1 /*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 /*
18 * Read-only access to Zip archives, with minimal heap allocation.
19 */
20 #include "ZipArchive.h"
21
22 #include <zlib.h>
23
24 #include <stdlib.h>
25 #include <unistd.h>
26 #include <string.h>
27 #include <fcntl.h>
28 #include <errno.h>
29
30 #include <JNIHelp.h> // TEMP_FAILURE_RETRY may or may not be in unistd
31 #include <utils/Compat.h> // For off64_t and lseek64 on Mac
32
33 #ifndef O_BINARY
34 #define O_BINARY 0
35 #endif
36
37 /*
38 * Zip file constants.
39 */
40 #define kEOCDSignature 0x06054b50
41 #define kEOCDLen 22
42 #define kEOCDDiskNumber 4 // number of the current disk
43 #define kEOCDDiskNumberForCD 6 // disk number with the Central Directory
44 #define kEOCDNumEntries 8 // offset to #of entries in file
45 #define kEOCDTotalNumEntries 10 // offset to total #of entries in spanned archives
46 #define kEOCDSize 12 // size of the central directory
47 #define kEOCDFileOffset 16 // offset to central directory
48 #define kEOCDCommentSize 20 // offset to the length of the file comment
49
50 #define kMaxCommentLen 65535 // longest possible in ushort
51 #define kMaxEOCDSearch (kMaxCommentLen + kEOCDLen)
52
53 #define kLFHSignature 0x04034b50
54 #define kLFHLen 30 // excluding variable-len fields
55 #define kLFHGPBFlags 6 // offset to GPB flags
56 #define kLFHNameLen 26 // offset to filename length
57 #define kLFHExtraLen 28 // offset to extra length
58
59 #define kCDESignature 0x02014b50
60 #define kCDELen 46 // excluding variable-len fields
61 #define kCDEGPBFlags 8 // offset to GPB flags
62 #define kCDEMethod 10 // offset to compression method
63 #define kCDEModWhen 12 // offset to modification timestamp
64 #define kCDECRC 16 // offset to entry CRC
65 #define kCDECompLen 20 // offset to compressed length
66 #define kCDEUncompLen 24 // offset to uncompressed length
67 #define kCDENameLen 28 // offset to filename length
68 #define kCDEExtraLen 30 // offset to extra length
69 #define kCDECommentLen 32 // offset to comment length
70 #define kCDELocalOffset 42 // offset to local hdr
71
72 /* General Purpose Bit Flag */
73 #define kGPFEncryptedFlag (1 << 0)
74 #define kGPFUnsupportedMask (kGPFEncryptedFlag)
75
76 /*
77 * The values we return for ZipEntryRO use 0 as an invalid value, so we
78 * want to adjust the hash table index by a fixed amount. Using a large
79 * value helps insure that people don't mix & match arguments, e.g. to
80 * findEntryByIndex().
81 */
82 #define kZipEntryAdj 10000
83
84 /*
85 * Convert a ZipEntry to a hash table index, verifying that it's in a
86 * valid range.
87 */
entryToIndex(const ZipArchive * pArchive,const ZipEntry entry)88 static int entryToIndex(const ZipArchive* pArchive, const ZipEntry entry)
89 {
90 long ent = ((long) entry) - kZipEntryAdj;
91 if (ent < 0 || ent >= pArchive->mHashTableSize ||
92 pArchive->mHashTable[ent].name == NULL)
93 {
94 ALOGW("Zip: invalid ZipEntry %p (%ld)", entry, ent);
95 return -1;
96 }
97 return ent;
98 }
99
100 /*
101 * Simple string hash function for non-null-terminated strings.
102 */
computeHash(const char * str,int len)103 static unsigned int computeHash(const char* str, int len)
104 {
105 unsigned int hash = 0;
106
107 while (len--)
108 hash = hash * 31 + *str++;
109
110 return hash;
111 }
112
113 /*
114 * Add a new entry to the hash table.
115 */
addToHash(ZipArchive * pArchive,const char * str,int strLen,unsigned int hash)116 static void addToHash(ZipArchive* pArchive, const char* str, int strLen,
117 unsigned int hash)
118 {
119 const int hashTableSize = pArchive->mHashTableSize;
120 int ent = hash & (hashTableSize - 1);
121
122 /*
123 * We over-allocated the table, so we're guaranteed to find an empty slot.
124 */
125 while (pArchive->mHashTable[ent].name != NULL)
126 ent = (ent + 1) & (hashTableSize-1);
127
128 pArchive->mHashTable[ent].name = str;
129 pArchive->mHashTable[ent].nameLen = strLen;
130 }
131
132 /*
133 * Get 2 little-endian bytes.
134 */
get2LE(unsigned char const * pSrc)135 static u2 get2LE(unsigned char const* pSrc)
136 {
137 return pSrc[0] | (pSrc[1] << 8);
138 }
139
140 /*
141 * Get 4 little-endian bytes.
142 */
get4LE(unsigned char const * pSrc)143 static u4 get4LE(unsigned char const* pSrc)
144 {
145 u4 result;
146
147 result = pSrc[0];
148 result |= pSrc[1] << 8;
149 result |= pSrc[2] << 16;
150 result |= pSrc[3] << 24;
151
152 return result;
153 }
154
mapCentralDirectory0(int fd,const char * debugFileName,ZipArchive * pArchive,off64_t fileLength,size_t readAmount,u1 * scanBuf)155 static int mapCentralDirectory0(int fd, const char* debugFileName,
156 ZipArchive* pArchive, off64_t fileLength, size_t readAmount, u1* scanBuf)
157 {
158 /*
159 * Make sure this is a Zip archive.
160 */
161 if (lseek64(pArchive->mFd, 0, SEEK_SET) != 0) {
162 ALOGW("seek to start failed: %s", strerror(errno));
163 return false;
164 }
165
166 ssize_t actual = TEMP_FAILURE_RETRY(read(pArchive->mFd, scanBuf, sizeof(int32_t)));
167 if (actual != (ssize_t) sizeof(int32_t)) {
168 ALOGI("couldn't read first signature from zip archive: %s", strerror(errno));
169 return false;
170 }
171
172 unsigned int header = get4LE(scanBuf);
173 if (header != kLFHSignature) {
174 ALOGV("Not a Zip archive (found 0x%08x)\n", header);
175 return false;
176 }
177
178 /*
179 * Perform the traditional EOCD snipe hunt.
180 *
181 * We're searching for the End of Central Directory magic number,
182 * which appears at the start of the EOCD block. It's followed by
183 * 18 bytes of EOCD stuff and up to 64KB of archive comment. We
184 * need to read the last part of the file into a buffer, dig through
185 * it to find the magic number, parse some values out, and use those
186 * to determine the extent of the CD.
187 *
188 * We start by pulling in the last part of the file.
189 */
190 off64_t searchStart = fileLength - readAmount;
191
192 if (lseek64(pArchive->mFd, searchStart, SEEK_SET) != searchStart) {
193 ALOGW("seek %ld failed: %s\n", (long) searchStart, strerror(errno));
194 return false;
195 }
196 actual = TEMP_FAILURE_RETRY(read(pArchive->mFd, scanBuf, readAmount));
197 if (actual != (ssize_t) readAmount) {
198 ALOGW("Zip: read %zd, expected %zd. Failed: %s\n",
199 actual, readAmount, strerror(errno));
200 return false;
201 }
202
203
204 /*
205 * Scan backward for the EOCD magic. In an archive without a trailing
206 * comment, we'll find it on the first try. (We may want to consider
207 * doing an initial minimal read; if we don't find it, retry with a
208 * second read as above.)
209 */
210 int i;
211 for (i = readAmount - kEOCDLen; i >= 0; i--) {
212 if (scanBuf[i] == 0x50 && get4LE(&scanBuf[i]) == kEOCDSignature) {
213 ALOGV("+++ Found EOCD at buf+%d", i);
214 break;
215 }
216 }
217 if (i < 0) {
218 ALOGD("Zip: EOCD not found, %s is not zip", debugFileName);
219 return -1;
220 }
221
222 off64_t eocdOffset = searchStart + i;
223 const u1* eocdPtr = scanBuf + i;
224
225 assert(eocdOffset < fileLength);
226
227 /*
228 * Grab the CD offset and size, and the number of entries in the
229 * archive. Verify that they look reasonable.
