/* * All or portions of this file Copyright (c) Amazon.com, Inc. or its affiliates or * its licensors. * * For complete copyright and license terms please see the LICENSE at the root of this * distribution (the "License"). All use of this software is governed by the License, * or, if provided, by the license below or the license accompanying this file. Do not * remove or modify any license notices. This file is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * */ // Original file Copyright Crytek GMBH or its affiliates, used under license. #include "stdafx.h" #include <zlib.h> #include "smartptr.h" #include "ZipFileFormat.h" #include "zipdirstructures.h" #include "ZipDirTree.h" #include "ZipDirCache.h" #include "ZipDirCacheRW.h" #include "ZipDirCacheFactory.h" #include "ZipDirList.h" static uint32 g_defaultEncryptionKey[4] = { 0xc968fb67, 0x8f9b4267, 0x85399e84, 0xf9b99dc4 }; ZipDir::CacheFactory::CacheFactory (InitMethodEnum nInitMethod, unsigned nFlags) { m_nCDREndPos = 0; m_f = NULL; m_bBuildFileEntryMap = false; // we only need it for validation/debugging m_bBuildFileEntryTree = true; // we need it to actually build the optimized structure of directories m_bEncryptedHeaders = false; m_nInitMethod = nInitMethod; m_nFlags = nFlags; } ZipDir::CacheFactory::~CacheFactory() { Clear(); } ZipDir::CachePtr ZipDir::CacheFactory::New (const char* szFile, const uint32 key[4]) { m_encryptionKey = EncryptionKey(g_defaultEncryptionKey); if (key) { m_encryptionKey = EncryptionKey(key); } Clear(); m_f = nullptr; azfopen(&m_f, szFile, "rb"); if (m_f) { return MakeCache (szFile); } Clear(); THROW_ZIPDIR_ERROR(ZD_ERROR_IO_FAILED, "Cannot open file in binary mode for reading, probably missing file"); return 0; /* if (!m_f) THROW_ZIPDIR_ERROR(ZD_ERROR_IO_FAILED,"Cannot open file in binary mode for reading, probably missing file"); try { return MakeCache (szFile); } catch(Error) { Clear(); throw; } */ } ZipDir::CacheRWPtr ZipDir::CacheFactory::NewRW(const char* szFileName, size_t fileAlignment, bool encrypted, const uint32* key) { m_encryptionKey = EncryptionKey(g_defaultEncryptionKey); if (key) { m_encryptionKey = EncryptionKey(key); } CacheRWPtr pCache = new CacheRW(encrypted, m_encryptionKey); // opens the given zip file and connects to it. Creates a new file if no such file exists // if successful, returns true. if (!(m_nFlags & FLAGS_DONT_MEMORIZE_ZIP_PATH)) { pCache->m_strFilePath = szFileName; } if (m_nFlags & FLAGS_DONT_COMPACT) { pCache->m_nFlags |= CacheRW::FLAGS_DONT_COMPACT; } // first, try to open the file for reading or reading/writing if (m_nFlags & FLAGS_READ_ONLY) { m_f = nullptr; azfopen(&m_f, szFileName, "rb"); pCache->m_nFlags |= CacheRW::FLAGS_CDR_DIRTY | CacheRW::FLAGS_READ_ONLY; if (!m_f) { THROW_ZIPDIR_ERROR(ZD_ERROR_IO_FAILED, "Could not open file in binary mode for reading"); return 0; } } else { m_f = NULL; if (!