blob: 21a8defc8e273517ecd30d855565f047cff37cc2 [file] [log] [blame]
// Copyright 2005-2009 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// ========================================================================
#ifndef OMAHA_COMMON_EXTRACTOR_H_
#define OMAHA_COMMON_EXTRACTOR_H_
#include <windows.h>
namespace omaha {
class TagExtractor {
public:
TagExtractor();
virtual ~TagExtractor();
/**
* @return true if we successfully opened the file.
*/
bool OpenFile(const TCHAR* filename);
/**
* @return true if we currently have a handle to an open file.
*/
bool IsFileOpen() const;
void CloseFile();
/**
* Returns the tag in the current file.
*
* We're exploiting the empirical observation that Windows checks the
* signature on a PEF but doesn't care if the signature container includes
* extra bytes after the signature.
*
* Logic:
*
* - Sanity-check that we're a PEF image.
* - Find the signature, which should be stored in the PE "Certificates
* Directory" (dumpbin.exe /headers "Firefox Setup 1.0.7.exe") in a
* WIN_CERTIFICATE structure.
* - Crudely parse the ASN.1 signature to determine its end.
* - Read the signature starting from the first byte past the ASN.1.
*
* @param tag_buffer: a buffer that will be filled with the extracted tag as
* a null-terminated string, or NULL if the caller doesn't want the tag.
*
* @param tag_buffer_len: a pointer to an int that represents the length in
* bytes of the buffer pointed to by tag_buffer. If tag_buffer is NULL and
* there is a tag to extract, then we fill this int with the size of the
* smallest buffer needed to contain the tag (plus the null terminator).
*
* @return true if we found a tag and either successfully copied all of it
* into tag_buffer, or tag_buffer was NULL and we successfully returned
* the required buffer size in tag_buffer_len.
*/
bool ExtractTag(char* tag_buffer, int* tag_buffer_len);
bool ExtractTag(const char* binary_file,
size_t binary_file_length,
char* tag_buffer,
int* tag_buffer_len);
int cert_length() const { return cert_length_; }
const void* cert_dir_base() const { return cert_dir_base_; }
private:
HANDLE file_handle_;
HANDLE file_mapping_;
LPVOID file_base_;
size_t file_length_;
int cert_length_;
const void* cert_dir_base_;
bool ReadTag(const char* tag_pointer,
char* tag_buffer,
int* tag_buffer_len) const;
const void* GetCertificateDirectoryPointer(const void* base) const;
const void* GetASN1SignaturePointer(const void* base) const;
int GetASN1SignatureLength(const void* base) const;
bool InternalExtractTag(const char* file_buffer,
char* tag_buffer,
int* tag_buffer_len);
bool InternalReadCertificate(const char* file_buffer);
};
} // namespace omaha
#endif // OMAHA_COMMON_EXTRACTOR_H_