| Index: third_party/omaha/src/base/extractor.h
|
| diff --git a/third_party/omaha/src/base/extractor.h b/third_party/omaha/src/base/extractor.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..21a8defc8e273517ecd30d855565f047cff37cc2
|
| --- /dev/null
|
| +++ b/third_party/omaha/src/base/extractor.h
|
| @@ -0,0 +1,105 @@
|
| +// Copyright 2005-2009 Google Inc.
|
| +//
|
| +// Licensed under the Apache License, Version 2.0 (the "License");
|
| +// you may not use this file except in compliance with the License.
|
| +// You may obtain a copy of the License at
|
| +//
|
| +// http://www.apache.org/licenses/LICENSE-2.0
|
| +//
|
| +// Unless required by applicable law or agreed to in writing, software
|
| +// distributed under the License is distributed on an "AS IS" BASIS,
|
| +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
| +// See the License for the specific language governing permissions and
|
| +// limitations under the License.
|
| +// ========================================================================
|
| +
|
| +
|
| +#ifndef OMAHA_COMMON_EXTRACTOR_H_
|
| +#define OMAHA_COMMON_EXTRACTOR_H_
|
| +
|
| +#include <windows.h>
|
| +
|
| +namespace omaha {
|
| +
|
| +class TagExtractor {
|
| + public:
|
| + TagExtractor();
|
| + virtual ~TagExtractor();
|
| +
|
| + /**
|
| + * @return true if we successfully opened the file.
|
| + */
|
| + bool OpenFile(const TCHAR* filename);
|
| +
|
| + /**
|
| + * @return true if we currently have a handle to an open file.
|
| + */
|
| + bool IsFileOpen() const;
|
| +
|
| + void CloseFile();
|
| +
|
| + /**
|
| + * Returns the tag in the current file.
|
| + *
|
| + * We're exploiting the empirical observation that Windows checks the
|
| + * signature on a PEF but doesn't care if the signature container includes
|
| + * extra bytes after the signature.
|
| + *
|
| + * Logic:
|
| + *
|
| + * - Sanity-check that we're a PEF image.
|
| + * - Find the signature, which should be stored in the PE "Certificates
|
| + * Directory" (dumpbin.exe /headers "Firefox Setup 1.0.7.exe") in a
|
| + * WIN_CERTIFICATE structure.
|
| + * - Crudely parse the ASN.1 signature to determine its end.
|
| + * - Read the signature starting from the first byte past the ASN.1.
|
| + *
|
| + * @param tag_buffer: a buffer that will be filled with the extracted tag as
|
| + * a null-terminated string, or NULL if the caller doesn't want the tag.
|
| + *
|
| + * @param tag_buffer_len: a pointer to an int that represents the length in
|
| + * bytes of the buffer pointed to by tag_buffer. If tag_buffer is NULL and
|
| + * there is a tag to extract, then we fill this int with the size of the
|
| + * smallest buffer needed to contain the tag (plus the null terminator).
|
| + *
|
| + * @return true if we found a tag and either successfully copied all of it
|
| + * into tag_buffer, or tag_buffer was NULL and we successfully returned
|
| + * the required buffer size in tag_buffer_len.
|
| + */
|
| + bool ExtractTag(char* tag_buffer, int* tag_buffer_len);
|
| + bool ExtractTag(const char* binary_file,
|
| + size_t binary_file_length,
|
| + char* tag_buffer,
|
| + int* tag_buffer_len);
|
| +
|
| + int cert_length() const { return cert_length_; }
|
| + const void* cert_dir_base() const { return cert_dir_base_; }
|
| +
|
| + private:
|
| + HANDLE file_handle_;
|
| + HANDLE file_mapping_;
|
| + LPVOID file_base_;
|
| + size_t file_length_;
|
| + int cert_length_;
|
| + const void* cert_dir_base_;
|
| +
|
| + bool ReadTag(const char* tag_pointer,
|
| + char* tag_buffer,
|
| + int* tag_buffer_len) const;
|
| +
|
| + const void* GetCertificateDirectoryPointer(const void* base) const;
|
| +
|
| + const void* GetASN1SignaturePointer(const void* base) const;
|
| +
|
| + int GetASN1SignatureLength(const void* base) const;
|
| +
|
| + bool InternalExtractTag(const char* file_buffer,
|
| + char* tag_buffer,
|
| + int* tag_buffer_len);
|
| +
|
| + bool InternalReadCertificate(const char* file_buffer);
|
| +};
|
| +
|
| +} // namespace omaha
|
| +
|
| +#endif // OMAHA_COMMON_EXTRACTOR_H_
|
|
|