(m_nFlags & FLAGS_CREATE_NEW)) { m_f = nullptr; azfopen(&m_f, szFileName, "r+b"); } bool bOpenForWriting = true; if (m_f) { // get file size fseek(m_f, 0, SEEK_END); #ifdef WIN32 size_t nFileSize = (size_t)_ftelli64(m_f); #else size_t nFileSize = ftell(m_f); #endif fseek(m_f, 0, SEEK_SET); if (nFileSize) { if (!ReadCacheRW(*pCache)) { fclose(m_f); m_f = NULL; THROW_ZIPDIR_ERROR(ZD_ERROR_IO_FAILED, "Could not read archive"); return 0; } bOpenForWriting = false; } else { // if file has 0 bytes (e.g. crash during saving) we don't want to open it assert(0); // you can ignore, the system shold handle this gracefully } } if (bOpenForWriting) { m_f = nullptr; azfopen(&m_f, szFileName, "w+b"); if (m_f) { // there's no such file, but we'll create one. We'll need to write out the CDR here pCache->m_lCDROffset = 0; pCache->m_nFlags |= CacheRW::FLAGS_CDR_DIRTY; } pCache->m_fileAlignment = fileAlignment; } if (!m_f) { THROW_ZIPDIR_ERROR(ZD_ERROR_IO_FAILED, "Could not open file in binary mode for appending (read/write)"); return 0; } } // give the cache the file handle: pCache->m_pFile = m_f; // the factory doesn't own it after that m_f = NULL; return pCache; } bool ZipDir::CacheFactory::ReadCacheRW (CacheRW& rwCache) { m_bBuildFileEntryTree = true; if (!Prepare()) { return false; } // since it's open for R/W, we need to know exactly how much space // we have for each file to use the gaps efficiently FileEntryList Adjuster (&m_treeFileEntries, m_CDREnd.lCDROffset); Adjuster.RefreshEOFOffsets(); m_treeFileEntries.Swap(rwCache.m_treeDir); m_CDR_buffer.swap(rwCache.m_CDR_buffer); // CDR Buffer contain actually the string pool for the tree directory. m_unifiedNameBuffer.swap(rwCache.m_unifiedNameBuffer); // string pool for unified names // very important: we need this offset to be able to add to the zip file rwCache.m_lCDROffset = m_CDREnd.lCDROffset; if (m_bEncryptedHeaders != rwCache.m_bEncryptedHeaders) { // force to relink and update all headers on close rwCache.m_nFlags |= ZipDir::CacheRW::FLAGS_UNCOMPACTED; rwCache.m_bHeadersEncryptedOnClose = rwCache.m_bEncryptedHeaders; rwCache.m_bEncryptedHeaders = m_bEncryptedHeaders; } return true; } // reads everything and prepares the maps bool ZipDir::CacheFactory::Prepare () { if (!FindCDREnd()) { return false; } m_bEncryptedHeaders = (m_CDREnd.nDisk & (1 << 15)) != 0; m_CDREnd.nDisk = m_CDREnd.nDisk & 0x7fff; // we don't support multivolume archives if (m_CDREnd.nDisk != 0 || m_CDREnd.nCDRStartDisk != 0 || m_CDREnd.numEntriesOnDisk != m_CDREnd.numEntriesTotal) { THROW_ZIPDIR_ERROR(ZD_ERROR_UNSUPPORTED, "Multivolume archive detected. Current version of ZipDir does not support multivolume archives"); return false; } // if the central directory offset or size are out of range, // the CDREnd record is probably corrupt if (m_CDREnd.lCDROffset > m_nCDREndPos || m_CDREnd.lCDRSize > m_nCDREndPos || m_CDREnd.lCDROffset + m_CDREnd.lCDRSize > m_nCDREndPos) { THROW_ZIPDIR_ERROR (ZD_ERROR_DATA_IS_CORRUPT, "The central directory offset or size are out of range, the pak is probably corrupt, try to repair or delete the file"); return false; } if (!BuildFileEntryMap()) { return false; } // the number of parsed files MUST be the declared number of entries // in the central directory if (m_bBuildFileEntryMap && m_CDREnd.numEntriesTotal != m_mapFileEntries.size()) { THROW_ZIPDIR_ERROR (ZD_ERROR_CDR_IS_CORRUPT, "The number of parsed files does not match the declared number of entries in the central directory, the pak is probably corrupt, try to repair or delete the file"); } const size_t numFilesFound = m_treeFileEntries.NumFilesTotal(); if (m_bBuildFileEntryTree && m_CDREnd.numEntriesTotal != numFilesFound) { const size_t numDirsFound = m_treeFileEntries.NumDirsTotal(); // Other zip tools