230 */
231 u4 diskNumber = get2LE(eocdPtr + kEOCDDiskNumber);
232 u4 diskWithCentralDir = get2LE(eocdPtr + kEOCDDiskNumberForCD);
233 u4 numEntries = get2LE(eocdPtr + kEOCDNumEntries);
234 u4 totalNumEntries = get2LE(eocdPtr + kEOCDTotalNumEntries);
235 u4 centralDirSize = get4LE(eocdPtr + kEOCDSize);
236 u4 centralDirOffset = get4LE(eocdPtr + kEOCDFileOffset);
237 u4 commentSize = get2LE(eocdPtr + kEOCDCommentSize);
238
239 // Verify that they look reasonable.
240 if ((long long) centralDirOffset + (long long) centralDirSize > (long long) eocdOffset) {
241 ALOGW("bad offsets (dir %ld, size %u, eocd %ld)\n",
242 (long) centralDirOffset, centralDirSize, (long) eocdOffset);
243 return false;
244 }
245 if (numEntries == 0) {
246 ALOGW("empty archive?\n");
247 return false;
248 } else if (numEntries != totalNumEntries || diskNumber != 0 || diskWithCentralDir != 0) {
249 ALOGW("spanned archives not supported");
250 return false;
251 }
252
253 // Check to see if comment is a sane size
254 if (((size_t) commentSize > (fileLength - kEOCDLen))
255 || (eocdOffset > (fileLength - kEOCDLen) - commentSize)) {
256 ALOGW("comment size runs off end of file");
257 return false;
258 }
259
260 ALOGV("+++ numEntries=%d dirSize=%d dirOffset=%d\n",
261 numEntries, centralDirSize, centralDirOffset);
262
263 /*
264 * It all looks good. Create a mapping for the CD, and set the fields
265 * in pArchive.
266 */
267 if (sysMapFileSegmentInShmem(fd, centralDirOffset, centralDirSize,
268 &pArchive->mDirectoryMap) != 0)
269 {
270 ALOGW("Zip: cd map failed");
271 return -1;
272 }
273
274 pArchive->mNumEntries = numEntries;
275 pArchive->mDirectoryOffset = centralDirOffset;
276
277 return 0;
278 }
279
280 /*
281 * Find the zip Central Directory and memory-map it.
282 *
283 * On success, returns 0 after populating fields from the EOCD area:
284 * mDirectoryOffset
285 * mDirectoryMap
286 * mNumEntries
287 */
mapCentralDirectory(int fd,const char * debugFileName,ZipArchive * pArchive)288 static int mapCentralDirectory(int fd, const char* debugFileName,
289 ZipArchive* pArchive)
290 {
291 /*
292 * Get and test file length.
293 */
294 off64_t fileLength = lseek64(fd, 0, SEEK_END);
295 if (fileLength < kEOCDLen) {
296 ALOGV("Zip: length %ld is too small to be zip", (long) fileLength);
297 return -1;
298 }
299
300 /*
301 * Perform the traditional EOCD snipe hunt.
302 *
303 * We're searching for the End of Central Directory magic number,
304 * which appears at the start of the EOCD block. It's followed by
305 * 18 bytes of EOCD stuff and up to 64KB of archive comment. We
306 * need to read the last part of the file into a buffer, dig through
307 * it to find the magic number, parse some values out, and use those
308 * to determine the extent of the CD.
309 *
310 * We start by pulling in the last part of the file.
311 */
312 size_t readAmount = kMaxEOCDSearch;
313 if (fileLength < off_t(readAmount))
314 readAmount = fileLength;
315
316 u1* scanBuf = (u1*) malloc(readAmount);
317 if (scanBuf == NULL) {
318 return -1;
319 }
320
321 int result = mapCentralDirectory0(fd, debugFileName, pArchive,
322 fileLength, readAmount, scanBuf);
323
324 free(scanBuf);
325 return result;
326 }
327
328 /*
329 * Parses the Zip archive's Central Directory. Allocates and populates the
330 * hash table.
331 *
332 * Returns 0 on success.
333 */
parseZipArchive(ZipArchive * pArchive)334 static int parseZipArchive(ZipArchive* pArchive)
335 {
336 int result = -1;
337 const u1* cdPtr = (const u1*)pArchive->mDirectoryMap.addr;
338 size_t cdLength = pArchive->mDirectoryMap.length;
339 int numEntries = pArchive->mNumEntries;
340
341 /*
342 * Create hash table. We have a minimum 75% load factor, possibly as
343 * low as 50% after we round off to a power of 2. There must be at
344 * least one unused entry to avoid an infinite loop during creation.
