?? postproc.c
字號:
/* * $Id: postproc.c,v 1.5 2003/06/22 11:12:28 andrew_belov Exp $ * --------------------------------------------------------------------------- * This program stores the CRC and file size of ARJ.EXE in it, so an * integrity check may be performed with ARJ i. * */#include "arj.h"/* Operations */#define PP_NONE 0 /* No action */#define PP_DEFAULT 1 /* Calculate and store the CRC */#define PP_ARJSFX 2 /* Remove LZEXE signature *//* Errorlevels/return codes. If something went wrong, look here */#define POSTPROC_ERL_SUCCESS 0#define POSTPROC_ERL_WARNING 1 /* Non-fatal error */#define POSTPROC_ERL_CANTOPEN 2 /* Can't open file */#define POSTPROC_ERL_BAD_EXE 3 /* Malformed EXE file */#define POSTPROC_ERL_NO_INTEGR 4 /* Integrity pattern not found */#define POSTPROC_ERL_CANT_WRITE 5 /* Data was not written *//* Patterns in EXE files */static unsigned char reg_crc_pattern[]={0xB0, 0x01, 0xB0, 0x02, 0xB0, 0x03, 0xB0, 0x04, 0xB0, 0x05, 0};static unsigned char encryption_pattern[]={0xB0, 0x02, 0xB0, 0x02, 0xB0, 0x03, 0xB0, 0x04, 0xB0, 0x05, 0};static unsigned char integrity_pattern[]={0xB0, 0x03, 0xB0, 0x02, 0xB0, 0x03, 0xB0, 0x04, 0xB0, 0x05, 0};static unsigned short self_check[]={0x9090, 0x9090, 0x138, 0x9090, 0x9090};/* Processing buffer */static char buf[PROC_BLOCK_SIZE];static void _fput_dword(const unsigned long l, FILE *stream){#ifdef WORDS_BIGENDIAN fputc(l ,stream); fputc(l>>8 ,stream); fputc(l>>16,stream); fputc(l>>24,stream);#else fwrite(&l,4,1,stream);#endif}/* Standard postprocessing for ARJ and REARJ */static int pp_default(FILE *stream){ int rp_len; long cur_pos, wr_pos; int bytes_read, byte_ctr; char *pb_ptr; long fsize; int c; fseek(stream, 0L, SEEK_END); fsize=ftell(stream); fseek(stream, 0L, SEEK_SET); rp_len=strlen((char *)integrity_pattern); cur_pos=0L; while(1) { fseek(stream, cur_pos, SEEK_SET); if((bytes_read=fread(buf, 1, PROC_BLOCK_SIZE, stream))==0) { printf("Patch not found\n"); return(POSTPROC_ERL_BAD_EXE); } bytes_read-=rp_len; pb_ptr=buf; byte_ctr=0; while(byte_ctr<bytes_read) { if(!memcmp(pb_ptr, integrity_pattern, rp_len)) break; byte_ctr++; pb_ptr++; } if(byte_ctr<bytes_read) break; cur_pos+=(long)PROC_BLOCK_SIZE/2; /* Dirty hack II */ } wr_pos=(long)byte_ctr+cur_pos+rp_len; crc32term=CRC_MASK; fseek(stream, 0L, SEEK_SET); for(cur_pos=0L; cur_pos<wr_pos; cur_pos++) { if((c=fgetc(stream))==-1) break; crc32term=crc32_for_char(crc32term, (unsigned char)c); } cur_pos+=8L; fseek(stream, cur_pos, SEEK_SET); while(cur_pos<fsize) { if((c=fgetc(stream))==-1) break; crc32term=crc32_for_char(crc32term, (unsigned char)c); cur_pos++; } fsize+=2L; fseek(stream, wr_pos, SEEK_SET); _fput_dword(crc32term, stream); _fput_dword(fsize, stream); printf("Done\n"); return(POSTPROC_ERL_SUCCESS);}/* LZEXE signature removal from ARJSFX, and "aRJsfX" insertion into Win32 packed modules */static int pp_arjsfx(FILE *stream){ int p_len; int sig_found;#if TARGET==DOS p_len=32; sig_found=0; if(fread(buf, 1, p_len, stream)<p_len) { printf("Malformed executable, exiting"); return(POSTPROC_ERL_BAD_EXE); } if(buf[28]=='L'&&buf[29]=='Z') { if(buf[30]=='0'&&buf[31]=='9') printf("LZEXE v 0.90"); else if(buf[30]=='9'&&buf[31]=='0') printf("LZEXE v 0.90 (Russian hack-up)"); else if(buf[30]=='9'&&buf[31]=='1') printf("LZEXE v 0.91"); else { printf("No replaceable signature found (normal for non-LZEXE packers).