wok-6.x rev 17591

syslinux/isohybrib.exe: add --md5, --undo
author Pascal Bellard <pascal.bellard@slitaz.org>
date Tue Feb 10 08:53:27 2015 +0100 (2015-02-10)
parents 93ebe04d2558
children 24b07aa2fafd
files syslinux/stuff/iso2exe/init syslinux/stuff/iso2exe/iso2exe.c syslinux/stuff/iso2exe/iso2exe.sh
line diff
     1.1 --- a/syslinux/stuff/iso2exe/init	Mon Feb 09 21:52:32 2015 +0000
     1.2 +++ b/syslinux/stuff/iso2exe/init	Tue Feb 10 08:53:27 2015 +0100
     1.3 @@ -655,7 +655,7 @@
     1.4  {
     1.5  	dotwait "Checking iso image"
     1.6  	[ "$(ddq if=/dev/loop0 bs=2k skip=16 \
     1.7 -	     count=$(echo $(get 32848 /dev/loop0)) | md5sum)" == \
     1.8 +	     count=$(echo $(get 32848 /dev/loop0 4)) | md5sum)" == \
     1.9  	  "$(ddq if=/dev/loop0 bs=16 count=1 skip=2047 | od -N 16 -t x1 -An | \
    1.10  	     sed 's/ //g')  -" ] && echo "OK" || echo "ERROR"
    1.11  	echo -en "\rChecking iso hybrid boot"
     2.1 --- a/syslinux/stuff/iso2exe/iso2exe.c	Mon Feb 09 21:52:32 2015 +0000
     2.2 +++ b/syslinux/stuff/iso2exe/iso2exe.c	Tue Feb 10 08:53:27 2015 +0100
     2.3 @@ -9,9 +9,11 @@
     2.4  #ifdef WIN32
     2.5  #include <windows.h>
     2.6  #endif
     2.7 +typedef unsigned char uint8_t;
     2.8 +typedef unsigned long uint32_t;
     2.9  #include "iso2exe.h"
    2.10  
    2.11 -static int fd, forced, status = 1;
    2.12 +static int fd, forced, uninstall, status = 1;
    2.13  static char tazlitoinfo[0x8000U - BOOTISOSZ];
    2.14  #define buffer tazlitoinfo
    2.15  #define BUFFERSZ 2048
    2.16 @@ -27,6 +29,217 @@
    2.17  	}
    2.18  }
    2.19  
    2.20 +static int domd5 = 0;
    2.21 +#define ALIGN1
    2.22 +
    2.23 +typedef struct {
    2.24 +	uint32_t l;
    2.25 +	uint32_t h;
    2.26 +} uint64_t;
    2.27 +static uint8_t wbuffer[64]; /* always correctly aligned for uint64_t */
    2.28 +static uint64_t total64;    /* must be directly before hash[] */
    2.29 +static uint32_t hash[8];    /* 4 elements for md5, 5 for sha1, 8 for sha256 */
    2.30 +
    2.31 +//#define rotl32(x,n) (((x) << (n)) | ((x) >> (32 - (n))))
    2.32 +static uint32_t rotl32(uint32_t x, unsigned n)
    2.33 +{
    2.34 +	return (x << n) | (x >> (32 - n));
    2.35 +}
    2.36 +
    2.37 +static void md5_process_block64(void);
    2.38 +
    2.39 +/* Feed data through a temporary buffer.
    2.40 + * The internal buffer remembers previous data until it has 64
    2.41 + * bytes worth to pass on.
