2017-12-06 18:30:48 +01:00
|
|
|
#include <malloc.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "utils.h"
|
|
|
|
|
|
|
|
static int check_verity_pattern(const char *s) {
|
2017-12-28 21:25:03 +01:00
|
|
|
int skip = 0;
|
|
|
|
if (s[0] == ',') ++skip;
|
|
|
|
if (strncmp(s + skip, "verify", 6) == 0)
|
|
|
|
skip += 6;
|
|
|
|
else if (strncmp(s + skip, "avb", 3) == 0)
|
|
|
|
skip += 3;
|
2017-12-06 18:30:48 +01:00
|
|
|
else
|
|
|
|
return -1;
|
|
|
|
|
2017-12-28 21:25:03 +01:00
|
|
|
if (s[skip] == '=') {
|
|
|
|
while (s[skip] != '\0' && s[skip] != ' ' && s[skip] != '\n' && s[skip] != ',') ++skip;
|
2017-12-06 18:30:48 +01:00
|
|
|
}
|
2017-12-28 21:25:03 +01:00
|
|
|
return skip;
|
2017-12-06 18:30:48 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static int check_encryption_pattern(const char *s) {
|
|
|
|
const char *encrypt_list[] = { "forceencrypt", "forcefdeorfbe", NULL };
|
|
|
|
for (int i = 0 ; encrypt_list[i]; ++i) {
|
|
|
|
int len = strlen(encrypt_list[i]);
|
|
|
|
if (strncmp(s, encrypt_list[i], len) == 0)
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void patch_init_rc(void **buf, size_t *size) {
|
|
|
|
int injected = 0;
|
|
|
|
char *new_data = malloc(*size + 23);
|
|
|
|
char *old_data = *buf;
|
|
|
|
size_t pos = 0;
|
|
|
|
|
|
|
|
for (char *tok = strsep(&old_data, "\n"); tok; tok = strsep(&old_data, "\n")) {
|
|
|
|
if (!injected && strncmp(tok, "import", 6) == 0) {
|
|
|
|
if (strstr(tok, "init.magisk.rc")) {
|
|
|
|
injected = 1;
|
|
|
|
} else {
|
|
|
|
strcpy(new_data + pos, "import /init.magisk.rc\n");
|
|
|
|
pos += 23;
|
|
|
|
injected = 1;
|
|
|
|
}
|
|
|
|
} else if (strstr(tok, "selinux.reload_policy")) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
// Copy the line
|
|
|
|
strcpy(new_data + pos, tok);
|
|
|
|
pos += strlen(tok);
|
|
|
|
new_data[pos++] = '\n';
|
|
|
|
}
|
|
|
|
|
|
|
|
free(*buf);
|
|
|
|
*size = pos;
|
|
|
|
*buf = new_data;
|
|
|
|
}
|
|
|
|
|
2017-12-06 20:21:13 +01:00
|
|
|
int patch_verity(void **buf, uint32_t *size, int patch) {
|
2017-12-28 21:25:03 +01:00
|
|
|
int skip, src_size = *size;
|
|
|
|
char *src = *buf, *patched = patch ? xcalloc(src_size, 1) : NULL;
|
|
|
|
for (int read = 0, write = 0; read < src_size; ++read, ++write) {
|
|
|
|
if ((skip = check_verity_pattern(src + read)) > 0) {
|
|
|
|
if (!patch)
|
|
|
|
return 1;
|
|
|
|
fprintf(stderr, "Remove pattern [%.*s]\n", skip, src + read);
|
|
|
|
read += skip;
|
|
|
|
*size -= skip;
|
2017-12-06 18:30:48 +01:00
|
|
|
}
|
2017-12-28 21:25:03 +01:00
|
|
|
if (patch)
|
|
|
|
patched[write] = src[read];
|
2017-12-06 18:30:48 +01:00
|
|
|
}
|
2017-12-31 12:30:56 +01:00
|
|
|
if (patch) {
|
|
|
|
free(*buf);
|
|
|
|
*buf = patched;
|
|
|
|
}
|
2017-12-28 21:25:03 +01:00
|
|
|
return 0;
|
2017-12-06 18:30:48 +01:00
|
|
|
}
|
|
|
|
|
2017-12-06 20:21:13 +01:00
|
|
|
void patch_encryption(void **buf, uint32_t *size) {
|
2017-12-28 21:25:03 +01:00
|
|
|
int skip, src_size = *size;
|
|
|
|
char *src = *buf, *patched = xcalloc(src_size, 1);
|
|
|
|
for (int read = 0, write = 0; read < src_size; ++read, ++write) {
|
|
|
|
if ((skip = check_encryption_pattern(src + read)) > 0) {
|
|
|
|
fprintf(stderr, "Replace pattern [%.*s] with [encryptable]\n", skip, src + read);
|
|
|
|
memcpy(patched + read, "encryptable", 11);
|
|
|
|
read += skip;
|
|
|
|
write += 11;
|
2017-12-06 18:30:48 +01:00
|
|
|
*size -= (skip - 11);
|
|
|
|
}
|
2017-12-28 21:25:03 +01:00
|
|
|
patched[write] = src[read];
|
2017-12-06 18:30:48 +01:00
|
|
|
}
|
2017-12-28 21:25:03 +01:00
|
|
|
free(*buf);
|
|
|
|
*buf = patched;
|
2017-12-06 18:30:48 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|