|
|
|
|
/*
|
|
|
|
|
* Copyright (C) 2011-2020 Daniel Scharrer
|
|
|
|
|
*
|
|
|
|
|
* This software is provided 'as-is', without any express or implied
|
|
|
|
|
* warranty. In no event will the author(s) be held liable for any damages
|
|
|
|
|
* arising from the use of this software.
|
|
|
|
|
*
|
|
|
|
|
* Permission is granted to anyone to use this software for any purpose,
|
|
|
|
|
* including commercial applications, and to alter it and redistribute it
|
|
|
|
|
* freely, subject to the following restrictions:
|
|
|
|
|
*
|
|
|
|
|
* 1. The origin of this software must not be misrepresented; you must not
|
|
|
|
|
* claim that you wrote the original software. If you use this software
|
|
|
|
|
* in a product, an acknowledgment in the product documentation would be
|
|
|
|
|
* appreciated but is not required.
|
|
|
|
|
* 2. Altered source versions must be plainly marked as such, and must not be
|
|
|
|
|
* misrepresented as being the original software.
|
|
|
|
|
* 3. This notice may not be removed or altered from any source distribution.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include "setup/info.hpp"
|
|
|
|
|
|
|
|
|
|
#include <cassert>
|
|
|
|
|
#include <istream>
|
|
|
|
|
#include <sstream>
|
|
|
|
|
|
|
|
|
|
#include <boost/foreach.hpp>
|
|
|
|
|
|
|
|
|
|
#include "crypto/hasher.hpp"
|
|
|
|
|
#include "crypto/pbkdf2.hpp"
|
|
|
|
|
#include "crypto/sha256.hpp"
|
|
|
|
|
#include "crypto/xchacha20.hpp"
|
|
|
|
|
#include "crypto/crc32.hpp"
|
|
|
|
|
#include "setup/component.hpp"
|
|
|
|
|
#include "setup/data.hpp"
|
|
|
|
|
#include "setup/delete.hpp"
|
|
|
|
|
#include "setup/directory.hpp"
|
|
|
|
|
#include "setup/file.hpp"
|
|
|
|
|
#include "setup/icon.hpp"
|
|
|
|
|
#include "setup/ini.hpp"
|
|
|
|
|
#include "setup/item.hpp"
|
|
|
|
|
#include "setup/issigkey.hpp"
|
|
|
|
|
#include "setup/language.hpp"
|
|
|
|
|
#include "setup/message.hpp"
|
|
|
|
|
#include "setup/permission.hpp"
|
|
|
|
|
#include "setup/registry.hpp"
|
|
|
|
|
#include "setup/run.hpp"
|
|
|
|
|
#include "setup/task.hpp"
|
|
|
|
|
#include "setup/type.hpp"
|
|
|
|
|
#include "stream/block.hpp"
|
|
|
|
|
#include "util/endian.hpp"
|
|
|
|
|
#include "util/fstream.hpp"
|
|
|
|
|
#include "util/load.hpp"
|
|
|
|
|
#include "util/log.hpp"
|
|
|
|
|
#include "util/output.hpp"
|
|
|
|
|
|
|
|
|
|
namespace setup {
|
|
|
|
|
|
|
|
|
|
template <class Entry>
|
|
|
|
|
void info::load_entries(std::istream & is, entry_types entries, size_t count,
|
|
|
|
|
std::vector<Entry> & result, entry_types::enum_type entry_type) {
|
|
|
|
|
|
|
|
|
|
result.clear();
|
|
|
|
|
if(entries & entry_type) {
|
|
|
|
|
result.resize(count);
|
|
|
|
|
for(size_t i = 0; i < count; i++) {
|
|
|
|
|
result[i].load(is, *this);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
for(size_t i = 0; i < count; i++) {
|
|
|
|
|
Entry entry;
|
|
|
|
|
entry.load(is, *this);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
|
|
void load_wizard_images(std::istream & is, const setup::version & version,
|
|
|
|
|
std::vector<std::string> & images, info::entry_types entries) {
|
|
|
|
|
|
|
|
|
|
size_t count = 1;
|
|
|
|
|
if(version >= INNO_VERSION(5, 6, 0)) {
|
|
|
|
|
count = util::load<boost::uint32_t>(is);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(entries & (info::WizardImages | info::NoSkip)) {
|
|
|
|
|
images.resize(count);
|
|
|
|
|
for(size_t i = 0; i < count; i++) {
|
|
