示例#1
0
文件: npk.c 项目: keedi/npk
bool npk_entity_read_partial( NPK_ENTITY entity, void* buf, NPK_SIZE offset, NPK_SIZE size )
{
    NPK_ENTITYBODY* eb = entity;
    NPK_PACKAGEBODY* pb = NULL;
    NPK_RESULT res;

    if( !entity )
    {
        npk_error( NPK_ERROR_EntityIsNull );
        return false;
    }

    if( eb->info_.flag_ & ( NPK_ENTITY_COMPRESS_ZLIB | NPK_ENTITY_COMPRESS_BZIP2 ) )
    {
        npk_error( NPK_ERROR_CantReadCompressedEntityByPartial );
        return false;
    }

    if( eb->info_.flag_ & ( NPK_ENTITY_ENCRYPT_TEA | NPK_ENTITY_ENCRYPT_XXTEA ) )
    {
        if( ( offset % 8 != 0 ) || ( ( size % 8 != 0 ) && ( offset + size != eb->info_.size_ ) ) )
        {
            npk_error( NPK_ERROR_ReadingEncryptedEntityByPartialShouldBeAligned );
            return false;
        }
    }

    pb = eb->owner_;
#ifdef NPK_PLATFORM_WINDOWS
    if( g_useCriticalSection )
        EnterCriticalSection( &pb->cs_ );
#endif
    npk_seek( pb->handle_, (long)(eb->info_.offset_ + offset)+pb->offsetJump_, SEEK_SET );

    res = npk_read( pb->handle_,
                    buf,
                    size,
                    g_callbackfp,
                    NPK_PROCESSTYPE_ENTITY,
                    g_callbackSize,
                    eb->name_ );

    if( eb->info_.flag_ & NPK_ENTITY_ENCRYPT_TEA )
        tea_decode_buffer(buf, size, pb->teakey_, (pb->info_.version_ >= NPK_VERSION_ENCRYPTREMAINS));
    if( eb->info_.flag_ & NPK_ENTITY_ENCRYPT_XXTEA )
        xxtea_decode_buffer(buf, size, pb->teakey_, (pb->info_.version_ >= NPK_VERSION_ENCRYPTREMAINS));

#ifdef NPK_PLATFORM_WINDOWS
    if( g_useCriticalSection )
        LeaveCriticalSection( &pb->cs_ );
#endif

    if( res != NPK_SUCCESS )
        return false;

    return true;
}
示例#2
0
文件: npk.c 项目: keedi/npk
NPK_RESULT __npk_package_open( NPK_PACKAGEBODY* pb, const NPK_CHAR* filename, long filesize, NPK_TEAKEY teakey[4] )
{
    NPK_CHAR            buf[512];
    NPK_ENTITYBODY*     eb = NULL;
    NPK_ENTITYINFO_V21  oldinfo;
    NPK_SIZE            entityCount = 0;
    NPK_CHAR*           entityheaderbuf;
    NPK_CHAR*           pos;
    long                entityheadersize = 0;
    NPK_RESULT          res;

    if( filesize == 0 )
    {
        filesize = npk_seek( pb->handle_, 0, SEEK_END );
        npk_seek( pb->handle_, 0, SEEK_SET );
    }

    if( filesize < sizeof(NPK_PACKAGEINFO) )
        return( npk_error( NPK_ERROR_PackageIsNotReady ) );

    // Read common header
    res = npk_read( pb->handle_,
                    (void*)&pb->info_,
                    sizeof(NPK_PACKAGEINFO),
                    g_callbackfp,
                    NPK_PROCESSTYPE_PACKAGEHEADER,
                    g_callbackSize,
                    filename );
    if( res != NPK_SUCCESS ) return res;

    if( strncmp( pb->info_.signature_, NPK_SIGNATURE, 4 ) != 0 )
        if( strncmp( pb->info_.signature_, NPK_OLD_SIGNATURE, 4 ) != 0 )
            return( npk_error( NPK_ERROR_NotValidPackage ) );

    // version 18 / read own tea key
    if( pb->info_.version_ < NPK_VERSION_REFACTORING )
    {
        return ( npk_error( NPK_ERROR_NotSupportedVersion ) );
    }
    else
    {
        if( teakey == NULL )
        {
            return ( npk_error( NPK_ERROR_NeedSpecifiedTeaKey ) );
        }
        memcpy( pb->teakey_, teakey, sizeof(NPK_TEAKEY) * 4 );
    }

    // version 23 / package timestamp
    if( pb->info_.version_ >= NPK_VERSION_PACKAGETIMESTAMP )
    {
        res = npk_read( pb->handle_,
                        (void*)&pb->modified_,
                        sizeof(NPK_TIME),
                        g_callbackfp,
                        NPK_PROCESSTYPE_PACKAGEHEADER,
                        g_callbackSize,
                        filename );
        if( res != NPK_SUCCESS ) return res;
    }

    entityCount = pb->info_.entityCount_;
    pb->info_.entityCount_ = 0;

    if( pb->info_.version_ >= NPK_VERSION_SINGLEPACKHEADER )
    {
        if( pb->info_.version_ >= NPK_VERSION_STREAMABLE )
        {
            if( filesize < (long)pb->info_.entityDataOffset_ )
                return( npk_error( NPK_ERROR_PackageIsNotReady ) );
            entityheadersize = (long)pb->info_.entityDataOffset_ - (long)pb->info_.entityInfoOffset_;
        }
        else
        {
            entityheadersize = filesize - (long)pb->info_.entityInfoOffset_;
            npk_seek( pb->handle_, (long)pb->info_.entityInfoOffset_+pb->offsetJump_, SEEK_SET );
        }

        entityheaderbuf = malloc( entityheadersize );
        if( !entityheaderbuf )
            return( npk_error( NPK_ERROR_NotEnoughMemory ) );

        res = npk_read_encrypt( teakey,
                                pb->handle_,
                                (void*)entityheaderbuf,
                                entityheadersize,
                                g_callbackfp,
                                NPK_PROCESSTYPE_ENTITYHEADER,
                                g_callbackSize,
                                filename,
                                pb->info_.version_ >= NPK_VERSION_ENCRYPTREMAINS,
                                pb->info_.version_ >= NPK_VERSION_USEXXTEAONHEADER
                                );
        if( res != NPK_SUCCESS ) return res;

        pos = entityheaderbuf;
        
        while( entityCount > 0 )
        {
            --entityCount;

            res = npk_entity_alloc( (NPK_ENTITY*)&eb );
            if( res != NPK_SUCCESS )
                goto __npk_package_open_return_res_with_free;

            eb->owner_ = pb;
            memcpy( &eb->info_, pos, sizeof(NPK_ENTITYINFO) );
            pos += sizeof(NPK_ENTITYINFO);

            if( pb->info_.version_ < NPK_VERSION_STREAMABLE )
                if( eb->info_.offset_ >= pb->info_.entityInfoOffset_ )
                {
                    res = npk_error( NPK_ERROR_InvalidTeaKey );
                    goto __npk_package_open_return_res_with_free;
                }

            eb->newflag_ = eb->info_.flag_;
            eb->name_ = malloc( sizeof(NPK_CHAR)*(eb->info_.nameLength_+1) );
            if( !eb->name_ )
            {
                res = npk_error( NPK_ERROR_NotEnoughMemory );
                goto __npk_package_open_return_res_with_free;
            }
            eb->name_[eb->info_.nameLength_] = '\0';
            memcpy( eb->name_, pos, eb->info_.nameLength_ );
            pos += eb->info_.nameLength_;

