You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 

428 lines
14 KiB

/*
* Copyright (C) 2011-2020 Daniel Scharrer
*
* This software is provided 'as-is', without any express or implied
* warranty. In no event will the author(s) be held liable for any damages
* arising from the use of this software.
*
* Permission is granted to anyone to use this software for any purpose,
* including commercial applications, and to alter it and redistribute it
* freely, subject to the following restrictions:
*
* 1. The origin of this software must not be misrepresented; you must not
* claim that you wrote the original software. If you use this software
* in a product, an acknowledgment in the product documentation would be
* appreciated but is not required.
* 2. Altered source versions must be plainly marked as such, and must not be
* misrepresented as being the original software.
* 3. This notice may not be removed or altered from any source distribution.
*/
#include "setup/info.hpp"
#include <cassert>
#include <istream>
#include <sstream>
#include <boost/foreach.hpp>
#include "crypto/hasher.hpp"
#include "crypto/pbkdf2.hpp"
#include "crypto/sha256.hpp"
#include "crypto/xchacha20.hpp"
#include "crypto/crc32.hpp"
#include "setup/component.hpp"
#include "setup/data.hpp"
#include "setup/delete.hpp"
#include "setup/directory.hpp"
#include "setup/file.hpp"
#include "setup/icon.hpp"
#include "setup/ini.hpp"
#include "setup/item.hpp"
#include "setup/issigkey.hpp"
#include "setup/language.hpp"
#include "setup/message.hpp"
#include "setup/permission.hpp"
#include "setup/registry.hpp"
#include "setup/run.hpp"
#include "setup/task.hpp"
#include "setup/type.hpp"
#include "stream/block.hpp"
#include "util/endian.hpp"
#include "util/fstream.hpp"
#include "util/load.hpp"
#include "util/log.hpp"
#include "util/output.hpp"
namespace setup {
template <class Entry>
void info::load_entries(std::istream & is, entry_types entries, size_t count,
std::vector<Entry> & result, entry_types::enum_type entry_type) {
result.clear();
if(entries & entry_type) {
result.resize(count);
for(size_t i = 0; i < count; i++) {
result[i].load(is, *this);
}
} else {
for(size_t i = 0; i < count; i++) {
Entry entry;
entry.load(is, *this);
}
}
}
namespace {
void load_wizard_images(std::istream & is, const setup::version & version,
std::vector<std::string> & images, info::entry_types entries) {
size_t count = 1;
if(version >= INNO_VERSION(5, 6, 0)) {
count = util::load<boost::uint32_t>(is);
}
if(entries & (info::WizardImages | info::NoSkip)) {
images.resize(count);
for(size_t i = 0; i < count; i++) {
is >> util::binary_string(images[i]);
}
if(version < INNO_VERSION(5, 6, 0) && images[0].empty()) {
images.clear();
}
} else {
for(size_t i = 0; i < count; i++) {
util::binary_string::skip(is);
}
}
}
void load_wizard_and_decompressor(std::istream & is, const setup::version & version,
const setup::header & header,
setup::info & info, info::entry_types entries) {
info.wizard_images.clear();
info.wizard_images_small.clear();
load_wizard_images(is, version, info.wizard_images, entries);
if(version >= INNO_VERSION(2, 0, 0) || version.is_isx()) {
load_wizard_images(is, version, info.wizard_images_small, entries);
}
info.decompressor_dll.clear();
if(header.compression == stream::BZip2
|| (header.compression == stream::LZMA1 && version == INNO_VERSION(4, 1, 5))
|| (header.compression == stream::Zlib && version >= INNO_VERSION(4, 2, 6))) {
if(entries & (info::DecompressorDll | info::NoSkip)) {
is >> util::binary_string(info.decompressor_dll);
} else {
// decompressor dll - we don't need this
util::binary_string::skip(is);
}
}
info.decrypt_dll.clear();
if((header.options & header::EncryptionUsed) && version < INNO_VERSION(6, 4, 0)) {
if(entries & (info::DecryptDll | info::NoSkip)) {
is >> util::binary_string(info.decrypt_dll);
} else {
// decrypt dll - we don't need this
util::binary_string::skip(is);
}
}
}
void check_is_end(stream::block_reader::pointer & is, const char * what) {
is->exceptions(std::ios_base::goodbit);
char dummy;
if(!is->get(dummy).eof()) {
throw std::ios_base::failure(what);
}
}
} // anonymous namespace
void info::try_load(std::istream & is, entry_types entries, util::codepage_id force_codepage) {
debug("trying to load setup headers for version " << version);
if((entries & (Messages | NoSkip)) || (!version.is_unicode() && !force_codepage)) {
entries |= Languages;
}
stream::block_reader::pointer reader = stream::block_reader::get(is, version);
debug("loading main header");
header.load(*reader, version);
debug("loading " << header.language_count << " languages");
load_entries(*reader, entries, header.language_count, languages, Languages);
debug("determining encoding");
if(version.is_unicode()) {
// Unicode installers are always UTF16-LE, do not allow users to override that.