345 */
346 pArchive->mHashTableSize = dexRoundUpPower2(1 + (numEntries * 4) / 3);
347 pArchive->mHashTable = (ZipHashEntry*)
348 calloc(pArchive->mHashTableSize, sizeof(ZipHashEntry));
349
350 /*
351 * Walk through the central directory, adding entries to the hash
352 * table and verifying values.
353 */
354 const u1* ptr = cdPtr;
355 int i;
356 for (i = 0; i < numEntries; i++) {
357 if (get4LE(ptr) != kCDESignature) {
358 ALOGW("Zip: missed a central dir sig (at %d)", i);
359 goto bail;
360 }
361 if (ptr + kCDELen > cdPtr + cdLength) {
362 ALOGW("Zip: ran off the end (at %d)", i);
363 goto bail;
364 }
365
366 long localHdrOffset = (long) get4LE(ptr + kCDELocalOffset);
367 if (localHdrOffset >= pArchive->mDirectoryOffset) {
368 ALOGW("Zip: bad LFH offset %ld at entry %d", localHdrOffset, i);
369 goto bail;
370 }
371
372 unsigned int gpbf = get2LE(ptr + kCDEGPBFlags);
373 if ((gpbf & kGPFUnsupportedMask) != 0) {
374 ALOGW("Invalid General Purpose Bit Flag: %d", gpbf);
375 goto bail;
376 }
377
378 unsigned int nameLen, extraLen, commentLen, hash;
379 nameLen = get2LE(ptr + kCDENameLen);
380 extraLen = get2LE(ptr + kCDEExtraLen);
381 commentLen = get2LE(ptr + kCDECommentLen);
382
383 const char *name = (const char *) ptr + kCDELen;
384
385 /* Check name for NULL characters */
386 if (memchr(name, 0, nameLen) != NULL) {
387 ALOGW("Filename contains NUL byte");
388 goto bail;
389 }
390
391 /* add the CDE filename to the hash table */
392 hash = computeHash(name, nameLen);
393 addToHash(pArchive, name, nameLen, hash);
394
395 /* We don't care about the comment or extra data. */
396 ptr += kCDELen + nameLen + extraLen + commentLen;
397 if ((size_t)(ptr - cdPtr) > cdLength) {
398 ALOGW("Zip: bad CD advance (%d vs %zd) at entry %d",
399 (int) (ptr - cdPtr), cdLength, i);
400 goto bail;
401 }
402 }
403 ALOGV("+++ zip good scan %d entries", numEntries);
404
405 result = 0;
406
407 bail:
408 return result;
409 }
410
411 /*
412 * Open the specified file read-only. We examine the contents and verify
413 * that it appears to be a valid zip file.
414 *
415 * This will be called on non-Zip files, especially during VM startup, so
416 * we don't want to be too noisy about certain types of failure. (Do
417 * we want a "quiet" flag?)
418 *
419 * On success, we fill out the contents of "pArchive" and return 0. On
420 * failure we return the errno value.
421 */
dexZipOpenArchive(const char * fileName,ZipArchive * pArchive)422 int dexZipOpenArchive(const char* fileName, ZipArchive* pArchive)
423 {
424 int fd, err;
425
426 ALOGV("Opening as zip '%s' %p", fileName, pArchive);
427
428 memset(pArchive, 0, sizeof(ZipArchive));
429
430 fd = open(fileName, O_RDONLY | O_BINARY, 0);
431 if (fd < 0) {
432 err = errno ? errno : -1;
433 ALOGV("Unable to open '%s': %s", fileName, strerror(err));
434 return err;
435 }
436
437 return dexZipPrepArchive(fd, fileName, pArchive);
438 }
439
440 /*
441 * Prepare to access a ZipArchive through an open file descriptor.
442 *
443 * On success, we fill out the contents of "pArchive" and return 0.
444 */
dexZipPrepArchive(int fd,const char * debugFileName,ZipArchive * pArchive)445 int dexZipPrepArchive(int fd, const char* debugFileName, ZipArchive* pArchive)
446 {
447 int result = -1;
448
449 memset(pArchive, 0, sizeof(*pArchive));
450 pArchive->mFd = fd;
451
452 if (mapCentralDirectory(fd, debugFileName, pArchive) != 0)
453 goto bail;
454
455 if (parseZipArchive(pArchive) != 0) {
456 ALOGV("Zip: parsing '%s' failed", debugFileName);
457 goto bail;
458 }
459
460 /* success */
461 result = 0;
462
463 bail:
464 if (result != 0)
465 dexZipCloseArchive(pArchive);
466 return result;
467 }
468
469
470 /*
471 * Close a ZipArchive, closing the file and freeing the contents.
