Logo Search packages:      
Sourcecode: arj version File versions

postproc.c

/*
 * $Id: postproc.c,v 1.5 2003/06/22 11:12:28 andrew_belov Exp $
 * ---------------------------------------------------------------------------
 * This  program  stores  the  CRC and  file  size of  ARJ.EXE  in it,  so  an
 * integrity check may be performed with ARJ i.
 *
 */

#include "arj.h"

/* Operations */

#define PP_NONE                    0    /* No action */
#define PP_DEFAULT                 1    /* Calculate and store the CRC */
#define PP_ARJSFX                  2    /* Remove LZEXE signature */

/* Errorlevels/return codes. If something went wrong, look here */

#define POSTPROC_ERL_SUCCESS       0
#define POSTPROC_ERL_WARNING       1    /* Non-fatal error */
#define POSTPROC_ERL_CANTOPEN      2    /* Can't open file */
#define POSTPROC_ERL_BAD_EXE       3    /* Malformed EXE file */
#define POSTPROC_ERL_NO_INTEGR     4    /* Integrity pattern not found */
#define POSTPROC_ERL_CANT_WRITE    5    /* Data was not written */

/* Patterns in EXE files */

static unsigned char reg_crc_pattern[]={0xB0, 0x01, 0xB0, 0x02, 0xB0, 0x03, 0xB0,
                               0x04, 0xB0, 0x05, 0};
static unsigned char encryption_pattern[]={0xB0, 0x02, 0xB0, 0x02, 0xB0, 0x03, 0xB0,
                                 0x04, 0xB0, 0x05, 0};
static unsigned char integrity_pattern[]={0xB0, 0x03, 0xB0, 0x02, 0xB0, 0x03, 0xB0,
                                 0x04, 0xB0, 0x05, 0};
static unsigned short self_check[]={0x9090, 0x9090, 0x138, 0x9090, 0x9090};

/* Processing buffer */

static char buf[PROC_BLOCK_SIZE];

static void _fput_dword(const unsigned long l, FILE *stream)
{
#ifdef WORDS_BIGENDIAN
 fputc(l    ,stream);
 fputc(l>>8 ,stream);
 fputc(l>>16,stream);
 fputc(l>>24,stream);
#else
 fwrite(&l,4,1,stream);
#endif
}

/* Standard postprocessing for ARJ and REARJ */

static int pp_default(FILE *stream)
{
 int rp_len;
 long cur_pos, wr_pos;
 int bytes_read, byte_ctr;
 char *pb_ptr;
 long fsize;
 int c;

 fseek(stream, 0L, SEEK_END);
 fsize=ftell(stream);
 fseek(stream, 0L, SEEK_SET);
 rp_len=strlen((char *)integrity_pattern);
 cur_pos=0L;
 while(1)
 {
  fseek(stream, cur_pos, SEEK_SET);
  if((bytes_read=fread(buf, 1, PROC_BLOCK_SIZE, stream))==0)
  {
   printf("Patch not found\n");
   return(POSTPROC_ERL_BAD_EXE);
  }
  bytes_read-=rp_len;
  pb_ptr=buf;
  byte_ctr=0;
  while(byte_ctr<bytes_read)
  {
   if(!memcmp(pb_ptr, integrity_pattern, rp_len))
    break;
   byte_ctr++;
   pb_ptr++;
  }
  if(byte_ctr<bytes_read)
   break;
  cur_pos+=(long)PROC_BLOCK_SIZE/2;     /* Dirty hack II */
 }
 wr_pos=(long)byte_ctr+cur_pos+rp_len;
 crc32term=CRC_MASK;
 fseek(stream, 0L, SEEK_SET);
 for(cur_pos=0L; cur_pos<wr_pos; cur_pos++)
 {
  if((c=fgetc(stream))==-1)
   break;
  crc32term=crc32_for_char(crc32term, (unsigned char)c);
 }
 cur_pos+=8L;
 fseek(stream, cur_pos, SEEK_SET);
 while(cur_pos<fsize)
 {
  if((c=fgetc(stream))==-1)
   break;
  crc32term=crc32_for_char(crc32term, (unsigned char)c);
  cur_pos++;
 }
 fsize+=2L;
 fseek(stream, wr_pos, SEEK_SET);
 _fput_dword(crc32term, stream);
 _fput_dword(fsize,     stream); 
 printf("Done\n");
 return(POSTPROC_ERL_SUCCESS);
}

/* LZEXE signature removal from ARJSFX, and "aRJsfX" insertion into
   Win32 packed modules */

static int pp_arjsfx(FILE *stream)
{
 int p_len;
 int sig_found;