|
|
|
is >> util::binary_string(images[i]);
|
|
|
|
|
}
|
|
|
|
|
if(version < INNO_VERSION(5, 6, 0) && images[0].empty()) {
|
|
|
|
|
images.clear();
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
for(size_t i = 0; i < count; i++) {
|
|
|
|
|
util::binary_string::skip(is);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void load_wizard_and_decompressor(std::istream & is, const setup::version & version,
|
|
|
|
|
const setup::header & header,
|
|
|
|
|
setup::info & info, info::entry_types entries) {
|
|
|
|
|
|
|
|
|
|
info.wizard_images.clear();
|
|
|
|
|
info.wizard_images_small.clear();
|
|
|
|
|
|
|
|
|
|
load_wizard_images(is, version, info.wizard_images, entries);
|
|
|
|
|
|
|
|
|
|
if(version >= INNO_VERSION(2, 0, 0) || version.is_isx()) {
|
|
|
|
|
load_wizard_images(is, version, info.wizard_images_small, entries);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
info.decompressor_dll.clear();
|
|
|
|
|
if(header.compression == stream::BZip2
|
|
|
|
|
|| (header.compression == stream::LZMA1 && version == INNO_VERSION(4, 1, 5))
|
|
|
|
|
|| (header.compression == stream::Zlib && version >= INNO_VERSION(4, 2, 6))) {
|
|
|
|
|
if(entries & (info::DecompressorDll | info::NoSkip)) {
|
|
|
|
|
is >> util::binary_string(info.decompressor_dll);
|
|
|
|
|
} else {
|
|
|
|
|
// decompressor dll - we don't need this
|
|
|
|
|
util::binary_string::skip(is);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
info.decrypt_dll.clear();
|
|
|
|
|
if((header.options & header::EncryptionUsed) && version < INNO_VERSION(6, 4, 0)) {
|
|
|
|
|
if(entries & (info::DecryptDll | info::NoSkip)) {
|
|
|
|
|
is >> util::binary_string(info.decrypt_dll);
|
|
|
|
|
} else {
|
|
|
|
|
// decrypt dll - we don't need this
|
|
|
|
|
util::binary_string::skip(is);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void check_is_end(stream::block_reader::pointer & is, const char * what) {
|
|
|
|
|
is->exceptions(std::ios_base::goodbit);
|
|
|
|
|
char dummy;
|
|
|
|
|
if(!is->get(dummy).eof()) {
|
|
|
|
|
throw std::ios_base::failure(what);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
} // anonymous namespace
|
|
|
|
|
|
|
|
|
|
void info::try_load(std::istream & is, entry_types entries, util::codepage_id force_codepage) {
|
|
|
|
|
|
|
|
|
|
debug("trying to load setup headers for version " << version);
|
|
|
|
|
|
|
|
|
|
if((entries & (Messages | NoSkip)) || (!version.is_unicode() && !force_codepage)) {
|
|
|
|
|
entries |= Languages;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
stream::block_reader::pointer reader = stream::block_reader::get(is, version);
|
|
|
|
|
|
|
|
|
|
debug("loading main header");
|
|
|
|
|
header.load(*reader, version);
|
|
|
|
|
|
|
|
|
|
debug("loading " << header.language_count << " languages");
|
|
|
|
|
load_entries(*reader, entries, header.language_count, languages, Languages);
|
|
|
|
|
|
|
|
|
|
debug("determining encoding");
|
|
|
|
|
if(version.is_unicode()) {
|
|
|
|
|
// Unicode installers are always UTF16-LE, do not allow users to override that.
|
|
|
|
|
codepage = util::cp_utf16le;
|
|
|
|
|
} else if(force_codepage) {
|
|
|
|
|
codepage = force_codepage;
|
|
|
|
|
} else if(languages.empty()) {
|
|
|
|
|
codepage = util::cp_windows1252;
|
|
|
|
|
} else {
|
|
|
|
|
// Non-Unicode installers do not have a defined codepage but instead just assume the
|
|
|
|
|
// codepage of the system the installer is run on.