472 *
473 * NOTE: the ZipArchive may not have been fully created.
474 */
dexZipCloseArchive(ZipArchive * pArchive)475 void dexZipCloseArchive(ZipArchive* pArchive)
476 {
477 ALOGV("Closing archive %p", pArchive);
478
479 if (pArchive->mFd >= 0)
480 close(pArchive->mFd);
481
482 sysReleaseShmem(&pArchive->mDirectoryMap);
483
484 free(pArchive->mHashTable);
485
486 /* ensure nobody tries to use the ZipArchive after it's closed */
487 pArchive->mDirectoryOffset = -1;
488 pArchive->mFd = -1;
489 pArchive->mNumEntries = -1;
490 pArchive->mHashTableSize = -1;
491 pArchive->mHashTable = NULL;
492 }
493
494
495 /*
496 * Find a matching entry.
497 *
498 * Returns 0 if not found.
499 */
dexZipFindEntry(const ZipArchive * pArchive,const char * entryName)500 ZipEntry dexZipFindEntry(const ZipArchive* pArchive, const char* entryName)
501 {
502 int nameLen = strlen(entryName);
503 unsigned int hash = computeHash(entryName, nameLen);
504 const int hashTableSize = pArchive->mHashTableSize;
505 int ent = hash & (hashTableSize-1);
506
507 while (pArchive->mHashTable[ent].name != NULL) {
508 if (pArchive->mHashTable[ent].nameLen == nameLen &&
509 memcmp(pArchive->mHashTable[ent].name, entryName, nameLen) == 0)
510 {
511 /* match */
512 return (ZipEntry)(long)(ent + kZipEntryAdj);
513 }
514
515 ent = (ent + 1) & (hashTableSize-1);
516 }
517
518 return NULL;
519 }
520
521 #if 0
522 /*
523 * Find the Nth entry.
524 *
525 * This currently involves walking through the sparse hash table, counting
526 * non-empty entries. If we need to speed this up we can either allocate
527 * a parallel lookup table or (perhaps better) provide an iterator interface.
528 */
529 ZipEntry findEntryByIndex(ZipArchive* pArchive, int idx)
530 {
531 if (idx < 0 || idx >= pArchive->mNumEntries) {
532 ALOGW("Invalid index %d", idx);
533 return NULL;
534 }
535
536 int ent;
537 for (ent = 0; ent < pArchive->mHashTableSize; ent++) {
538 if (pArchive->mHashTable[ent].name != NULL) {
539 if (idx-- == 0)
540 return (ZipEntry) (ent + kZipEntryAdj);
541 }
542 }
543
544 return NULL;
545 }
546 #endif
547
548 /*
549 * Get the useful fields from the zip entry.
550 *
551 * Returns non-zero if the contents of the fields (particularly the data
552 * offset) appear to be bogus.
553 */
dexZipGetEntryInfo(const ZipArchive * pArchive,ZipEntry entry,int * pMethod,size_t * pUncompLen,size_t * pCompLen,off_t * pOffset,long * pModWhen,long * pCrc32)554 int dexZipGetEntryInfo(const ZipArchive* pArchive, ZipEntry entry,
555 int* pMethod, size_t* pUncompLen, size_t* pCompLen, off_t* pOffset,
556 long* pModWhen, long* pCrc32)
557 {
558 int ent = entryToIndex(pArchive, entry);
559 if (ent < 0)
560 return -1;
561
562 /*
563 * Recover the start of the central directory entry from the filename
564 * pointer. The filename is the first entry past the fixed-size data,
565 * so we can just subtract back from that.
566 */
567 const unsigned char* basePtr = (const unsigned char*)
568 pArchive->mDirectoryMap.addr;
569 const unsigned char* ptr = (const unsigned char*)
570 pArchive->mHashTable[ent].name;
571 off_t cdOffset = pArchive->mDirectoryOffset;
572
573 ptr -= kCDELen;
574
575 int method = get2LE(ptr + kCDEMethod);
576 if (pMethod != NULL)
577 *pMethod = method;
578
579 if (pModWhen != NULL)
580 *pModWhen = get4LE(ptr + kCDEModWhen);
581 if (pCrc32 != NULL)
582 *pCrc32 = get4LE(ptr + kCDECRC);
583
584 size_t compLen = get4LE(ptr + kCDECompLen);
585 if (pCompLen != NULL)
586 *pCompLen = compLen;
587 size_t uncompLen = get4LE(ptr + kCDEUncompLen);
588 if (pUncompLen != NULL)
589 *pUncompLen = uncompLen;
590
591 /*
592 * If requested, determine the offset of the start of the data. All we
593 * have is the offset to the Local File Header, which is variable size,
594 * so we have to read the contents of the struct to figure out where
595 * the actual data starts.