\n"); return(POSTPROC_ERL_SUCCESS); } printf(" signature found - "); memcpy(buf+28, "RJSX", 4); sig_found=1; } if(sig_found) { fseek(stream, 0L, SEEK_SET); fwrite(buf, 1, p_len, stream); printf("replaced\n"); }#elif TARGET==WIN32 p_len=128; sig_found=0; if(fread(buf, 1, p_len, stream)<p_len) { printf("Malformed executable, exiting"); return(POSTPROC_ERL_BAD_EXE); } buf[128]='\0'; if(buf[0]=='M'&&buf[1]=='Z'&&strstr(buf+96, "DOS mode")!=NULL) { /* Remove duplicate LF and leave more space for the fun */ if(buf[0x75]==buf[0x76]&&buf[0x75]=='\r') { buf[0x76]='\n'; buf[0x77]='$'; buf[0x78]='\0'; } for(p_len=7; buf[p_len+0x79]=='\0'&&p_len>=0; p_len--) ; if(p_len>0) printf("Slack area is clogged (%u byte(s) remaining) - can't stamp the ARJSFX signature!\n", p_len+1); else { strcpy(buf+0x79, "aRJsfX"); fseek(stream, 0L, SEEK_SET); fwrite(buf, 1, 128, stream); printf("ARJSFX signature installed at offset 0x79\n"); } }#elif defined(SUNOS) /* Some "free" space in the ELF header ... Reliable? For Linux as well? Info: <http://www.cs.purdue.edu/homes/cs503/lab1/objfiles.pdf> */ p_len=16; sig_found=0; if(fread(buf, 1, p_len, stream)<p_len) { printf("Malformed executable, exiting"); return(POSTPROC_ERL_BAD_EXE); } strcpy(buf+0x8, "aRJsfX"); fseek(stream, 0L, SEEK_SET); fwrite(buf, 1, p_len, stream); printf("ARJSFX signature installed at offset 0x08\n");#endif return(POSTPROC_ERL_SUCCESS);}/* ARJSFX packer */#ifndef NP_SFXstatic void pack_sfx(char *name){ char *p; #if TARGET==DOS char *e; #endif char path[CCHMAXPATH]; char cmd_text[CMDLINE_MAX]; strcpy(path, name); if((p=strrchr(path, PATHSEP_DEFAULT))!=NULL) *p='\0'; else { p=path; p[0]='\0'; /* Weird case, don't care about it */ } p++; #if TARGET==DOS sprintf(cmd_text, "LZEXE %s", name); #elif TARGET==OS2&&defined(LIBC) /* LXLITE must run at regular priority and flush the data to STDOUT */ sprintf(cmd_text, "LXLITE /CS /BDX- /I- /MF3 %s", name); #elif TARGET==WIN32 /* PETITE by Ian Luck. The problem with Win32 compressors is that some desirable options (e.g. PECOMPACT) are GUI-based. */ sprintf(cmd_text, "PETITE -9 -b0 -v0 -y %s", name); #else cmd_text[0]='\0'; #endif if(cmd_text[0]!='\0') system(cmd_text); /* Relocation and cleanup for LZEXE-packed files */ #if TARGET==DOS sprintf(cmd_text, "copy %s %s", p, name); system(cmd_text); unlink(p); strcpy(path, name); e=strrchr(path, '.'); if(e!=NULL) strcpy(e, ".OLD"); unlink(path); #endif}#endif/* Main routine */int main(int argc, char **argv){ FILE *stream; int pp_type=PP_NONE; int rc; printf("POSTPROC v 1.30 [17/01/2003] Not a part of any binary package!\n\n"); if(argc<2) { printf("Usage: POSTPROC <target> [-sfx],\n" "Where: <target> is the EXE name to patch,\n" " -sfx does ARJSFX postprocessing (packing and signing)\n" " e.g, to patch ARJ.EXE, type POSTPROC ARJ.EXE\n"); exit(POSTPROC_ERL_WARNING); } build_crc32_table(); /* Determine the type of post-processing */ if(argc==2) pp_type=PP_DEFAULT; else if(!strcmp(argv[2], "-sfx")) pp_type=PP_ARJSFX; /* Pack the SFX */ #ifndef NP_SFX if(pp_type==PP_ARJSFX) pack_sfx(argv[1]); #endif if((stream=fopen(argv[1], m_rbp))==NULL) { printf("Can't open %s\n", argv[1]); exit(POSTPROC_ERL_CANTOPEN); } /* Run the corresponding routine */ switch(pp_type) { case PP_DEFAULT: rc=pp_default(stream); break; case PP_ARJSFX: rc=pp_arjsfx(stream); break; default: printf("No postprocessing action specified\n"); rc=POSTPROC_ERL_WARNING; } fclose(stream); return(rc);}
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -