| 1 | /**************************************************************************/ |
| 2 | /* pck_packer.cpp */ |
| 3 | /**************************************************************************/ |
| 4 | /* This file is part of: */ |
| 5 | /* GODOT ENGINE */ |
| 6 | /* https://godotengine.org */ |
| 7 | /**************************************************************************/ |
| 8 | /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */ |
| 9 | /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */ |
| 10 | /* */ |
| 11 | /* Permission is hereby granted, free of charge, to any person obtaining */ |
| 12 | /* a copy of this software and associated documentation files (the */ |
| 13 | /* "Software"), to deal in the Software without restriction, including */ |
| 14 | /* without limitation the rights to use, copy, modify, merge, publish, */ |
| 15 | /* distribute, sublicense, and/or sell copies of the Software, and to */ |
| 16 | /* permit persons to whom the Software is furnished to do so, subject to */ |
| 17 | /* the following conditions: */ |
| 18 | /* */ |
| 19 | /* The above copyright notice and this permission notice shall be */ |
| 20 | /* included in all copies or substantial portions of the Software. */ |
| 21 | /* */ |
| 22 | /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */ |
| 23 | /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */ |
| 24 | /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */ |
| 25 | /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */ |
| 26 | /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */ |
| 27 | /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */ |
| 28 | /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ |
| 29 | /**************************************************************************/ |
| 30 | |
| 31 | #include "pck_packer.h" |
| 32 | |
| 33 | #include "core/crypto/crypto_core.h" |
| 34 | #include "core/io/file_access.h" |
| 35 | #include "core/io/file_access_encrypted.h" |
| 36 | #include "core/io/file_access_pack.h" // PACK_HEADER_MAGIC, PACK_FORMAT_VERSION |
| 37 | #include "core/version.h" |
| 38 | |
| 39 | static int _get_pad(int p_alignment, int p_n) { |
| 40 | int rest = p_n % p_alignment; |
| 41 | int pad = 0; |
| 42 | if (rest > 0) { |
| 43 | pad = p_alignment - rest; |
| 44 | } |
| 45 | |
| 46 | return pad; |
| 47 | } |
| 48 | |
| 49 | void PCKPacker::_bind_methods() { |
| 50 | ClassDB::bind_method(D_METHOD("pck_start" , "pck_name" , "alignment" , "key" , "encrypt_directory" ), &PCKPacker::pck_start, DEFVAL(32), DEFVAL("0000000000000000000000000000000000000000000000000000000000000000" ), DEFVAL(false)); |
| 51 | ClassDB::bind_method(D_METHOD("add_file" , "pck_path" , "source_path" , "encrypt" ), &PCKPacker::add_file, DEFVAL(false)); |
| 52 | ClassDB::bind_method(D_METHOD("flush" , "verbose" ), &PCKPacker::flush, DEFVAL(false)); |
| 53 | } |
| 54 | |
| 55 | Error PCKPacker::pck_start(const String &p_file, int p_alignment, const String &p_key, bool p_encrypt_directory) { |
| 56 | ERR_FAIL_COND_V_MSG((p_key.is_empty() || !p_key.is_valid_hex_number(false) || p_key.length() != 64), ERR_CANT_CREATE, "Invalid Encryption Key (must be 64 characters long)." ); |
| 57 | ERR_FAIL_COND_V_MSG(p_alignment <= 0, ERR_CANT_CREATE, "Invalid alignment, must be greater then 0." ); |
| 58 | |