codepage = util::cp_utf16le;
} else if(force_codepage) {
codepage = force_codepage;
} else if(languages.empty()) {
codepage = util::cp_windows1252;
} else {
// Non-Unicode installers do not have a defined codepage but instead just assume the
// codepage of the system the installer is run on.
// Look at the list of available languages to guess a suitable codepage.
codepage = languages[0].codepage;
BOOST_FOREACH(const language_entry & language, languages) {
if(language.codepage == util::cp_windows1252) {
codepage = util::cp_windows1252;
break;
}
}
}
header.decode(codepage);
BOOST_FOREACH(language_entry & language, languages) {
language.decode(codepage);
}
if(version < INNO_VERSION(4, 0, 0)) {
debug("loading images and plugins");
load_wizard_and_decompressor(*reader, version, header, *this, entries);
}
debug("loading " << header.message_count << " messages");
load_entries(*reader, entries, header.message_count, messages, Messages);
debug("loading " << header.permission_count << " permissions");
load_entries(*reader, entries, header.permission_count, permissions, Permissions);
debug("loading " << header.type_count << " types");
load_entries(*reader, entries, header.type_count, types, Types);
debug("loading " << header.component_count << " components");
load_entries(*reader, entries, header.component_count, components, Components);
debug("loading " << header.task_count << " tasks");
load_entries(*reader, entries, header.task_count, tasks, Tasks);
debug("loading " << header.directory_count << " directories");
load_entries(*reader, entries, header.directory_count, directories, Directories);
debug("loading " << header.issig_key_count << " issigs");
load_entries(*reader, entries, header.issig_key_count, issig_keys, ISSigs);
debug("loading " << header.file_count << " files");
load_entries(*reader, entries, header.file_count, files, Files);
debug("loading " << header.icon_count << " icons");
load_entries(*reader, entries, header.icon_count, icons, Icons);
debug("loading " << header.ini_entry_count << " ini entries");
load_entries(*reader, entries, header.ini_entry_count, ini_entries, IniEntries);
debug("loading " << header.registry_entry_count << " registry entries");
load_entries(*reader, entries, header.registry_entry_count, registry_entries, RegistryEntries);
debug("loading " << header.delete_entry_count << " delete entries");
load_entries(*reader, entries, header.delete_entry_count, delete_entries, DeleteEntries);
debug("loading " << header.uninstall_delete_entry_count << " uninstall delete entries");
load_entries(*reader, entries, header.uninstall_delete_entry_count, uninstall_delete_entries,
UninstallDeleteEntries);
debug("loading " << header.run_entry_count << " run entries");
load_entries(*reader, entries, header.run_entry_count, run_entries, RunEntries);
debug("loading " << header.uninstall_run_entry_count << " uninstall run entries");
load_entries(*reader, entries, header.uninstall_run_entry_count, uninstall_run_entries,
UninstallRunEntries);
if(version >= INNO_VERSION(4, 0, 0)) {
debug("loading images and plugins");
load_wizard_and_decompressor(*reader, version, header, *this, entries);
}
// restart the compression stream
check_is_end(reader, "unknown data at end of primary header stream");
reader = stream::block_reader::get(is, version);
debug("loading data entries");
load_entries(*reader, entries, header.data_entry_count, data_entries, DataEntries);
check_is_end(reader, "unknown data at end of secondary header stream");
}
void info::load(std::istream & is, entry_types entries, util::codepage_id force_codepage,
boost::uint32_t loader_revision) {
version.load(is);
if(loader_revision == 2 && version >= INNO_VERSION(6, 5, 0)) {
version.set_64bit();
}
if(!version.known) {
if(entries & NoUnknownVersion) {
std::ostringstream oss;
oss << "Unexpected setup data version: " << version;
throw std::runtime_error(oss.str());
}
log_warning << "Unexpected setup data version: "
<< color::white << version << color::reset;
}
version_constant listed_version = version.value;
// Some setup versions didn't increment the data version number when they should have.
// To work around this, we try to parse the headers for all data versions and use the first
// version that parses without warnings or errors.
bool ambiguous = !version.known || version.is_ambiguous();
if(version.is_ambiguous()) {
// Force parsing all headers so that we don't miss any errors.
entries |= NoSkip;
}
if(version >= INNO_VERSION(6, 5, 0)) {
boost::uint32_t expected_encryption_crc = util::load<boost::uint32_t>(is);
crypto::crc32 checksum;
checksum.init();
boost::uint8_t encryption_use = checksum.load<boost::uint8_t>(is);
if(encryption_use != 0) {
log_error << "Unsupported encrypted setup";
}
for(int i = 0; i < 16; i++) {
/* KDFSalt */(void)checksum.load<boost::uint8_t>(is);
}
/* KDFIterations */(void)checksum.load<boost::uint32_t>(is);
/* BaseNonce.RandomXorStartOffset */(void)checksum.load<boost::uint64_t>(is);
/* BaseNonce.RandomXorFirstSlice */(void)checksum.load<boost::uint32_t>(is);
for(int i = 0; i < 3; i++) {
/* BaseNonce.RemainingRandom */(void)checksum.load<boost::uint32_t>(is);
}
/* PasswordTest */(void)checksum.load<boost::uint32_t>(is);
if(checksum.finalize() != expected_encryption_crc) {
log_warning << "Encryption header checksum mismatch!";
}
}
bool parsed_without_errors = false;
std::streampos start = is.tellg();
for(;;) {
warning_suppressor warnings;
try {
// Try to parse headers for this version
try_load(is, entries, force_codepage);
if(warnings) {
// Parsed without errors but with warnings - try other versions first
if(!parsed_without_errors) {
listed_version = version.value;
parsed_without_errors = true;
}
throw std::exception();
}
warnings.flush();
return;
} catch(...) {
is.clear();
is.seekg(start);
version_constant next_version = version.next();
if(!ambiguous || !next_version) {
if(version.value != listed_version) {
// Rewind to a previous version that had better results and report those
version.value = listed_version;
warnings.restore();
try_load(is, entries, force_codepage);
} else {
// Otherwise. report results for the current version
warnings.flush();
if(!parsed_without_errors) {
throw;
}
}
return;
}
// Retry with the next version
version.value = next_version;
ambiguous = version.is_ambiguous();
}
}
}
std::string info::get_key(const std::string & password) {
std::string encoded_password;
util::from_utf8(password, encoded_password, codepage);
if(header.password.type == crypto::PBKDF2_SHA256_XChaCha20) {
#if INNOEXTRACT_HAVE_DECRYPTION
// 16 bytes PBKDF2 salt + 4 bytes PBKDF2 iterations + 24 bytes ChaCha20 base nonce
if(header.password_salt.length() != 20 + crypto::xchacha20::nonce_size) {
throw std::runtime_error("unexpected password salt size");
}
std::string result;
result.resize(crypto::xchacha20::key_size + crypto::xchacha20::nonce_size);
typedef crypto::pbkdf2<crypto::sha256> pbkdf2;
pbkdf2::derive(encoded_password.c_str(), encoded_password.length(), &header.password_salt[0], 16,
util::little_endian::load<boost::uint32_t>(&header.password_salt[16]), &result[0],
crypto::xchacha20::key_size);
std::memcpy(&result[crypto::xchacha20::key_size], &header.password_salt[20],
crypto::xchacha20::nonce_size);
return result;
#endif
}
return encoded_password;
}
bool info::check_key(const std::string & key) {
if(header.password.type == crypto::PBKDF2_SHA256_XChaCha20) {
#if INNOEXTRACT_HAVE_DECRYPTION
if(key.length() != crypto::xchacha20::key_size + crypto::xchacha20::nonce_size) {
throw std::runtime_error("unexpected key size");
}
crypto::xchacha20 cipher;
char nonce[crypto::xchacha20::nonce_size];
std::memcpy(nonce, key.c_str() + crypto::xchacha20::key_size, crypto::xchacha20::nonce_size);
*reinterpret_cast<boost::uint32_t *>(nonce + 8) = ~*reinterpret_cast<boost::uint32_t *>(nonce + 8);
cipher.init(key.c_str(), nonce);
char buffer[] = { 0, 0, 0, 0 };
cipher.crypt(buffer, buffer, sizeof(buffer));
return (std::memcmp(buffer, header.password.check, sizeof(buffer)) == 0);
#else
throw std::runtime_error("XChaCha20 decryption not supported in this build");
#endif
} else {
crypto::hasher checksum(header.password.type);
checksum.update(header.password_salt.c_str(), header.password_salt.length());
checksum.update(key.c_str(), key.length());
return (checksum.finalize() == header.password);
}
}
info::info() : codepage(0) { }
info::~info() { }
} // namespace setup