596 *
597 * We also need to make sure that the lengths are not so large that
598 * somebody trying to map the compressed or uncompressed data runs
599 * off the end of the mapped region.
600 *
601 * Note we don't verify compLen/uncompLen if they don't request the
602 * dataOffset, because dataOffset is expensive to determine. However,
603 * if they don't have the file offset, they're not likely to be doing
604 * anything with the contents.
605 */
606 if (pOffset != NULL) {
607 long localHdrOffset = (long) get4LE(ptr + kCDELocalOffset);
608 if (localHdrOffset + kLFHLen >= cdOffset) {
609 ALOGW("Zip: bad local hdr offset in zip");
610 return -1;
611 }
612
613 u1 lfhBuf[kLFHLen];
614 if (lseek(pArchive->mFd, localHdrOffset, SEEK_SET) != localHdrOffset) {
615 ALOGW("Zip: failed seeking to lfh at offset %ld", localHdrOffset);
616 return -1;
617 }
618 ssize_t actual =
619 TEMP_FAILURE_RETRY(read(pArchive->mFd, lfhBuf, sizeof(lfhBuf)));
620 if (actual != sizeof(lfhBuf)) {
621 ALOGW("Zip: failed reading lfh from offset %ld", localHdrOffset);
622 return -1;
623 }
624
625 if (get4LE(lfhBuf) != kLFHSignature) {
626 ALOGW("Zip: didn't find signature at start of lfh, offset=%ld",
627 localHdrOffset);
628 return -1;
629 }
630
631 u4 gpbf = get2LE(lfhBuf + kLFHGPBFlags);
632 if ((gpbf & kGPFUnsupportedMask) != 0) {
633 ALOGW("Invalid General Purpose Bit Flag: %d", gpbf);
634 return -1;
635 }
636
637 off64_t dataOffset = localHdrOffset + kLFHLen
638 + get2LE(lfhBuf + kLFHNameLen) + get2LE(lfhBuf + kLFHExtraLen);
639 if (dataOffset >= cdOffset) {
640 ALOGW("Zip: bad data offset %ld in zip", (long) dataOffset);
641 return -1;
642 }
643
644 /* check lengths */
645 if ((off_t)(dataOffset + compLen) > cdOffset) {
646 ALOGW("Zip: bad compressed length in zip (%ld + %zd > %ld)",
647 (long) dataOffset, compLen, (long) cdOffset);
648 return -1;
649 }
650
651 if (method == kCompressStored &&
652 (off_t)(dataOffset + uncompLen) > cdOffset)
653 {
654 ALOGW("Zip: bad uncompressed length in zip (%ld + %zd > %ld)",
655 (long) dataOffset, uncompLen, (long) cdOffset);
656 return -1;
657 }
658
659 *pOffset = dataOffset;
660 }
661 return 0;
662 }
663
664 /*
665 * Uncompress "deflate" data from the archive's file to an open file
666 * descriptor.
667 */
inflateToFile(int outFd,int inFd,size_t uncompLen,size_t compLen)668 static int inflateToFile(int outFd, int inFd, size_t uncompLen, size_t compLen)
669 {
670 int result = -1;
671 const size_t kBufSize = 32768;
672 unsigned char* readBuf = (unsigned char*) malloc(kBufSize);
673 unsigned char* writeBuf = (unsigned char*) malloc(kBufSize);
674 z_stream zstream;
675 int zerr;
676
677 if (readBuf == NULL || writeBuf == NULL)
678 goto bail;
679
680 /*
681 * Initialize the zlib stream struct.
682 */
683 memset(&zstream, 0, sizeof(zstream));
684 zstream.zalloc = Z_NULL;
685 zstream.zfree = Z_NULL;
686 zstream.opaque = Z_NULL;
687 zstream.next_in = NULL;
688 zstream.avail_in = 0;
689 zstream.next_out = (Bytef*) writeBuf;
690 zstream.avail_out = kBufSize;
691 zstream.data_type = Z_UNKNOWN;
692
693 /*
694 * Use the undocumented "negative window bits" feature to tell zlib
695 * that there's no zlib header waiting for it.