            __npk_package_add_entity( pb, eb, false );
        }
        NPK_SAFE_FREE( entityheaderbuf );
    }
    else    // old style entity header
    {
        npk_seek( pb->handle_, (long)pb->info_.entityInfoOffset_+pb->offsetJump_, SEEK_SET );
        while( entityCount > 0 )
        {
            --entityCount;

            res = npk_entity_alloc( (NPK_ENTITY*)&eb );
            if( res != NPK_SUCCESS )
                goto __npk_package_open_return_res_with_free;

            eb->owner_ = pb;

            // read entity info
            if( pb->info_.version_ < NPK_VERSION_UNIXTIMESUPPORT )
            {
                res = npk_read_encrypt( teakey,
                                        pb->handle_,
                                        (void*)&oldinfo,
                                        sizeof(NPK_ENTITYINFO),
                                        g_callbackfp,
                                        NPK_PROCESSTYPE_ENTITYHEADER,
                                        g_callbackSize,
                                        filename,
                                        false,
                                        false );
                if( res != NPK_SUCCESS )
                    goto __npk_package_open_return_res_with_free;

                eb->info_.offset_ = oldinfo.offset_;
                eb->info_.size_ = oldinfo.size_;
                eb->info_.originalSize_ = oldinfo.originalSize_;
                eb->info_.flag_ = oldinfo.flag_;
                npk_filetime_to_unixtime( &oldinfo.modified_, &eb->info_.modified_ );
                eb->info_.nameLength_ = oldinfo.nameLength_;
            }
            else
            {
                res = npk_read_encrypt( teakey,
                                        pb->handle_,
                                        (void*)&eb->info_,
                                        sizeof(NPK_ENTITYINFO),
                                        g_callbackfp,
                                        NPK_PROCESSTYPE_ENTITYHEADER,
                                        g_callbackSize,
                                        filename,
                                        false,
                                        false );
                if( res != NPK_SUCCESS )
                    goto __npk_package_open_return_res_with_free;
            }

            if( eb->info_.offset_ >= pb->info_.entityInfoOffset_ )
            {
                res = npk_error( NPK_ERROR_InvalidTeaKey );
                goto __npk_package_open_return_res_with_free;
            }

            
            res = npk_read_encrypt( teakey,
                                    pb->handle_,
                                    (void*)buf,
                                    sizeof(char) * eb->info_.nameLength_,
                                    g_callbackfp,
                                    NPK_PROCESSTYPE_ENTITYHEADER,
                                    g_callbackSize,
                                    filename,
                                    false,
                                    false );
            if( res != NPK_SUCCESS )
                goto __npk_package_open_return_res_with_free;

            eb->newflag_ = eb->info_.flag_;

            // copy name into entity body
            buf[eb->info_.nameLength_] = '\0';
            res = npk_alloc_copy_string( &eb->name_, buf );
            if( res != NPK_SUCCESS )
                goto __npk_package_open_return_res_with_free;

            __npk_package_add_entity( pb, eb, false );
        }
    }
    return NPK_SUCCESS;

__npk_package_open_return_res_with_free:

    NPK_SAFE_FREE( eb );
    return res;
}
示例#3
0
文件: npk.c 项目: keedi/npk
bool npk_entity_read( NPK_ENTITY entity, void* buf )
{
    NPK_ENTITYBODY* eb = entity;
    NPK_PACKAGEBODY* pb = NULL;
    void** lplpTarget = &buf;
    void* lpDecompressBuffer = NULL;
    //NPK_SIZE uncompLen = 0;
    unsigned long uncompLen = 0;
    NPK_RESULT res;

    if( !entity )
    {
        npk_error( NPK_ERROR_EntityIsNull );
        return false;
    }

    if( eb->info_.flag_ & ( NPK_ENTITY_COMPRESS_ZLIB | NPK_ENTITY_COMPRESS_BZIP2 ) )
    {
        lpDecompressBuffer = malloc( sizeof(char) * eb->info_.size_ );
        lplpTarget = &lpDecompressBuffer;
    }