create entries for directories. // These entires don't have representation in our tree. // FIXME: Proper calculation of entry count should be implemented. if (m_CDREnd.numEntriesTotal != numFilesFound + numDirsFound) { THROW_ZIPDIR_ERROR (ZD_ERROR_CDR_IS_CORRUPT, "The number of parsed files does not match the declared number of entries in the central directory. The pak does not appear to be corrupt, but perhaps there are some duplicated or missing file entries, try to repair the file"); } } return true; } ZipDir::CachePtr ZipDir::CacheFactory::MakeCache (const char* szFile) { if (!Prepare()) { return CachePtr(); } // initializes this object from the given tree, which is a convenient representation of the file tree size_t nSizeRequired = m_treeFileEntries.GetSizeSerialized(); size_t nSizeZipPath = 1; // we need to remember the terminating 0 if (!(m_nFlags & FLAGS_DONT_MEMORIZE_ZIP_PATH)) { nSizeZipPath += strlen(szFile); } // allocate and initialize the memory that'll be the root now size_t nCacheInstanceSize = sizeof(Cache) + nSizeRequired + nSizeZipPath; Cache* pCacheInstance = (Cache*)malloc(nCacheInstanceSize); // Do not use pools for this allocation pCacheInstance->Construct(m_f, nSizeRequired, m_encryptionKey); CachePtr cache = pCacheInstance; m_f = NULL; // we don't own the file anymore - it's in possession of the cache instance // try to serialize into the memory size_t nSizeSerialized = m_treeFileEntries.Serialize (cache->GetRoot()); assert (nSizeSerialized == nSizeRequired); char* pZipPath = ((char*)(pCacheInstance + 1)) + nSizeRequired; if (!(m_nFlags & FLAGS_DONT_MEMORIZE_ZIP_PATH)) { memcpy (pZipPath, szFile, nSizeZipPath); } else { pZipPath[0] = '\0'; } Clear(); return cache; } void ZipDir::CacheFactory::Clear() { if (m_f) { fclose (m_f); } m_nCDREndPos = 0; memset (&m_CDREnd, 0, sizeof(m_CDREnd)); m_mapFileEntries.clear(); m_treeFileEntries.Clear(); m_bEncryptedHeaders = false; } ////////////////////////////////////////////////////////////////////////// // searches for CDREnd record in the given file bool ZipDir::CacheFactory::FindCDREnd() { // this buffer will be used to find the CDR End record // the additional bytes are required to store the potential tail of the CDREnd structure // when moving the window to the next position in the file char pReservedBuffer[g_nCDRSearchWindowSize + sizeof(ZipFile::CDREnd) - 1]; Seek (0, SEEK_END); unsigned long nFileSize = Tell(); if (nFileSize < sizeof(ZipFile::CDREnd)) { THROW_ZIPDIR_ERROR (ZD_ERROR_NO_CDR, "The file is too small, it doesn't even contain the CDREnd structure. Please check and delete the file. Truncated files are not deleted automatically"); return false; } // this will point to the place where the buffer was loaded unsigned int nOldBufPos = nFileSize; // start scanning well before the end of the file to avoid reading beyond the end unsigned int nScanPos = nFileSize - sizeof(ZipFile::CDREnd); m_CDREnd.lSignature = 0; // invalid signature as the flag of not-found CDR End structure while (true) { unsigned int nNewBufPos; // the new buf pos char* pWindow = pReservedBuffer; // the window pointer into which data will be read (takes into account the possible tail-of-CDREnd) if (nOldBufPos <= g_nCDRSearchWindowSize) { // the old buffer position doesn't let us read the full search window size // therefore the new buffer pos will be 0 (instead of negative beyond the start of the file) // and the window pointer will be closer tot he end of the buffer because the end of the buffer // contains the data from the previous iteration (possibly) nNewBufPos = 0; pWindow = pReservedBuffer + g_nCDRSearchWindowSize - (nOldBufPos - nNewBufPos); } else { nNewBufPos = nOldBufPos - g_nCDRSearchWindowSize; assert (nNewBufPos > 0); } // since dealing with 32bit unsigned, check that filesize is bigger than // CDREnd plus comment before the following check occurs. if (nFileSize > (sizeof(ZipFile::CDREnd) + 0xFFFF)) { // if the new buffer pos is beyond 64k limit for the comment size if (nNewBufPos < (unsigned int)(nFileSize - sizeof(ZipFile::CDREnd) - 0xFFFF)) { nNewBufPos = nFileSize - sizeof(ZipFile::CDREnd) - 0xFFFF; } } // if there's nothing to search if (nNewBufPos >= nOldBufPos) { THROW_ZIPDIR_ERROR (ZD_ERROR_NO_CDR, "Cannot find Central Directory Record in pak. This is either not a pak file, or a pak file without Central Directory. It does not mean that the data is permanently lost, but it may be severely damaged. Please repair the file with external tools, there may be enough information left to recover the file completely"); // we didn't find anything return false; } // seek to the start of the new window and read it Seek (nNewBufPos); Read (pWindow, nOldBufPos - nNewBufPos); while (nScanPos >= nNewBufPos) { ZipFile::CDREnd* pEnd = (ZipFile::CDREnd*)(pWindow + nScanPos - nNewBufPos); if (pEnd->lSignature == pEnd->SIGNATURE) { if (pEnd->nCommentLength == nFileSize - nScanPos - sizeof(ZipFile::CDREnd)) { // the comment length is exactly what we expected m_CDREnd = *pEnd; m_nCDREndPos = nScanPos; break; } else { THROW_ZIPDIR_ERROR (ZD_ERROR_DATA_IS_CORRUPT, "Central Directory Record is followed by a comment of inconsistent length. This might be a minor misconsistency, please try to repair the file. However, it is dangerous to open the file because I will have to guess some structure offsets, which can lead to permanent unrecoverable damage of the archive content"); return false; } } if (nScanPos == 0) { break; } --nScanPos; } if (m_CDREnd.lSignature == m_CDREnd.SIGNATURE) { return true; // we've found it } nOldBufPos = nNewBufPos; memmove (pReservedBuffer + g_nCDRSearchWindowSize, pWindow, sizeof(ZipFile::CDREnd) - 1); } THROW_ZIPDIR_ERROR (ZD_ERROR_UNEXPECTED, "The program flow may not have possibly lead here. This error is unexplainable"); // we shouldn't be here return false; } ////////////////////////////////////////////////////////////////////////// // uses the found CDREnd to scan the CDR and probably the Zip file itself // builds up the m_mapFileEntries bool ZipDir::CacheFactory::BuildFileEntryMap() { Seek (m_CDREnd.lCDROffset); if (m_CDREnd.lCDRSize == 0) { return true; } DynArray<char>& pBuffer = m_CDR_buffer; // Use persistent buffer. pBuffer.resize(m_CDREnd.lCDRSize + 1); // Allocate one more because we use this memory as a strings pool. if (pBuffer.empty()) // couldn't allocate enough memory for temporary copy of CDR { THROW_ZIPDIR_ERROR (ZD_ERROR_NO_MEMORY, "Not enough memory to cache Central Directory record for fast initialization. This error may not happen on non-console systems"); return false; } // Calculate buffer size for unified filenames const size_t