| 59 | String _key = p_key.to_lower(); |
| 60 | key.resize(32); |
| 61 | for (int i = 0; i < 32; i++) { |
| 62 | int v = 0; |
| 63 | if (i * 2 < _key.length()) { |
| 64 | char32_t ct = _key[i * 2]; |
| 65 | if (is_digit(ct)) { |
| 66 | ct = ct - '0'; |
| 67 | } else if (ct >= 'a' && ct <= 'f') { |
| 68 | ct = 10 + ct - 'a'; |
| 69 | } |
| 70 | v |= ct << 4; |
| 71 | } |
| 72 | |
| 73 | if (i * 2 + 1 < _key.length()) { |
| 74 | char32_t ct = _key[i * 2 + 1]; |
| 75 | if (is_digit(ct)) { |
| 76 | ct = ct - '0'; |
| 77 | } else if (ct >= 'a' && ct <= 'f') { |
| 78 | ct = 10 + ct - 'a'; |
| 79 | } |
| 80 | v |= ct; |
| 81 | } |
| 82 | key.write[i] = v; |
| 83 | } |
| 84 | enc_dir = p_encrypt_directory; |
| 85 | |
| 86 | file = FileAccess::open(p_file, FileAccess::WRITE); |
| 87 | ERR_FAIL_COND_V_MSG(file.is_null(), ERR_CANT_CREATE, "Can't open file to write: " + String(p_file) + "." ); |
| 88 | |
| 89 | alignment = p_alignment; |
| 90 | |
| 91 | file->store_32(PACK_HEADER_MAGIC); |
| 92 | file->store_32(PACK_FORMAT_VERSION); |
| 93 | file->store_32(VERSION_MAJOR); |
| 94 | file->store_32(VERSION_MINOR); |
| 95 | file->store_32(VERSION_PATCH); |
| 96 | |
| 97 | uint32_t pack_flags = 0; |
| 98 | if (enc_dir) { |
| 99 | pack_flags |= PACK_DIR_ENCRYPTED; |
| 100 | } |
| 101 | file->store_32(pack_flags); // flags |
| 102 | |
| 103 | files.clear(); |
| 104 | ofs = 0; |
| 105 | |
| 106 | return OK; |
| 107 | } |
| 108 | |
| 109 | Error PCKPacker::add_file(const String &p_file, const String &p_src, bool p_encrypt) { |
| 110 | ERR_FAIL_COND_V_MSG(file.is_null(), ERR_INVALID_PARAMETER, "File must be opened before use." ); |
| 111 | |
| 112 | Ref<FileAccess> f = FileAccess::open(p_src, FileAccess::READ); |
| 113 | if (f.is_null()) { |
| 114 | return ERR_FILE_CANT_OPEN; |
| 115 | } |
| 116 | |
| 117 | File pf; |
| 118 | // Simplify path here and on every 'files' access so that paths that have extra '/' |
| 119 | // symbols in them still match to the MD5 hash for the saved path. |
| 120 | pf.path = p_file.simplify_path(); |
| 121 | pf.src_path = p_src; |
| 122 | pf.ofs = ofs; |
| 123 | pf.size = f->get_length(); |
| 124 | |
| 125 | Vector<uint8_t> data = FileAccess::get_file_as_bytes(p_src); |
| 126 | { |
| 127 | unsigned char hash[16]; |
| 128 | CryptoCore::md5(data.ptr(), data.size(), hash); |
| 129 | pf.md5.resize(16); |
| 130 | for (int i = 0; i < 16; i++) { |
| 131 | pf.md5.write[i] = hash[i]; |
| 132 | } |
| 133 | } |
| 134 | pf.encrypted = p_encrypt; |
| 135 | |
| 136 | uint64_t _size = pf.size; |
| 137 | if (p_encrypt) { // Add encryption overhead. |
| 138 | if (_size % 16) { // Pad to encryption block size. |
| 139 | _size += 16 - (_size % 16); |
| 140 | } |
| 141 | _size += 16; // hash |
| 142 | _size += 8; // data size |
| 143 | _size += 16; // iv |
| 144 | } |
| 145 | |
| 146 | int pad = _get_pad(alignment, ofs + _size); |
| 147 | ofs = ofs + _size + pad; |
| 148 | |
| 149 | files.push_back(pf); |
| 150 | |
| 151 | return OK; |
| 152 | } |
| 153 | |
| 154 | Error PCKPacker::flush(bool p_verbose) { |
| 155 | ERR_FAIL_COND_V_MSG(file.is_null(), ERR_INVALID_PARAMETER, "File must be opened before use." ); |
| 156 | |
| 157 | int64_t file_base_ofs = file->get_position(); |
| 158 | file->store_64(0); // files base |
| 159 | |
| 160 | for (int i = 0; i < 16; i++) { |
| 161 | file->store_32(0); // reserved |
