 1.21 2014/09/12 20:47:00 christos Exp $
- # JPEG images
- # SunOS 5.5.1 had
- #
- # 0 string \377\330\377\340 JPEG file
- # 0 string \377\330\377\356 JPG file
- #
- # both of which turn into "JPEG image data" here.
- #
- 0 beshort 0xffd8 JPEG image data
- !:mime image/jpeg
- !:apple 8BIMJPEG
- !:strength +2
- >6 string JFIF \b, JFIF standard
- # The following added by Erik Rossen <rossen@freesurf.ch> 1999-09-06
- # in a vain attempt to add image size reporting for JFIF. Note that these
- # tests are not fool-proof since some perfectly valid JPEGs are currently
- # impossible to specify in magic(4) format.
- # First, a little JFIF version info:
- >>11 byte x \b %d.
- >>12 byte x \b%02d
- # Next, the resolution or aspect ratio of the image:
- >>13 byte 0 \b, aspect ratio
- >>13 byte 1 \b, resolution (DPI)
- >>13 byte 2 \b, resolution (DPCM)
- >>14 beshort x \b, density %dx
- >>16 beshort x \b%d
- >>4 beshort x \b, segment length %d
- # Next, show thumbnail info, if it exists:
- >>18 byte !0 \b, thumbnail %dx
- >>>19 byte x \b%d
- # EXIF moved down here to avoid reporting a bogus version number,
- # and EXIF version number printing added.
- # - Patrik R=E5dman <patrik+file-magic@iki.fi>
- >6 string Exif \b, EXIF standard
- # Look for EXIF IFD offset in IFD 0, and then look for EXIF version tag in EXIF IFD.
- # All possible combinations of entries have to be enumerated, since no looping
- # is possible. And both endians are possible...
- # The combinations included below are from real-world JPEGs.
- # Little-endian
- >>12 string II
- # IFD 0 Entry #5:
- >>>70 leshort 0x8769
- # EXIF IFD Entry #1:
- >>>>(78.l+14) leshort 0x9000
- >>>>>(78.l+23) byte x %c
- >>>>>(78.l+24) byte x \b.%c
- >>>>>(78.l+25) byte !0x30 \b%c
- # IFD 0 Entry #9:
- >>>118 leshort 0x8769
- # EXIF IFD Entry #3:
- >>>>(126.l+38) leshort 0x9000
- >>>>>(126.l+47) byte x %c
- >>>>>(126.l+48) byte x \b.%c
- >>>>>(126.l+49) byte !0x30 \b%c
- # IFD 0 Entry #10
- >>>130 leshort 0x8769
- # EXIF IFD Entry #3:
- >>>>(138.l+38) leshort 0x9000
- >>>>>(138.l+47) byte x %c
- >>>>>(138.l+48) byte x \b.%c
- >>>>>(138.l+49) byte !0x30 \b%c
- # EXIF IFD Entry #4:
- >>>>(138.l+50) leshort 0x9000
- >>>>>(138.l+59) byte x %c
- >>>>>(138.l+60) byte x \b.%c
- >>>>>(138.l+61) byte !0x30 \b%c
- # EXIF IFD Entry #5:
- >>>>(138.l+62) leshort 0x9000
- >>>>>(138.l+71) byte x %c
- >>>>>(138.l+72) byte x \b.%c
- >>>>>(138.l+73) byte !0x30 \b%c
- # IFD 0 Entry #11
- >>>142 leshort 0x8769
- # EXIF IFD Entry #3:
- >>>>(150.l+38) leshort 0x9000
- >>>>>(150.l+47) byte x %c
- >>>>>(150.l+48) byte x \b.%c
- >>>>>(150.l+49) byte !0x30 \b%c
- # EXIF IFD Entry #4:
- >>>>(150.l+50) leshort 0x9000
- >>>>>(150.l+59) byte x %c
- >>>>>(150.l+60) byte x \b.%c
- >>>>>(150.l+61) byte !0x30 \b%c
- # EXIF IFD Entry #5:
- >>>>(150.l+62) leshort 0x9000
- >>>>>(150.l+71) byte x %c
- >>>>>(150.l+72) byte x \b.%c