|
|
|
|
|
// Look at the list of available languages to guess a suitable codepage.
|
|
|
|
|
codepage = languages[0].codepage;
|
|
|
|
|
BOOST_FOREACH(const language_entry & language, languages) {
|
|
|
|
|
if(language.codepage == util::cp_windows1252) {
|
|
|
|
|
codepage = util::cp_windows1252;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
header.decode(codepage);
|
|
|
|
|
BOOST_FOREACH(language_entry & language, languages) {
|
|
|
|
|
language.decode(codepage);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(version < INNO_VERSION(4, 0, 0)) {
|
|
|
|
|
debug("loading images and plugins");
|
|
|
|
|
load_wizard_and_decompressor(*reader, version, header, *this, entries);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
debug("loading " << header.message_count << " messages");
|
|
|
|
|
load_entries(*reader, entries, header.message_count, messages, Messages);
|
|
|
|
|
debug("loading " << header.permission_count << " permissions");
|
|
|
|
|
load_entries(*reader, entries, header.permission_count, permissions, Permissions);
|
|
|
|
|
debug("loading " << header.type_count << " types");
|
|
|
|
|
load_entries(*reader, entries, header.type_count, types, Types);
|
|
|
|
|
debug("loading " << header.component_count << " components");
|
|
|
|
|
load_entries(*reader, entries, header.component_count, components, Components);
|
|
|
|
|
debug("loading " << header.task_count << " tasks");
|
|
|
|
|
load_entries(*reader, entries, header.task_count, tasks, Tasks);
|
|
|
|
|
debug("loading " << header.directory_count << " directories");
|
|
|
|
|
load_entries(*reader, entries, header.directory_count, directories, Directories);
|
|
|
|
|
debug("loading " << header.issig_key_count << " issigs");
|
|
|
|
|
load_entries(*reader, entries, header.issig_key_count, issig_keys, ISSigs);
|
|
|
|
|
debug("loading " << header.file_count << " files");
|
|
|
|
|
load_entries(*reader, entries, header.file_count, files, Files);
|
|
|
|
|
debug("loading " << header.icon_count << " icons");
|
|
|
|
|
load_entries(*reader, entries, header.icon_count, icons, Icons);
|
|
|
|
|
debug("loading " << header.ini_entry_count << " ini entries");
|
|
|
|
|
load_entries(*reader, entries, header.ini_entry_count, ini_entries, IniEntries);
|
|
|
|
|
debug("loading " << header.registry_entry_count << " registry entries");
|
|
|
|
|
load_entries(*reader, entries, header.registry_entry_count, registry_entries, RegistryEntries);
|
|
|
|
|
debug("loading " << header.delete_entry_count << " delete entries");
|
|
|
|
|
load_entries(*reader, entries, header.delete_entry_count, delete_entries, DeleteEntries);
|
|
|
|
|
debug("loading " << header.uninstall_delete_entry_count << " uninstall delete entries");
|
|
|
|
|
load_entries(*reader, entries, header.uninstall_delete_entry_count, uninstall_delete_entries,
|
|
|
|
|
UninstallDeleteEntries);
|
|
|
|
|
debug("loading " << header.run_entry_count << " run entries");
|
|
|
|
|
load_entries(*reader, entries, header.run_entry_count, run_entries, RunEntries);
|
|
|
|
|
debug("loading " << header.uninstall_run_entry_count << " uninstall run entries");
|
|
|
|
|
load_entries(*reader, entries, header.uninstall_run_entry_count, uninstall_run_entries,
|
|
|
|
|
UninstallRunEntries);
|
|
|
|
|
|
|
|
|
|
if(version >= INNO_VERSION(4, 0, 0)) {
|
|
|
|
|
debug("loading images and plugins");
|
|
|
|
|
load_wizard_and_decompressor(*reader, version, header, *this, entries);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// restart the compression stream
|
|
|
|
|
check_is_end(reader, "unknown data at end of primary header stream");
|
|
|
|
|
reader = stream::block_reader::get(is, version);
|
|
|
|
|
|
|
|
|
|
debug("loading data entries");
|
|
|
|
|
load_entries(*reader, entries, header.data_entry_count, data_entries, DataEntries);
|
|
|
|
|
|
|
|
|
|
check_is_end(reader, "unknown data at end of secondary header stream");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void info::load(std::istream & is, entry_types entries, util::codepage_id force_codepage,
|
|
|
|
|
boost::uint32_t loader_revision) {
|
|
|
|
|
|
|
|
|
|
version.load(is);
|
|
|
|
|
if(loader_revision == 2 && version >= INNO_VERSION(6, 5, 0)) {
|
|
|
|
|
version.set_64bit();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(!version.known) {
|
|
|
|
|
if(entries & NoUnknownVersion) {
|
|
|
|
|
std::ostringstream oss;
|
|
|
|
|
oss << "Unexpected setup data version: " << version;
|
|
|
|
|
throw std::runtime_error(oss.str());
|
|
|
|
|
}
|
|
|
|
|
log_warning << "Unexpected setup data version: "
|
|
|
|
|
<< color::white << version << color::reset;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
version_constant listed_version = version.value;
|
|
|
|
|
|
|
|
|
|
// Some setup versions didn't increment the data version number when they should have.