#if TARGET==DOS
 p_len=32;
 sig_found=0;
 if(fread(buf, 1, p_len, stream)<p_len)
 {
  printf("Malformed executable, exiting");
  return(POSTPROC_ERL_BAD_EXE);
 }
 if(buf[28]=='L'&&buf[29]=='Z')
 {
  if(buf[30]=='0'&&buf[31]=='9')
   printf("LZEXE v 0.90");
  else if(buf[30]=='9'&&buf[31]=='0')
   printf("LZEXE v 0.90 (Russian hack-up)");
  else if(buf[30]=='9'&&buf[31]=='1')
   printf("LZEXE v 0.91");
  else
  {
   printf("No replaceable signature found (normal for non-LZEXE packers).\n");
   return(POSTPROC_ERL_SUCCESS);
  }
  printf(" signature found - ");
  memcpy(buf+28, "RJSX", 4);
  sig_found=1;
 }
 if(sig_found)
 {
  fseek(stream, 0L, SEEK_SET);
  fwrite(buf, 1, p_len, stream);
  printf("replaced\n");
 }
#elif TARGET==WIN32
 p_len=128;
 sig_found=0;
 if(fread(buf, 1, p_len, stream)<p_len)
 {
  printf("Malformed executable, exiting");
  return(POSTPROC_ERL_BAD_EXE);
 }
 buf[128]='\0';
 if(buf[0]=='M'&&buf[1]=='Z'&&strstr(buf+96, "DOS mode")!=NULL)
 {
  /* Remove duplicate LF and leave more space for the fun */
  if(buf[0x75]==buf[0x76]&&buf[0x75]=='\r')
  {
   buf[0x76]='\n';
   buf[0x77]='$';
   buf[0x78]='\0';
  }
  for(p_len=7; buf[p_len+0x79]=='\0'&&p_len>=0; p_len--)
   ;
  if(p_len>0)
   printf("Slack area is clogged (%u byte(s) remaining) - can't stamp the ARJSFX signature!\n", p_len+1);
  else
  {
   strcpy(buf+0x79, "aRJsfX");
   fseek(stream, 0L, SEEK_SET);
   fwrite(buf, 1, 128, stream);
   printf("ARJSFX signature installed at offset 0x79\n");
  }
 }
#elif defined(SUNOS)
 /*
 Some "free" space in the ELF header ... 
 Reliable? For Linux as well?  Info: <http://www.cs.purdue.edu/homes/cs503/lab1/objfiles.pdf>
 */
 p_len=16;
 sig_found=0;
 if(fread(buf, 1, p_len, stream)<p_len)
 {
  printf("Malformed executable, exiting");
  return(POSTPROC_ERL_BAD_EXE);
 }
 strcpy(buf+0x8, "aRJsfX");
 fseek(stream, 0L, SEEK_SET);
 fwrite(buf, 1, p_len, stream);
 printf("ARJSFX signature installed at offset 0x08\n");
#endif
 return(POSTPROC_ERL_SUCCESS);
}

/* ARJSFX packer */

#ifndef NP_SFX
static void pack_sfx(char *name)
{
 char *p;
 #if TARGET==DOS
  char *e;
 #endif
 char path[CCHMAXPATH];
 char cmd_text[CMDLINE_MAX];

 strcpy(path, name);
 if((p=strrchr(path, PATHSEP_DEFAULT))!=NULL)
  *p='\0';
 else
 {
  p=path;
  p[0]='\0';                            /* Weird case, don't care about it */
 }
 p++;
 #if TARGET==DOS
  sprintf(cmd_text, "LZEXE %s", name);
 #elif TARGET==OS2&&defined(LIBC)
  /* LXLITE must run at regular priority and flush the data to STDOUT */
  sprintf(cmd_text, "LXLITE /CS /BDX- /I- /MF3 %s", name);
 #elif TARGET==WIN32
  /* PETITE by Ian Luck. The problem with Win32 compressors is that some
     desirable options (e.g. PECOMPACT) are GUI-based. */
  sprintf(cmd_text, "PETITE -9 -b0 -v0 -y %s", name);
 #else
  cmd_text[0]='\0';
 #endif
 if(cmd_text[0]!='\0')
  system(cmd_text);
 /* Relocation and cleanup for LZEXE-packed files */
 #if TARGET==DOS
  sprintf(cmd_text, "copy %s %s", p, name);
  system(cmd_text);
  unlink(p);
  strcpy(path, name);
  e=strrchr(path, '.');
  if(e!=NULL)
   strcpy(e, ".OLD");
  unlink(path);
 #endif
}
#endif

/* Main routine */

int main(int argc, char **argv)
{
 FILE *stream;
 int pp_type=PP_NONE;
 int rc;

 printf("POSTPROC v 1.30  [17/01/2003]  Not a part of any binary package!\n\n");
 if(argc<2)
 {
  printf("Usage: POSTPROC <target> [-sfx],\n"
         "Where: <target> is the EXE name to patch,\n"
         "           -sfx does ARJSFX postprocessing (packing and signing)\n"
         "       e.g, to patch ARJ.EXE, type POSTPROC ARJ.EXE\n");
  exit(POSTPROC_ERL_WARNING);
 }
 build_crc32_table();
 /* Determine the type of post-processing */
 if(argc==2)
  pp_type=PP_DEFAULT;
 else if(!strcmp(argv[2], "-sfx"))
  pp_type=PP_ARJSFX;
 /* Pack the SFX */
 #ifndef NP_SFX
  if(pp_type==PP_ARJSFX)
   pack_sfx(argv[1]);
 #endif
 if((stream=fopen(argv[1], m_rbp))==NULL)
 {
  printf("Can't open %s\n", argv[1]);
  exit(POSTPROC_ERL_CANTOPEN);
 }
 /* Run the corresponding routine */
 switch(pp_type)
 {
  case PP_DEFAULT:  rc=pp_default(stream); break;
  case PP_ARJSFX:   rc=pp_arjsfx(stream); break;
  default:
   printf("No postprocessing action specified\n");
   rc=POSTPROC_ERL_WARNING;
 }
 fclose(stream);
 return(rc);
}

Generated by  Doxygen 1.6.0   Back to index