- >>>>>(150.l+73) byte !0x30 \b%c
- # Big-endian
- >>12 string MM
- # IFD 0 Entry #9:
- >>>118 beshort 0x8769
- # EXIF IFD Entry #1:
- >>>>(126.L+14) beshort 0x9000
- >>>>>(126.L+23) byte x %c
- >>>>>(126.L+24) byte x \b.%c
- >>>>>(126.L+25) byte !0x30 \b%c
- # EXIF IFD Entry #3:
- >>>>(126.L+38) beshort 0x9000
- >>>>>(126.L+47) byte x %c
- >>>>>(126.L+48) byte x \b.%c
- >>>>>(126.L+49) byte !0x30 \b%c
- # IFD 0 Entry #10
- >>>130 beshort 0x8769
- # EXIF IFD Entry #3:
- >>>>(138.L+38) beshort 0x9000
- >>>>>(138.L+47) byte x %c
- >>>>>(138.L+48) byte x \b.%c
- >>>>>(138.L+49) byte !0x30 \b%c
- # EXIF IFD Entry #5:
- >>>>(138.L+62) beshort 0x9000
- >>>>>(138.L+71) byte x %c
- >>>>>(138.L+72) byte x \b.%c
- >>>>>(138.L+73) byte !0x30 \b%c
- # IFD 0 Entry #11
- >>>142 beshort 0x8769
- # EXIF IFD Entry #4:
- >>>>(150.L+50) beshort 0x9000
- >>>>>(150.L+59) byte x %c
- >>>>>(150.L+60) byte x \b.%c
- >>>>>(150.L+61) byte !0x30 \b%c
- # Jump to the first segment
- >(4.S+4) use jpeg_segment
- # This uses recursion...
- 0 name jpeg_segment
- >0 beshort 0xFFFE
- >>(2.S+2) use jpeg_segment
- >>2 pstring/HJ x \b, comment: "%s"
- >0 beshort 0xFFC0
- >>(2.S+2) use jpeg_segment
- >>4 byte x \b, baseline, precision %d
- >>7 beshort x \b, %dx
- >>5 beshort x \b%d
- >>9 byte x \b, frames %d
- >0 beshort 0xFFC1
- >>(2.S+2) use jpeg_segment
- >>4 byte x \b, extended sequential, precision %d
- >>7 beshort x \b, %dx
- >>5 beshort x \b%d
- >>9 byte x \b, frames %d
- >0 beshort 0xFFC2
- >>(2.S+2) use jpeg_segment
- >>4 byte x \b, progressive, precision %d
- >>7 beshort x \b, %dx
- >>5 beshort x \b%d
- >>9 byte x \b, frames %d
- # Define Huffman Tables
- >0 beshort 0xFFC4
- >>(2.S+2) use jpeg_segment
- # Application specific markers
- >0 beshort&0xFFE0 =0xFFE0
- >>(2.S+2) use jpeg_segment
- # DB: Define Quantization tables
- # DD: Define Restart interval [XXX: wrong here, it is 4 bytes]
- # D8: Start of image
- # D9: End of image
- # Dn: Restart
- >0 beshort&0xFFD0 =0xFFD0
- >>(2.S+2) use jpeg_segment
- # HSI is Handmade Software's proprietary JPEG encoding scheme
- 0 string hsi1 JPEG image data, HSI proprietary
- # From: David Santinoli <david@santinoli.com>
- 0 string \x00\x00\x00\x0C\x6A\x50\x20\x20\x0D\x0A\x87\x0A JPEG 2000
- # From: Johan van der Knijff <johan.vanderknijff@kb.nl>
- # Added sub-entries for JP2, JPX, JPM and MJ2 formats; added mimetypes
- # https://github.com/bitsgalore/jp2kMagic
- #
- # Now read value of 'Brand' field, which yields a few possibilities:
- >20 string \x6a\x70\x32\x20 Part 1 (JP2)
- !:mime image/jp2
- >20 string \x6a\x70\x78\x20 Part 2 (JPX)
- !:mime image/jpx
- >20 string \x6a\x70\x6d\x20 Part 6 (JPM)
- !:mime image/jpm
- >20 string \x6d\x6a\x70\x32 Part 3 (MJ2)
- !:mime video/mj2
- # Type: JPEG 2000 codesream
- # From: Mathieu Malaterre <mathieu.malaterre@gmail.com>
- 0 belong 0xff4fff51 JPEG 2000 codestream
- 45 beshort 0xff52
|