| 162 | } |
| 163 | |
| 164 | // write the index |
| 165 | file->store_32(files.size()); |
| 166 | |
| 167 | Ref<FileAccessEncrypted> fae; |
| 168 | Ref<FileAccess> fhead = file; |
| 169 | |
| 170 | if (enc_dir) { |
| 171 | fae.instantiate(); |
| 172 | ERR_FAIL_COND_V(fae.is_null(), ERR_CANT_CREATE); |
| 173 | |
| 174 | Error err = fae->open_and_parse(file, key, FileAccessEncrypted::MODE_WRITE_AES256, false); |
| 175 | ERR_FAIL_COND_V(err != OK, ERR_CANT_CREATE); |
| 176 | |
| 177 | fhead = fae; |
| 178 | } |
| 179 | |
| 180 | for (int i = 0; i < files.size(); i++) { |
| 181 | int string_len = files[i].path.utf8().length(); |
| 182 | int pad = _get_pad(4, string_len); |
| 183 | |
| 184 | fhead->store_32(string_len + pad); |
| 185 | fhead->store_buffer((const uint8_t *)files[i].path.utf8().get_data(), string_len); |
| 186 | for (int j = 0; j < pad; j++) { |
| 187 | fhead->store_8(0); |
| 188 | } |
| 189 | |
| 190 | fhead->store_64(files[i].ofs); |
| 191 | fhead->store_64(files[i].size); // pay attention here, this is where file is |
| 192 | fhead->store_buffer(files[i].md5.ptr(), 16); //also save md5 for file |
| 193 | |
| 194 | uint32_t flags = 0; |
| 195 | if (files[i].encrypted) { |
| 196 | flags |= PACK_FILE_ENCRYPTED; |
| 197 | } |
| 198 | fhead->store_32(flags); |
| 199 | } |
| 200 | |
| 201 | if (fae.is_valid()) { |
| 202 | fhead.unref(); |
| 203 | fae.unref(); |
| 204 | } |
| 205 | |
| 206 | int = _get_pad(alignment, file->get_position()); |
| 207 | for (int i = 0; i < header_padding; i++) { |
| 208 | file->store_8(0); |
| 209 | } |
| 210 | |
| 211 | int64_t file_base = file->get_position(); |
| 212 | file->seek(file_base_ofs); |
| 213 | file->store_64(file_base); // update files base |
| 214 | file->seek(file_base); |
| 215 | |
| 216 | const uint32_t buf_max = 65536; |
| 217 | uint8_t *buf = memnew_arr(uint8_t, buf_max); |
| 218 | |
| 219 | int count = 0; |
| 220 | for (int i = 0; i < files.size(); i++) { |
| 221 | Ref<FileAccess> src = FileAccess::open(files[i].src_path, FileAccess::READ); |
| 222 | uint64_t to_write = files[i].size; |
| 223 | |
| 224 | Ref<FileAccess> ftmp = file; |
| 225 | if (files[i].encrypted) { |
| 226 | fae.instantiate(); |
| 227 | ERR_FAIL_COND_V(fae.is_null(), ERR_CANT_CREATE); |
| 228 | |
| 229 | Error err = fae->open_and_parse(file, key, FileAccessEncrypted::MODE_WRITE_AES256, false); |
| 230 | ERR_FAIL_COND_V(err != OK, ERR_CANT_CREATE); |
| 231 | ftmp = fae; |
| 232 | } |
| 233 | |
| 234 | while (to_write > 0) { |
| 235 | uint64_t read = src->get_buffer(buf, MIN(to_write, buf_max)); |
| 236 | ftmp->store_buffer(buf, read); |
| 237 | to_write -= read; |
| 238 | } |
| 239 | |
| 240 | if (fae.is_valid()) { |
| 241 | ftmp.unref(); |
| 242 | fae.unref(); |
| 243 | } |
| 244 | |
| 245 | int pad = _get_pad(alignment, file->get_position()); |
| 246 | for (int j = 0; j < pad; j++) { |
| 247 | file->store_8(0); |
| 248 | } |
| 249 | |
| 250 | count += 1; |
| 251 | const int file_num = files.size(); |
| 252 | if (p_verbose && (file_num > 0)) { |
| 253 | print_line(vformat("[%d/%d - %d%%] PCKPacker flush: %s -> %s" , count, file_num, float(count) / file_num * 100, files[i].src_path, files[i].path)); |
| 254 | } |
| 255 | } |
| 256 | |
| 257 | file.unref(); |
| 258 | memdelete_arr(buf); |
| 259 | |
| 260 | return OK; |
| 261 | } |
| 262 | |