headersSize = sizeof(ZipFile::CDRFileHeader) * m_CDREnd.numEntriesTotal; const size_t terminatingZeros = m_CDREnd.numEntriesTotal; if (headersSize > m_CDREnd.lCDRSize + terminatingZeros) { THROW_ZIPDIR_ERROR (ZD_ERROR_CORRUPTED_DATA, "Number of entries in Central Directory seems to be wrong"); return false; } const size_t nameBufferSize = m_CDREnd.lCDRSize + terminatingZeros - headersSize; // numEntriesTotal for terminating zeroes // Allocate buffer for unified filenames m_unifiedNameBuffer.resize(nameBufferSize); if (m_unifiedNameBuffer.empty() && nameBufferSize != 0) { THROW_ZIPDIR_ERROR (ZD_ERROR_NO_MEMORY, "Not enough memory to allocate unified names buffer"); return false; } char* pUnifiedName = m_unifiedNameBuffer.empty() ? 0 : &m_unifiedNameBuffer[0]; const char* const pUnifiedNameEnd = pUnifiedName + m_unifiedNameBuffer.size(); ReadHeaderData(&pBuffer[0], m_CDREnd.lCDRSize); // now we've read the complete CDR - parse it. ZipFile::CDRFileHeader* pFile = (ZipFile::CDRFileHeader*)(&pBuffer[0]); const char* const pEndOfData = &pBuffer[0] + m_CDREnd.lCDRSize; const char* const pEndOfBuffer = &pBuffer[0] + pBuffer.size(); char* pFileName; // check signature of first entry if ((const char*)(pFile + 1) <= pEndOfData) { if (pFile->lSignature != pFile->SIGNATURE) { THROW_ZIPDIR_ERROR (ZD_ERROR_CDR_IS_CORRUPT, m_bEncryptedHeaders ? "Signature of CDR entry is corrupt. Wrong decryption key was used or archive is corrupt." : "Signature of CDR entry is corrupt. Archive is corrupt."); return false; } } while ((pFileName = (char*)(pFile + 1)) <= pEndOfData) { // Hacky way to use CDR memory block as a string pool. pFile->lSignature = 0; // Force signature to always be 0 (First byte of signature maybe a zero termination of the previous file filename). if (pFile->nVersionNeeded > 20) { THROW_ZIPDIR_ERROR (ZD_ERROR_UNSUPPORTED, "Reading file header with unsupported version (nVersionNeeded > 20)."); return false; } //if (pFile->lSignature != pFile->SIGNATURE) // Timur, Dont compare signatures as signatue in memory can be overwritten by the code below //break; // the end of this file record const char* pEndOfRecord = (pFileName + pFile->nFileNameLength + pFile->nExtraFieldLength + pFile->nFileCommentLength); // if the record overlaps with the End Of CDR structure, something is wrong if (pEndOfRecord > pEndOfData) { THROW_ZIPDIR_ERROR (ZD_ERROR_CDR_IS_CORRUPT, "Central Directory record is either corrupt, or truncated, or missing. Cannot read the archive directory"); return false; } ////////////////////////////////////////////////////////////////////////// // Analyze advanced section. ////////////////////////////////////////////////////////////////////////// SExtraZipFileData extra; const char* pExtraField = (pFileName + pFile->nFileNameLength); const char* pExtraEnd = pExtraField + pFile->nExtraFieldLength; while (pExtraField < pExtraEnd) { const char* pAttrData = pExtraField + sizeof(ZipFile::ExtraFieldHeader); ZipFile::ExtraFieldHeader& hdr = *(ZipFile::ExtraFieldHeader*)pExtraField; switch (hdr.headerID) { case ZipFile::EXTRA_NTFS: { ZipFile::ExtraNTFSHeader& ntfsHdr = *(ZipFile::ExtraNTFSHeader*)pAttrData; extra.nLastModifyTime = *(uint64*)(pAttrData + sizeof(ZipFile::ExtraNTFSHeader)); uint64 accTime = *(uint64*)(pAttrData + sizeof(ZipFile::ExtraNTFSHeader) + 8); uint64 