    pb = eb->owner_;
#ifdef NPK_PLATFORM_WINDOWS
    if( g_useCriticalSection )
        EnterCriticalSection( &pb->cs_ );
#endif
    npk_seek( pb->handle_, (long)eb->info_.offset_+pb->offsetJump_, SEEK_SET );

    res = npk_read( pb->handle_,
                    (*lplpTarget),
                    eb->info_.size_,
                    g_callbackfp,
                    NPK_PROCESSTYPE_ENTITY,
                    g_callbackSize,
                    eb->name_ );
#ifdef NPK_PLATFORM_WINDOWS
    if( g_useCriticalSection )
        LeaveCriticalSection( &pb->cs_ );
#endif

    if( res != NPK_SUCCESS )
        goto npk_entity_read_return_null_with_free;

    // Decode before uncompress, after v21
    if( ( eb->info_.flag_ & NPK_ENTITY_ENCRYPT_TEA ) && ( eb->info_.flag_ & NPK_ENTITY_REVERSE ) )
        tea_decode_buffer((char*)(*lplpTarget), eb->info_.size_, pb->teakey_, (pb->info_.version_ >= NPK_VERSION_ENCRYPTREMAINS));

    if( eb->info_.flag_ & NPK_ENTITY_ENCRYPT_XXTEA )
        xxtea_decode_buffer((char*)(*lplpTarget), eb->info_.size_, pb->teakey_, (pb->info_.version_ >= NPK_VERSION_ENCRYPTREMAINS));

    if( eb->info_.flag_ & NPK_ENTITY_COMPRESS_ZLIB )
    {
        uncompLen = eb->info_.originalSize_;

        if( uncompLen >= NPK_MIN_SIZE_ZIPABLE )
        {
#ifdef Z_PREFIX
            if( Z_OK != z_uncompress((Bytef*)(buf), (z_uLong*)&uncompLen, (const Bytef*)lpDecompressBuffer, (z_uLong)eb->info_.size_ ) )
#else
            if( Z_OK != uncompress((Bytef*)(buf), (uLong*)&uncompLen, (const Bytef*)lpDecompressBuffer, (uLong)eb->info_.size_ ) )
#endif
            {
                npk_error( NPK_ERROR_FailToDecompress );
                goto npk_entity_read_return_null_with_free;
            }

            if( eb->info_.originalSize_ != uncompLen )
            {
                npk_error( NPK_ERROR_FailToDecompress );
                goto npk_entity_read_return_null_with_free;
            }
        }
        else
            memcpy( buf, lpDecompressBuffer, eb->info_.size_ );

        NPK_SAFE_FREE( lpDecompressBuffer );
        lplpTarget = &buf;
    }

    // Decode after uncompress, before v21
    if( ( eb->info_.flag_ & NPK_ENTITY_ENCRYPT_TEA ) && !( eb->info_.flag_ & NPK_ENTITY_REVERSE ) )
        tea_decode_buffer((char*)(*lplpTarget), eb->info_.originalSize_, pb->teakey_, false);

    return true;

npk_entity_read_return_null_with_free:
    NPK_SAFE_FREE( lpDecompressBuffer );
    return false;
}
示例#4
0
NPK_RESULT npk_entity_write( NPK_ENTITY entity, NPK_HANDLE handle )
{
    NPK_PACKAGEBODY*    pb;
    NPK_ENTITYBODY*     eb = entity;
    NPK_RESULT          res;
    bool                skipProcessing;

    void*               buf = NULL;
    void*               buf_for_zlib = NULL;
    NPK_SIZE            size, endpos, startpos;
    int                 filehandle;
    int                 z_res;

    if( !eb )
        return npk_error( NPK_ERROR_EntityIsNull );

    pb = eb->owner_;

    skipProcessing = false;
    if( eb->localname_ != NULL )
    {   // read native file and write
        if( ( res = npk_open( &filehandle, eb->localname_, false, false ) ) != NPK_SUCCESS )
            return res;