    2.42 + */
    2.43 +static void common64_hash(const void *buffer, size_t len)
    2.44 +{
    2.45 +	unsigned bufpos = total64.l & 63;
    2.46 +
    2.47 +	total64.l += len; if (total64.l < len) total64.h++;
    2.48 +
    2.49 +	while (1) {
    2.50 +		unsigned remaining = 64 - bufpos;
    2.51 +		if (remaining > len)
    2.52 +			remaining = len;
    2.53 +		/* Copy data into aligned buffer */
    2.54 +		memcpy(wbuffer + bufpos, buffer, remaining);
    2.55 +		len -= remaining;
    2.56 +		buffer = (const char *)buffer + remaining;
    2.57 +		bufpos += remaining;
    2.58 +		/* clever way to do "if (bufpos != 64) break; ... ; bufpos = 0;" */
    2.59 +		bufpos -= 64;
    2.60 +		if (bufpos != 0)
    2.61 +			break;
    2.62 +		/* Buffer is filled up, process it */
    2.63 +		md5_process_block64();
    2.64 +		/*bufpos = 0; - already is */
    2.65 +	}
    2.66 +}
    2.67 +
    2.68 +/* Process the remaining bytes in the buffer */
    2.69 +static void common64_end(void)
    2.70 +{
    2.71 +	unsigned bufpos = total64.l & 63;
    2.72 +	/* Pad the buffer to the next 64-byte boundary with 0x80,0,0,0... */
    2.73 +	wbuffer[bufpos++] = 0x80;
    2.74 +
    2.75 +	/* This loop iterates either once or twice, no more, no less */
    2.76 +	while (1) {
    2.77 +		unsigned remaining = 64 - bufpos;
    2.78 +		memset(wbuffer + bufpos, 0, remaining);
    2.79 +		/* Do we have enough space for the length count? */
    2.80 +		if (remaining >= 8) {
    2.81 +			/* Store the 64-bit counter of bits in the buffer */
    2.82 +			//uint64_t t = total64 << 3;
    2.83 +			uint32_t *t = (uint32_t *) (&wbuffer[64 - 8]);
    2.84 +			/* wbuffer is suitably aligned for this */
    2.85 +			//*(uint64_t *) (&wbuffer[64 - 8]) = t;
    2.86 +			t[0] = total64.l << 3;
    2.87 +			t[1] = (total64.h << 3) | (total64.l >> 29);
    2.88 +		}
    2.89 +		md5_process_block64();
    2.90 +		if (remaining >= 8)
    2.91 +			break;
    2.92 +		bufpos = 0;
    2.93 +	}
    2.94 +}
    2.95 +
    2.96 +/* These are the four functions used in the four steps of the MD5 algorithm
    2.97 + * and defined in the RFC 1321.  The first function is a little bit optimized
    2.98 + * (as found in Colin Plumbs public domain implementation).
    2.99 + * #define FF(b, c, d) ((b & c) | (~b & d))
   2.100 + */
   2.101 +#undef FF
   2.102 +#undef FG
   2.103 +#undef FH
   2.104 +#undef FI
   2.105 +#define FF(b, c, d) (d ^ (b & (c ^ d)))
   2.106 +#define FG(b, c, d) FF(d, b, c)
   2.107 +#define FH(b, c, d) (b ^ c ^ d)
   2.108 +#define FI(b, c, d) (c ^ (b | ~d))
   2.109 +
   2.110 +/* Hash a single block, 64 bytes long and 4-byte aligned */
   2.111 +static void md5_process_block64(void)
   2.112 +{
   2.113 +	uint32_t *words = (void*) wbuffer;
   2.114 +	uint32_t A = hash[0];
   2.115 +	uint32_t B = hash[1];
   2.116 +	uint32_t C = hash[2];
   2.117 +	uint32_t D = hash[3];
   2.118 +
   2.119 +	const uint32_t *pc;
   2.120 +	const char *pp;
   2.121 +	const char *ps;
   2.122 +	int i;
   2.123 +	uint32_t temp;
   2.124 +
   2.125 +
   2.126 +	pc = C_array;
   2.127 +	pp = P_array;
   2.128 +	ps = S_array - 4;
   2.129 +
   2.130 +	for (i = 0; i < 64; i++) {
   2.131 +		if ((i & 0x0f) == 0)
   2.132 +			ps += 4;
   2.133 +		temp = A;
   2.134 +		switch (i >> 4) {
   2.135 +		case 0:
   2.136 +			temp += FF(B, C, D);
   2.137 +			break;
   2.138 +		case 1:
   2.139 +			temp += FG(B, C, D);
   2.140 +			break;
   2.141 +		case 2:
   2.142 +			temp += FH(B, C, D);
   2.143 +			break;
   2.144 +		case 3:
   2.145 +			temp += FI(B, C, D);
   2.146 +		}
   2.147 +		temp += words[(int) (*pp++)] + *pc++;
   2.148 +		temp = rotl32(temp, ps[i & 3]);
   2.149 +		temp += B;
   2.150 +		A = D;
   2.151 +		D = C;
   2.152 +		C = B;
   2.153 +		B = temp;
   2.154 +	}
   2.155 +	/* Add checksum to the starting values */
   2.156 +	hash[0] += A;
   2.157 +	hash[1] += B;
   2.158 +	hash[2] += C;
   2.159 +	hash[3] += D;
   2.160 +
   2.161 +}
   2.162 +#undef FF
   2.163 +#undef FG
   2.164 +#undef FH
   2.165 +#undef FI
   2.166 +
   2.167 +/* Initialize structure containing state of computation.
   2.168 + * (RFC 1321, 3.3: Step 3)
   2.169 + */
   2.170 +static void md5_begin(void)
   2.171 +{
   2.172 +	hash[0] = 0x67452301;
   2.173 +	hash[1] = 0xefcdab89;
   2.174 +	hash[2] = 0x98badcfe;
   2.175 +	hash[3] = 0x10325476;
   2.176 +	total64.l = total64.h = 0;
   2.177 +}
   2.178 +
   2.179 +/* Used also for sha1 and sha256 */
   2.180 +#define md5_hash common64_hash
   2.181 +
   2.182 +/* Process the remaining bytes in the buffer and put result from CTX
   2.183 + * in first 16 bytes following RESBUF.  The result is always in little
   2.184 + * endian byte order, so that a byte-wise output yields to the wanted
   2.185 + * ASCII representation of the message digest.
   2.186 + */
   2.187 +#define md5_end common64_end
   2.188 +
   2.189 +static void md5sum(void)
   2.190 +{
   2.191 +	unsigned long sectors = 0;
   2.192 +	int count;
   2.193 +
   2.194 +	lseek(fd, 32768UL, SEEK_SET);
   2.195 +
   2.196 +	md5_begin();
   2.197 +	while ((count = read(fd, buffer, BUFFERSZ)) > 0) {
   2.198 +		if (sectors == 0)
   2.199 +			sectors = LONG(buffer + 80);
   2.200 +		md5_hash(buffer, count);
   2.201 +		if (--sectors == 0)
   2.202 +			break;
   2.203 +	}
   2.204 +
   2.205 +	if (count < 0)
   2.206 +		return;
   2.207 +
   2.208 +	md5_end();
   2.209 +
   2.210 +	lseek(fd, 32752UL, SEEK_SET);
   2.211 +	write(fd, hash, 16);
   2.212 +	memcpy(bootiso + BOOTISOSZ - 16, hash, 16);
   2.213 +}
   2.214 +
   2.215 +static unsigned chksum(unsigned start, unsigned stop)
   2.216 +{
   2.217 +	unsigned i, n = 0;
   2.218 +
   2.219 +	lseek(fd, 0UL /* (unsigned long) (start / BUFFERSZ) */, SEEK_SET);
   2.220 +	while (1) {
   2.221 +		if (read(fd, buffer, BUFFERSZ) != BUFFERSZ)
   2.222 +			return 0;
   2.223 +		for (i = start % BUFFERSZ; i < BUFFERSZ; i += 2, start += 2) {
   2.224 +			if (start >= stop)
   2.225 +				return - n;
   2.226 +			n += WORD(buffer + i);
   2.227 +		}
   2.228 +	}
   2.229 +}
   2.230 +
   2.231  static unsigned install(char *filename)
   2.232  {
   2.233  #define heads 64
   2.234 @@ -50,6 +263,23 @@
   2.235  	if (fd == -1)
   2.236  		return OPENERR;
   2.237  
   2.238 +	if (uninstall) {
   2.239 +		struct { char check[sizeof(tazlitoinfo) - BUFFERSZ - 1024]; };
   2.240 +		readsector(0UL);
   2.241 +		n = BUFFERSZ;
   2.242 +		if (WORD(buffer) == 23117) {
   2.243 +			readsector((unsigned long) buffer[69]);
   2.244 +			n = 0;
   2.245 +		}
   2.246 +		lseek(fd, 0UL, SEEK_SET);
   2.247 +		for (i = 0; i < 32; i++, n = BUFFERSZ) {
   2.248 +			write(fd, buffer + n, 1024);
   2.249 +		}
   2.250 +		close(fd);
   2.251 +		status = 0;
   2.252 +		return UNINSTALLMSG;
   2.253 +	}
   2.254 +
   2.255  	if (forced == 0) {
   2.256  		status = 2;
   2.257  		/* Install hybridiso boot sector */
   2.258 @@ -105,18 +335,22 @@
   2.259  	write(fd, tazlitoinfo, sizeof(tazlitoinfo));
   2.260  	write(fd, bootiso + n, BOOTISOSZ - n); /* COM + rootfs + EXE/DOS */
   2.261  