crtTime = *(uint64*)(pAttrData + sizeof(ZipFile::ExtraNTFSHeader) + 16); } break; } pExtraField += sizeof(ZipFile::ExtraFieldHeader) + hdr.dataSize; } bool bDirectory = false; if (pFile->nFileNameLength > 0 && (pFileName[pFile->nFileNameLength - 1] == '/' || pFileName[pFile->nFileNameLength - 1] == '\\')) { bDirectory = true; } if (!bDirectory) { const size_t fileNameLen = pFile->nFileNameLength; pFileName[fileNameLen] = 0; // Not standard!, may overwrite signature of the next memory record data in zip. // generate unified name if (pFileName + fileNameLen + 1 > pEndOfBuffer || pUnifiedName + fileNameLen + 1 > pUnifiedNameEnd) { THROW_ZIPDIR_ERROR (ZD_ERROR_CORRUPTED_DATA, "Filename length exceeds estimated size. Try to repair the archive."); return false; } for (int i = 0; i < fileNameLen + 1; i++) { pUnifiedName[i] = ::tolower(pFileName[i]); } // put this entry into the map AddFileEntry (pFileName, pUnifiedName, pFile, extra); pUnifiedName += fileNameLen + 1; } // move to the next file pFile = (ZipFile::CDRFileHeader*)pEndOfRecord; } // finished reading CDR return true; } ////////////////////////////////////////////////////////////////////////// // give the CDR File Header entry, reads the local file header to validate // and determine where the actual file lies void ZipDir::CacheFactory::AddFileEntry (char* strFilePath, char* strUnifiedPath, const ZipFile::CDRFileHeader* pFileHeader, const SExtraZipFileData& extra) { if (pFileHeader->lLocalHeaderOffset > m_CDREnd.lCDROffset) { THROW_ZIPDIR_ERROR (ZD_ERROR_CDR_IS_CORRUPT, "Central Directory contains file descriptors pointing outside the archive file boundaries. The archive file is either truncated or damaged. Please try to repair the file"); // the file offset is beyond the CDR: impossible return; } if (pFileHeader->nMethod == ZipFile::METHOD_STORE && pFileHeader->desc.lSizeUncompressed != pFileHeader->desc.lSizeCompressed) { THROW_ZIPDIR_ERROR (ZD_ERROR_VALIDATION_FAILED, "File with STORE compression method declares its compressed size not matching its uncompressed size. File descriptor is inconsistent, archive content may be damaged, please try to repair the archive"); return; } FileEntry fileEntry (*pFileHeader, extra); if ((m_bEncryptedHeaders || m_nInitMethod >= ZD_INIT_FULL) && pFileHeader->desc.lSizeCompressed) { InitDataOffset(fileEntry, pFileHeader); } if (m_bBuildFileEntryMap) { m_mapFileEntries.insert (FileEntryMap::value_type(strFilePath, fileEntry)); } if (m_bBuildFileEntryTree) { m_treeFileEntries.Add(strFilePath, strUnifiedPath, fileEntry); } } ////////////////////////////////////////////////////////////////////////// // initializes the actual data offset in the file in the fileEntry structure // searches to the local file header, reads it and calculates the actual offset in the file void ZipDir::CacheFactory::InitDataOffset (FileEntry& fileEntry, const ZipFile::CDRFileHeader* pFileHeader) { // make sure it's the same file and the fileEntry structure is properly initialized assert (fileEntry.nFileHeaderOffset == pFileHeader->lLocalHeaderOffset); /* // without validation, it would be like this: ErrorEnum nError = Refresh(&fileEntry); if (nError != ZD_ERROR_SUCCESS) THROW_ZIPDIR_ERROR(nError,"Cannot refresh file entry. Probably corrupted file header inside zip file"); */ if (m_bEncryptedHeaders) { // ignore