        endpos      = npk_seek( filehandle, 0, SEEK_END );
        startpos    = npk_seek( filehandle, 0, SEEK_SET );
        size        = endpos - startpos;

        if( size == 0 )
            return npk_error( NPK_ERROR_ZeroFileSize );

        eb->info_.originalSize_ = size;
        buf = malloc( size );

        if( ( res = npk_read( filehandle,
                        buf,
                        size,
                        g_callbackfp,
                        NPK_PROCESSTYPE_ENTITY,
                        g_callbackSize,
                        eb->name_ ) ) != NPK_SUCCESS )
            goto npk_entity_write_return_with_free;

        npk_close( filehandle );
        npk_get_filetime( eb->localname_, &eb->info_.modified_ );
        NPK_SAFE_FREE( eb->localname_ );
    }
    else
    {
        if( eb->newflag_ != eb->info_.flag_ )
        {   // read entity and write
            size = eb->info_.originalSize_;
            buf = malloc( size );
            npk_entity_read( eb, buf );
        }
        else
        {   // just copy
            size = eb->info_.size_;
            buf = malloc( size );
            npk_seek( pb->handle_, (long)eb->info_.offset_+pb->offsetJump_, SEEK_SET );

            if( ( res = npk_read( pb->handle_,
                            buf,
                            size,
                            g_callbackfp,
                            NPK_PROCESSTYPE_ENTITY,
                            g_callbackSize,
                            eb->name_ ) ) != NPK_SUCCESS )
                goto npk_entity_write_return_with_free;
            skipProcessing = true;
        }
    }

    if( !skipProcessing )
    {
        // Encode before compress, before v21
        if( ( eb->newflag_ & NPK_ENTITY_ENCRYPT ) && !( eb->newflag_ & NPK_ENTITY_REVERSE ) )
            tea_encode_buffer((char*)buf, (int)size, pb->teakey_ );

        if( eb->newflag_ & NPK_ENTITY_COMPRESS )
        {
            if( size >= NPK_MIN_SIZE_ZIPABLE )
            {
                unsigned long compressedSize = (unsigned long)(sizeof(char) * size * 1.1 + 12); // margin rules from zlib/compress.c
                buf_for_zlib = malloc( compressedSize );
#ifdef Z_PREFIX
                z_res = z_compress( (Bytef*)buf_for_zlib, (z_uLong*)&compressedSize, (const Bytef*)buf, (z_uLong)size );
#else
                z_res = compress( (Bytef*)buf_for_zlib, (uLong*)&compressedSize, (const Bytef*)buf, (uLong)size );
#endif
                if( ( z_res == Z_OK ) && ( compressedSize < size ) )
                {
                    free( buf );
                    buf = buf_for_zlib;
                    buf_for_zlib = NULL;
                    size = compressedSize;
                }
                else    // not suitable to compress
                {
                    free( buf_for_zlib );
                    eb->newflag_ &= !NPK_ENTITY_COMPRESS;
                }
            }
        }

        // Encode after compress, after v21
        if( ( eb->newflag_ & NPK_ENTITY_ENCRYPT ) && ( eb->newflag_ & NPK_ENTITY_REVERSE ) )
            tea_encode_buffer((char*)buf, (int)size, pb->teakey_ );
    }

    eb->info_.size_ = size;
    eb->info_.offset_ = npk_tell( handle );
    if( ( res = npk_write( handle,
                    buf,
                    size,
                    g_callbackfp,
                    NPK_PROCESSTYPE_ENTITY,
                    g_callbackSize,
                    eb->name_ ) ) != NPK_SUCCESS )
        goto npk_entity_write_return_with_free;

    free( buf );

    eb->info_.flag_ = eb->newflag_;

    return NPK_SUCCESS;

npk_entity_write_return_with_free:
    NPK_SAFE_FREE( buf );
    NPK_SAFE_FREE( buf_for_zlib );
    return res;
}