   2.262 -	/* Compute the checksum */
   2.263 -	lseek(fd, 0UL, SEEK_SET);
   2.264 -	for (i = 66, n = 0, j = 0; j < 16; j++, i = 0) {
   2.265 -		if (read(fd, buffer, BUFFERSZ) != BUFFERSZ)
   2.266 -			goto nochksum;
   2.267 -		for (; i < BUFFERSZ; i += 2)
   2.268 -			n += WORD(buffer + i);
   2.269 +	if (domd5) {
   2.270 +		puts(bootiso + MD5MSG);
   2.271 +		md5sum();
   2.272  	}
   2.273 -	WORD(bootiso + 64) = -n;
   2.274 -	lseek(fd, 0UL, SEEK_SET);
   2.275 -	write(fd, bootiso, 512);
   2.276 -nochksum:
   2.277 +	
   2.278 +	/* Compute the boot checksums */
   2.279 +	if ((WORD(bootiso + 64) = chksum(66, 32768)) != 0) {
   2.280 +		if (domd5) {
   2.281 +			lseek(fd, 0UL, SEEK_SET);
   2.282 +			write(fd, bootiso, 512);
   2.283 +			n = WORD(bootiso + 2) - 512*(WORD(bootiso + 4) - 1);
   2.284 +			WORD(bootiso + 18) = chksum(0, n) - 1;
   2.285 +		}
   2.286 +		lseek(fd, 0UL, SEEK_SET);
   2.287 +		write(fd, bootiso, 512);
   2.288 +	}
   2.289  	close(fd);
   2.290  	status = 0;
   2.291  	return SUCCESSMSG;
   2.292 @@ -124,7 +358,16 @@
   2.293  
   2.294  int main(int argc, char *argv[])
   2.295  {
   2.296 -	forced = (argc > 2);
   2.297 +	int i;
   2.298 +	for (i = 2; i < argc; i++) {
   2.299 +		char *s = argv[i];
   2.300 +		while ((unsigned)(*s - '-') <= ('/' - '-')) s++;
   2.301 +		switch (*s | 0x20) {
   2.302 +		case 'f' : forced++; break;
   2.303 +		case 'm' : domd5++; break;
   2.304 +		case 'u' : uninstall++; break;
   2.305 +		}
   2.306 +	}
   2.307  	puts(bootiso + install(argv[1]));
   2.308  	if (status > 1)
   2.309  		puts(bootiso + FORCEMSG);
     3.1 --- a/syslinux/stuff/iso2exe/iso2exe.sh	Mon Feb 09 21:52:32 2015 +0000
     3.2 +++ b/syslinux/stuff/iso2exe/iso2exe.sh	Tue Feb 10 08:53:27 2015 +0100
     3.3 @@ -140,8 +140,49 @@
     3.4  
     3.5  #ifdef WIN32
     3.6  static char $name[] = {
     3.7 +/* head */
     3.8  $(hexdump -v -n $HSZ -e '"    " 16/1 "0x%02X, "' -e '"  // %04.4_ax |" 16/1 "%_p" "| \n"' $DATA | sed 's/ 0x  ,/      /g')
     3.9 +/* tail */
    3.10  $(hexdump -v -s $OFS -e '"    " 16/1 "0x%02X, "' -e '"  // %04.4_ax |" 16/1 "%_p" "| \n"' $DATA | sed 's/ 0x  ,/      /g')
    3.11 +
    3.12 +/* These strange constants are defined in RFC 1321 as
    3.13 +   T[i] = (int)(4294967296.0 * fabs(sin(i))), i=1..64
    3.14 + */
    3.15 +/* static const uint32_t C_array[64] */
    3.16 +EOT
    3.17 +	while read a b c d; do
    3.18 +		for i in $a $b $c $d; do
    3.19 +			echo $i | sed 's/0x\(..\)\(..\)\(..\)\(..\),/0x\4, 0x\3, 0x\2, 0x\1, /'
    3.20 +		done
    3.21 +	done <<EOT
    3.22 +	0xd76aa478, 0xe8c7b756, 0x242070db, 0xc1bdceee,
    3.23 +	0xf57c0faf, 0x4787c62a, 0xa8304613, 0xfd469501,
    3.24 +	0x698098d8, 0x8b44f7af, 0xffff5bb1, 0x895cd7be,
    3.25 +	0x6b901122, 0xfd987193, 0xa679438e, 0x49b40821,
    3.26 +	0xf61e2562, 0xc040b340, 0x265e5a51, 0xe9b6c7aa,
    3.27 +	0xd62f105d, 0x02441453, 0xd8a1e681, 0xe7d3fbc8,
