1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-12 02:38:56 +00:00
hashcat/deps/unrar/win32acl.cpp
2020-09-08 10:34:21 +02:00

136 lines
3.2 KiB
C++

static void SetACLPrivileges();
static bool ReadSacl=false;
#ifndef SFX_MODULE
void ExtractACL20(Archive &Arc,const wchar *FileName)
{
SetACLPrivileges();
if (Arc.BrokenHeader)
{
uiMsg(UIERROR_ACLBROKEN,Arc.FileName,FileName);
ErrHandler.SetErrorCode(RARX_CRC);
return;
}
if (Arc.EAHead.Method<0x31 || Arc.EAHead.Method>0x35 || Arc.EAHead.UnpVer>VER_PACK)
{
uiMsg(UIERROR_ACLUNKNOWN,Arc.FileName,FileName);
ErrHandler.SetErrorCode(RARX_WARNING);
return;
}
ComprDataIO DataIO;
Unpack Unpack(&DataIO);
Unpack.Init(0x10000,false);
Array<byte> UnpData(Arc.EAHead.UnpSize);
DataIO.SetUnpackToMemory(&UnpData[0],Arc.EAHead.UnpSize);
DataIO.SetPackedSizeToRead(Arc.EAHead.DataSize);
DataIO.EnableShowProgress(false);
DataIO.SetFiles(&Arc,NULL);
DataIO.UnpHash.Init(HASH_CRC32,1);
Unpack.SetDestSize(Arc.EAHead.UnpSize);
Unpack.DoUnpack(Arc.EAHead.UnpVer,false);
if (Arc.EAHead.EACRC!=DataIO.UnpHash.GetCRC32())
{
uiMsg(UIERROR_ACLBROKEN,Arc.FileName,FileName);
ErrHandler.SetErrorCode(RARX_CRC);
return;
}
SECURITY_INFORMATION si=OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
DACL_SECURITY_INFORMATION;
if (ReadSacl)
si|=SACL_SECURITY_INFORMATION;
SECURITY_DESCRIPTOR *sd=(SECURITY_DESCRIPTOR *)&UnpData[0];
int SetCode=SetFileSecurity(FileName,si,sd);
if (!SetCode)
{
uiMsg(UIERROR_ACLSET,Arc.FileName,FileName);
DWORD LastError=GetLastError();
ErrHandler.SysErrMsg();
if (LastError==ERROR_ACCESS_DENIED && !IsUserAdmin())
uiMsg(UIERROR_NEEDADMIN);
ErrHandler.SetErrorCode(RARX_WARNING);
}
}
#endif
void ExtractACL(Archive &Arc,const wchar *FileName)
{
Array<byte> SubData;
if (!Arc.ReadSubData(&SubData,NULL,false))
return;
SetACLPrivileges();
SECURITY_INFORMATION si=OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
DACL_SECURITY_INFORMATION;
if (ReadSacl)
si|=SACL_SECURITY_INFORMATION;
SECURITY_DESCRIPTOR *sd=(SECURITY_DESCRIPTOR *)&SubData[0];
int SetCode=SetFileSecurity(FileName,si,sd);
if (!SetCode)
{
wchar LongName[NM];
if (GetWinLongPath(FileName,LongName,ASIZE(LongName)))
SetCode=SetFileSecurity(LongName,si,sd);
}
if (!SetCode)
{
uiMsg(UIERROR_ACLSET,Arc.FileName,FileName);
DWORD LastError=GetLastError();
ErrHandler.SysErrMsg();
if (LastError==ERROR_ACCESS_DENIED && !IsUserAdmin())
uiMsg(UIERROR_NEEDADMIN);
ErrHandler.SetErrorCode(RARX_WARNING);
}
}
void SetACLPrivileges()
{
static bool InitDone=false;
if (InitDone)
return;
if (SetPrivilege(SE_SECURITY_NAME))
ReadSacl=true;
SetPrivilege(SE_RESTORE_NAME);
InitDone=true;
}
bool SetPrivilege(LPCTSTR PrivName)
{
bool Success=false;
HANDLE hToken;
if (OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &hToken))
{
TOKEN_PRIVILEGES tp;
tp.PrivilegeCount = 1;
tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
if (LookupPrivilegeValue(NULL,PrivName,&tp.Privileges[0].Luid) &&
AdjustTokenPrivileges(hToken, FALSE, &tp, 0, NULL, NULL) &&
GetLastError() == ERROR_SUCCESS)
Success=true;
CloseHandle(hToken);
}
return Success;
}