local header fileEntry.nFileDataOffset = pFileHeader->lLocalHeaderOffset + sizeof(ZipFile::LocalFileHeader) + pFileHeader->nFileNameLength + pFileHeader->nExtraFieldLength; } else { Seek(pFileHeader->lLocalHeaderOffset); // read the local file header and the name (for validation) into the buffer DynArray<char>pBuffer; unsigned nBufferLength = sizeof(ZipFile::LocalFileHeader) + pFileHeader->nFileNameLength; pBuffer.resize(nBufferLength); Read (&pBuffer[0], nBufferLength); // validate the local file header (compare with the CDR file header - they should contain basically the same information) const ZipFile::LocalFileHeader* pLocalFileHeader = (const ZipFile::LocalFileHeader*)&pBuffer[0]; if (pFileHeader->desc != pLocalFileHeader->desc || pFileHeader->nMethod != pLocalFileHeader->nMethod || pFileHeader->nFileNameLength != pLocalFileHeader->nFileNameLength // for a tough validation, we can compare the timestamps of the local and central directory entries // but we won't do that for backward compatibility with ZipDir //|| pFileHeader->nLastModDate != pLocalFileHeader->nLastModDate //|| pFileHeader->nLastModTime != pLocalFileHeader->nLastModTime ) { THROW_ZIPDIR_ERROR (ZD_ERROR_VALIDATION_FAILED, "The local file header descriptor doesn't match the basic parameters declared in the global file header in the file. The archive content is misconsistent and may be damaged. Please try to repair the archive"); return; } // now compare the local file name with the one recorded in CDR: they must match. if (memicmp ((const char*)&pBuffer[sizeof(ZipFile::LocalFileHeader)], (const char*)pFileHeader + 1, pFileHeader->nFileNameLength)) { // either file name, or the extra field do not match THROW_ZIPDIR_ERROR(ZD_ERROR_VALIDATION_FAILED, "The local file header contains file name which does not match the file name of the global file header. The archive content is misconsistent with its directory. Please repair the archive"); return; } fileEntry.nFileDataOffset = pFileHeader->lLocalHeaderOffset + sizeof(ZipFile::LocalFileHeader) + pLocalFileHeader->nFileNameLength + pLocalFileHeader->nExtraFieldLength; } if (fileEntry.nFileDataOffset >= m_nCDREndPos) { THROW_ZIPDIR_ERROR(ZD_ERROR_VALIDATION_FAILED, "The global file header declares the file which crosses the boundaries of the archive. The archive is either corrupted or truncated, please try to repair it"); return; } if (m_nInitMethod >= ZD_INIT_VALIDATE) { Validate (fileEntry); } } ////////////////////////////////////////////////////////////////////////// // reads the file pointed by the given header and entry (they must be coherent) // and decompresses it; then calculates and validates its CRC32 void ZipDir::CacheFactory::Validate(const FileEntry& fileEntry) { DynArray<char> pBuffer; // validate the file contents // allocate memory for both the compressed data and uncompressed data pBuffer.resize(fileEntry.desc.lSizeCompressed + fileEntry.desc.lSizeUncompressed); char* pUncompressed = &pBuffer[fileEntry.desc.lSizeCompressed]; char* pCompressed = &pBuffer[0]; assert (fileEntry.nFileDataOffset != FileEntry::INVALID_DATA_OFFSET); Seek(fileEntry.nFileDataOffset); Read(pCompressed, fileEntry.desc.lSizeCompressed); if (fileEntry.nMethod == ZipFile::METHOD_DEFLATE_AND_ENCRYPT) { ZipDir::Decrypt(pCompressed, fileEntry.desc.lSizeCompressed, m_encryptionKey); } unsigned