    3.28 +	0x21e1cde6, 0xc33707d6, 0xf4d50d87, 0x455a14ed,
    3.29 +	0xa9e3e905, 0xfcefa3f8, 0x676f02d9, 0x8d2a4c8a,
    3.30 +	0xfffa3942, 0x8771f681, 0x6d9d6122, 0xfde5380c,
    3.31 +	0xa4beea44, 0x4bdecfa9, 0xf6bb4b60, 0xbebfbc70,
    3.32 +	0x289b7ec6, 0xeaa127fa, 0xd4ef3085, 0x04881d05,
    3.33 +	0xd9d4d039, 0xe6db99e5, 0x1fa27cf8, 0xc4ac5665,
    3.34 +	0xf4292244, 0x432aff97, 0xab9423a7, 0xfc93a039,
    3.35 +	0x655b59c3, 0x8f0ccc92, 0xffeff47d, 0x85845dd1,
    3.36 +	0x6fa87e4f, 0xfe2ce6e0, 0xa3014314, 0x4e0811a1,
    3.37 +	0xf7537e82, 0xbd3af235, 0x2ad7d2bb, 0xeb86d391,
    3.38 +EOT
    3.39 +	cat <<EOT
    3.40 +/* static const char P_array[64] */
    3.41 +	0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, /* 1 */
    3.42 +	1, 6, 11, 0, 5, 10, 15, 4, 9, 14, 3, 8, 13, 2, 7, 12, /* 2 */
    3.43 +	5, 8, 11, 14, 1, 4, 7, 10, 13, 0, 3, 6, 9, 12, 15, 2, /* 3 */
    3.44 +	0, 7, 14, 5, 12, 3, 10, 1, 8, 15, 6, 13, 4, 11, 2, 9, /* 4 */
    3.45 +/* static const char S_array[16] */
    3.46 +	7, 12, 17, 22,
    3.47 +	5, 9, 14, 20,
    3.48 +	4, 11, 16, 23,
    3.49 +	6, 10, 15, 21,
    3.50  EOT
    3.51  
    3.52  for mode in data offset ; do
    3.53 @@ -158,21 +199,27 @@
    3.54  #else
    3.55  static char *$name;
    3.56  #endif
    3.57 +
    3.58 +#define C_array (uint32_t *) ($name + $(($BOOTISOSZ)))
    3.59 +#define P_array (char *)     ($name + $(($BOOTISOSZ+(64*4))))
    3.60 +#define S_array (char *)     ($name + $(($BOOTISOSZ+(64*4)+64)))
    3.61  #define ELTORITOOFS	3
    3.62  EOT
    3.63  			fi
    3.64 -			echo "#define $tag	$(($BOOTISOSZ+$ofs))"
    3.65 +			echo "#define $tag	$(($BOOTISOSZ+(64*4)+64+16+$ofs))"
    3.66  			ofs=$(($(echo -en "$str\0" | wc -c)+$ofs))
    3.67  		fi
    3.68  	done <<EOT
    3.69  READSECTORERR	Read sector failure.
    3.70 -USAGE		Usage: isohybrid.exe file.iso [--forced]
    3.71 +USAGE		Usage: isohybrid.exe file.iso [--forced|--undo|--md5]
    3.72  OPENERR		Can't open r/w the iso file.
    3.73  ELTORITOERR	No EL TORITO SPECIFICATION signature.
    3.74  CATALOGERR	Invalid boot catalog.
    3.75  HYBRIDERR	No isolinux.bin hybrid signature.
    3.76  SUCCESSMSG	Now you can create a USB key with your .iso file.\\\\nSimply rename it to a .exe file and run it.
    3.77  FORCEMSG	You can add --forced to proceed anyway.
    3.78 +MD5MSG		Computing md5sum...
    3.79 +UNINSTALLMSG	Uninstall done.
    3.80  EOT
    3.81  done
    3.82  	rm -rf $DATA
    3.83 @@ -242,7 +289,7 @@
    3.84  		ddq bs=1 seek=$((0x7FDE)) count=15 conv=notrunc of=$1
    3.85  	if [ $(stat -c %s $1) -gt 34816 ]; then
    3.86  		echo "Adding ISO image md5 at 7FF0 (16 bytes) ..."
    3.87 -		echo -en "$(ddq if=$1 bs=2k skip=16 count=$(get 32848 $1) | \
    3.88 +		echo -en "$(ddq if=$1 bs=2k skip=16 count=$(get 32848 $1 4) | \
    3.89  			md5sum | cut -c-32 | sed 's/\(..\)/\\x\1/g')" | \
    3.90  			ddq bs=16 seek=2047 conv=notrunc of=$1
    3.91  	fi