696 */
697 zerr = inflateInit2(&zstream, -MAX_WBITS);
698 if (zerr != Z_OK) {
699 if (zerr == Z_VERSION_ERROR) {
700 ALOGE("Installed zlib is not compatible with linked version (%s)",
701 ZLIB_VERSION);
702 } else {
703 ALOGW("Call to inflateInit2 failed (zerr=%d)", zerr);
704 }
705 goto bail;
706 }
707
708 /*
709 * Loop while we have more to do.
710 */
711 do {
712 /* read as much as we can */
713 if (zstream.avail_in == 0) {
714 size_t getSize = (compLen > kBufSize) ? kBufSize : compLen;
715
716 ssize_t actual = TEMP_FAILURE_RETRY(read(inFd, readBuf, getSize));
717 if (actual != (ssize_t) getSize) {
718 ALOGW("Zip: inflate read failed (%d vs %zd)",
719 (int)actual, getSize);
720 goto z_bail;
721 }
722
723 compLen -= getSize;
724
725 zstream.next_in = readBuf;
726 zstream.avail_in = getSize;
727 }
728
729 /* uncompress the data */
730 zerr = inflate(&zstream, Z_NO_FLUSH);
731 if (zerr != Z_OK && zerr != Z_STREAM_END) {
732 ALOGW("Zip: inflate zerr=%d (nIn=%p aIn=%u nOut=%p aOut=%u)",
733 zerr, zstream.next_in, zstream.avail_in,
734 zstream.next_out, zstream.avail_out);
735 goto z_bail;
736 }
737
738 /* write when we're full or when we're done */
739 if (zstream.avail_out == 0 ||
740 (zerr == Z_STREAM_END && zstream.avail_out != kBufSize))
741 {
742 size_t writeSize = zstream.next_out - writeBuf;
743 if (sysWriteFully(outFd, writeBuf, writeSize, "Zip inflate") != 0)
744 goto z_bail;
745
746 zstream.next_out = writeBuf;
747 zstream.avail_out = kBufSize;
748 }
749 } while (zerr == Z_OK);
750
751 assert(zerr == Z_STREAM_END); /* other errors should've been caught */
752
753 /* paranoia */
754 if (zstream.total_out != uncompLen) {
755 ALOGW("Zip: size mismatch on inflated file (%ld vs %zd)",
756 zstream.total_out, uncompLen);
757 goto z_bail;
758 }
759
760 result = 0;
761
762 z_bail:
763 inflateEnd(&zstream); /* free up any allocated structures */
764
765 bail:
766 free(readBuf);
767 free(writeBuf);
768 return result;
769 }
770
771 /*
772 * Uncompress an entry, in its entirety, to an open file descriptor.
773 *
774 * TODO: this doesn't verify the data's CRC, but probably should (especially
775 * for uncompressed data).
776 */
dexZipExtractEntryToFile(const ZipArchive * pArchive,const ZipEntry entry,int fd)777 int dexZipExtractEntryToFile(const ZipArchive* pArchive,
778 const ZipEntry entry, int fd)
779 {
780 int result = -1;
781 int ent = entryToIndex(pArchive, entry);
782 if (ent < 0) {
783 ALOGW("Zip: extract can't find entry %p", entry);
784 goto bail;
785 }
786
787 int method;
788 size_t uncompLen, compLen;
789 off_t dataOffset;
790
791 if (dexZipGetEntryInfo(pArchive, entry, &method, &uncompLen, &compLen,
792 &dataOffset, NULL, NULL) != 0)
793 {
794 goto bail;
795 }
796 if (lseek(pArchive->mFd, dataOffset, SEEK_SET) != dataOffset) {
797 ALOGW("Zip: lseek to data at %ld failed", (long) dataOffset);
798 goto bail;
799 }
800
801 if (method == kCompressStored) {
802 if (sysCopyFileToFile(fd, pArchive->mFd, uncompLen) != 0)
803 goto bail;
804 } else {
805 if (inflateToFile(fd, pArchive->mFd, uncompLen, compLen) != 0)
806 goto bail;
807 }
808
809 result = 0;
810
811 bail:
812 return result;
813 }
814