|
|
|
|
|
// To work around this, we try to parse the headers for all data versions and use the first
|
|
|
|
|
// version that parses without warnings or errors.
|
|
|
|
|
bool ambiguous = !version.known || version.is_ambiguous();
|
|
|
|
|
if(version.is_ambiguous()) {
|
|
|
|
|
// Force parsing all headers so that we don't miss any errors.
|
|
|
|
|
entries |= NoSkip;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(version >= INNO_VERSION(6, 5, 0)) {
|
|
|
|
|
boost::uint32_t expected_encryption_crc = util::load<boost::uint32_t>(is);
|
|
|
|
|
crypto::crc32 checksum;
|
|
|
|
|
checksum.init();
|
|
|
|
|
boost::uint8_t encryption_use = checksum.load<boost::uint8_t>(is);
|
|
|
|
|
if(encryption_use != 0) {
|
|
|
|
|
log_error << "Unsupported encrypted setup";
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for(int i = 0; i < 16; i++) {
|
|
|
|
|
/* KDFSalt */(void)checksum.load<boost::uint8_t>(is);
|
|
|
|
|
}
|
|
|
|
|
/* KDFIterations */(void)checksum.load<boost::uint32_t>(is);
|
|
|
|
|
/* BaseNonce.RandomXorStartOffset */(void)checksum.load<boost::uint64_t>(is);
|
|
|
|
|
/* BaseNonce.RandomXorFirstSlice */(void)checksum.load<boost::uint32_t>(is);
|
|
|
|
|
for(int i = 0; i < 3; i++) {
|
|
|
|
|
/* BaseNonce.RemainingRandom */(void)checksum.load<boost::uint32_t>(is);
|
|
|
|
|
}
|
|
|
|
|
/* PasswordTest */(void)checksum.load<boost::uint32_t>(is);
|
|
|
|
|
|
|
|
|
|
if(checksum.finalize() != expected_encryption_crc) {
|
|
|
|
|
log_warning << "Encryption header checksum mismatch!";
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool parsed_without_errors = false;
|
|
|
|
|
std::streampos start = is.tellg();
|
|
|
|
|
for(;;) {
|
|
|
|
|
|
|
|
|
|
warning_suppressor warnings;
|
|
|
|
|
|
|
|
|
|
try {
|
|
|
|
|
|
|
|
|
|
// Try to parse headers for this version
|
|
|
|
|
try_load(is, entries, force_codepage);
|
|
|
|
|
|
|
|
|
|
if(warnings) {
|
|
|
|
|
// Parsed without errors but with warnings - try other versions first
|
|
|
|
|
if(!parsed_without_errors) {
|
|
|
|
|
listed_version = version.value;
|
|
|
|
|
parsed_without_errors = true;
|
|
|
|
|
}
|
|
|
|
|
throw std::exception();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
warnings.flush();
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
} catch(...) {
|
|
|
|
|
|
|
|
|
|
is.clear();
|
|
|
|
|
is.seekg(start);
|
|
|
|
|
|
|
|
|
|
version_constant next_version = version.next();
|
|
|
|
|
|
|
|
|
|
if(!ambiguous || !next_version) {
|
|
|
|
|
if(version.value != listed_version) {
|
|
|
|
|
// Rewind to a previous version that had better results and report those
|
|
|
|
|
version.value = listed_version;
|
|
|
|
|
warnings.restore();
|
|
|
|
|
try_load(is, entries, force_codepage);
|
|
|
|
|
} else {
|
|
|
|
|
// Otherwise. report results for the current version
|
|
|
|
|
warnings.flush();
|
|
|
|
|
if(!parsed_without_errors) {
|
|
|
|
|
throw;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Retry with the next version
|
|
|
|
|