long nDestSize = fileEntry.desc.lSizeUncompressed; int nError = Z_OK; if (fileEntry.nMethod) { nError = ZipRawUncompress (pUncompressed, &nDestSize, pCompressed, fileEntry.desc.lSizeCompressed); } else { assert (fileEntry.desc.lSizeCompressed == fileEntry.desc.lSizeUncompressed); memcpy (pUncompressed, pCompressed, fileEntry.desc.lSizeUncompressed); } switch (nError) { case Z_OK: break; case Z_MEM_ERROR: THROW_ZIPDIR_ERROR(ZD_ERROR_ZLIB_NO_MEMORY, "ZLib reported out-of-memory error"); return; case Z_BUF_ERROR: THROW_ZIPDIR_ERROR(ZD_ERROR_ZLIB_CORRUPTED_DATA, "ZLib reported compressed stream buffer error"); return; case Z_DATA_ERROR: THROW_ZIPDIR_ERROR(ZD_ERROR_ZLIB_CORRUPTED_DATA, "ZLib reported compressed stream data error"); return; default: THROW_ZIPDIR_ERROR(ZD_ERROR_ZLIB_FAILED, "ZLib reported an unexpected unknown error"); return; } if (nDestSize != fileEntry.desc.lSizeUncompressed) { THROW_ZIPDIR_ERROR(ZD_ERROR_CORRUPTED_DATA, "Uncompressed stream doesn't match the size of uncompressed file stored in the archive file headers"); return; } uLong uCRC32 = crc32(0L, Z_NULL, 0); uCRC32 = crc32(uCRC32, (Bytef*)pUncompressed, nDestSize); if (uCRC32 != fileEntry.desc.lCRC32) { THROW_ZIPDIR_ERROR(ZD_ERROR_CRC32_CHECK, "Uncompressed stream CRC32 check failed"); return; } } ////////////////////////////////////////////////////////////////////////// // extracts the file path from the file header with subsequent information // may, or may not, put all letters to lower-case (depending on whether the system is to be case-sensitive or not) // it's the responsibility of the caller to ensure that the file name is in readable valid memory char* ZipDir::CacheFactory::GetFilePath (const char* pFileName, ZipFile::ushort nFileNameLength) { static char strResult[_MAX_PATH]; assert(nFileNameLength < _MAX_PATH); memcpy(strResult, pFileName, nFileNameLength); strResult[nFileNameLength] = 0; for (int i = 0; i < nFileNameLength; i++) { strResult[i] = ::tolower(strResult[i]); } return strResult; } // seeks in the file relative to the starting position void ZipDir::CacheFactory::Seek (ZipFile::ulong nPos, int nOrigin) // throw { #ifdef WIN32 if (_fseeki64 (m_f, (__int64)nPos, nOrigin)) #else if (fseek (m_f, nPos, nOrigin)) #endif { THROW_ZIPDIR_ERROR(ZD_ERROR_IO_FAILED, "Cannot fseek() to the new position in the file. This is unexpected error and should not happen under any circumstances. Perhaps some network or disk failure error has caused this"); return; } } unsigned long ZipDir::CacheFactory::Tell () // throw { #ifdef WIN32 __int64 nPos = _ftelli64 (m_f); #else long nPos = ftell (m_f); #endif if (nPos == -1) { THROW_ZIPDIR_ERROR(ZD_ERROR_IO_FAILED, "Cannot ftell() position in the archive. This is unexpected error and should not happen under any circumstances. Perhaps some network or disk failure error has caused this"); return 0; } return (unsigned long)nPos; } void ZipDir::CacheFactory::Read (void* pDest, unsigned nSize) // throw { if (fread (pDest, nSize, 1, m_f) != 1) { THROW_ZIPDIR_ERROR(ZD_ERROR_IO_FAILED, "Cannot fread() a portion of data from archive"); } } void ZipDir::CacheFactory::ReadHeaderData (void* pDest, unsigned nSize) // throw { Read(pDest, nSize); if (m_bEncryptedHeaders) { ZipDir::Decrypt((char*)pDest, nSize, m_encryptionKey); } }