version.value = next_version;
|
|
|
|
|
ambiguous = version.is_ambiguous();
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::string info::get_key(const std::string & password) {
|
|
|
|
|
|
|
|
|
|
std::string encoded_password;
|
|
|
|
|
util::from_utf8(password, encoded_password, codepage);
|
|
|
|
|
|
|
|
|
|
if(header.password.type == crypto::PBKDF2_SHA256_XChaCha20) {
|
|
|
|
|
|
|
|
|
|
#if INNOEXTRACT_HAVE_DECRYPTION
|
|
|
|
|
|
|
|
|
|
// 16 bytes PBKDF2 salt + 4 bytes PBKDF2 iterations + 24 bytes ChaCha20 base nonce
|
|
|
|
|
if(header.password_salt.length() != 20 + crypto::xchacha20::nonce_size) {
|
|
|
|
|
throw std::runtime_error("unexpected password salt size");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
std::string result;
|
|
|
|
|
result.resize(crypto::xchacha20::key_size + crypto::xchacha20::nonce_size);
|
|
|
|
|
typedef crypto::pbkdf2<crypto::sha256> pbkdf2;
|
|
|
|
|
pbkdf2::derive(encoded_password.c_str(), encoded_password.length(), &header.password_salt[0], 16,
|
|
|
|
|
util::little_endian::load<boost::uint32_t>(&header.password_salt[16]), &result[0],
|
|
|
|
|
crypto::xchacha20::key_size);
|
|
|
|
|
|
|
|
|
|
std::memcpy(&result[crypto::xchacha20::key_size], &header.password_salt[20],
|
|
|
|
|
crypto::xchacha20::nonce_size);
|
|
|
|
|
|
|
|
|
|
return result;
|
|
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return encoded_password;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool info::check_key(const std::string & key) {
|
|
|
|
|
|
|
|
|
|
if(header.password.type == crypto::PBKDF2_SHA256_XChaCha20) {
|
|
|
|
|
|
|
|
|
|
#if INNOEXTRACT_HAVE_DECRYPTION
|
|
|
|
|
|
|
|
|
|
if(key.length() != crypto::xchacha20::key_size + crypto::xchacha20::nonce_size) {
|
|
|
|
|
throw std::runtime_error("unexpected key size");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
crypto::xchacha20 cipher;
|
|
|
|
|
|
|
|
|
|
char nonce[crypto::xchacha20::nonce_size];
|
|
|
|
|
std::memcpy(nonce, key.c_str() + crypto::xchacha20::key_size, crypto::xchacha20::nonce_size);
|
|
|
|
|
*reinterpret_cast<boost::uint32_t *>(nonce + 8) = ~*reinterpret_cast<boost::uint32_t *>(nonce + 8);
|
|
|
|
|
cipher.init(key.c_str(), nonce);
|
|
|
|
|
|
|
|
|
|
char buffer[] = { 0, 0, 0, 0 };
|
|
|
|
|
cipher.crypt(buffer, buffer, sizeof(buffer));
|
|
|
|
|
|
|
|
|
|
return (std::memcmp(buffer, header.password.check, sizeof(buffer)) == 0);
|
|
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
throw std::runtime_error("XChaCha20 decryption not supported in this build");
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
|
|
crypto::hasher checksum(header.password.type);
|
|
|
|
|
checksum.update(header.password_salt.c_str(), header.password_salt.length());
|
|
|
|
|
checksum.update(key.c_str(), key.length());
|
|
|
|
|
return (checksum.finalize() == header.password);
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
info::info() : codepage(0) { }
|
|
|
|
|
info::~info() { }
|
|
|
|
|
|
|
|
|
|
} // namespace setup
|