mirror of
				https://github.com/pbatard/rufus.git
				synced 2024-08-14 23:57:05 +00:00 
			
		
		
		
	[pki] check timestamp chronology during update validation
* Done to address the second "vulnerability" proposed in #1009, independently of the protocol used.
This commit is contained in:
		
							parent
							
								
									c3c39f7f8a
								
							
						
					
					
						commit
						35da381a11
					
				
					 6 changed files with 253 additions and 8 deletions
				
			
		|  | @ -565,6 +565,10 @@ t MSG_297 "Truncated ISO detected" | ||||||
| t MSG_298 "The ISO file you have selected does not match its declared size: %s of data is missing!\n\nIf you obtained " | t MSG_298 "The ISO file you have selected does not match its declared size: %s of data is missing!\n\nIf you obtained " | ||||||
| 	"this file from the Internet, you should try to download a new copy and verify that the MD5 or SHA checksums match " | 	"this file from the Internet, you should try to download a new copy and verify that the MD5 or SHA checksums match " | ||||||
| 	"the official ones.\n\nNote that you can compute the MD5 or SHA in Rufus by clicking the '#' button." | 	"the official ones.\n\nNote that you can compute the MD5 or SHA in Rufus by clicking the '#' button." | ||||||
|  | t MSG_299 "Timestamp validation error" | ||||||
|  | t MSG_300 "Rufus could not validate that the timestamp of the downloaded update is more recent than the one for the " | ||||||
|  | 	"current executable.\n\nIn order to prevent potential attack scenarios, the update process has been aborted and " | ||||||
|  | 	"the download will be deleted. Please check the log for more details." | ||||||
| 
 | 
 | ||||||
| ################################################################################ | ################################################################################ | ||||||
| ############################# TRANSLATOR END COPY ############################## | ############################# TRANSLATOR END COPY ############################## | ||||||
|  |  | ||||||
							
								
								
									
										73
									
								
								src/parser.c
									
										
									
									
									
								
							
							
						
						
									
										73
									
								
								src/parser.c
									
										
									
									
									
								
							|  | @ -1265,3 +1265,76 @@ char* replace_char(const char* src, const char c, const char* rep) | ||||||
| 	res[j] = 0; | 	res[j] = 0; | ||||||
| 	return res; | 	return res; | ||||||
| } | } | ||||||
|  | 
 | ||||||
|  | static void* get_oid_data_from_asn1_internal(const uint8_t* buf, size_t buf_len, const void* oid, | ||||||
|  | 			size_t oid_len, uint8_t asn1_type, size_t* data_len, BOOL* matched) | ||||||
|  | { | ||||||
|  | 	void* ret; | ||||||
|  | 	size_t pos = 0, len, len_len, i; | ||||||
|  | 	uint8_t tag; | ||||||
|  | 	BOOL is_sequence; | ||||||
|  | 
 | ||||||
|  | 	while (pos < buf_len) { | ||||||
|  | 		is_sequence = buf[pos] & 0x20;	// Only need to handle the sequence attribute
 | ||||||
|  | 		tag = buf[pos++] & 0x1F; | ||||||
|  | 
 | ||||||
|  | 		// Compute the length
 | ||||||
|  | 		len = 0; | ||||||
|  | 		len_len = 1; | ||||||
|  | 		if (tag == 0x05) {	// ignore "NULL" tag
 | ||||||
|  | 			pos++; | ||||||
|  | 		} else { | ||||||
|  | 			if (buf[pos] & 0x80) { | ||||||
|  | 				len_len = buf[pos++] & 0x7F; | ||||||
|  | 				// The data we're dealing with is not expected to ever be larger than 64K
 | ||||||
|  | 				if (len_len > 2) { | ||||||
|  | 					uprintf("get_oid_data_from_asn1: Length fields larger than 2 bytes are unsupported"); | ||||||
|  | 					return NULL; | ||||||
|  | 				} | ||||||
|  | 				for (i = 0; i < len_len; i++) { | ||||||
|  | 					len <<= 8; | ||||||
|  | 					len += buf[pos++]; | ||||||
|  | 				} | ||||||
|  | 			} else { | ||||||
|  | 				len = buf[pos++]; | ||||||
|  | 			} | ||||||
|  | 
 | ||||||
|  | 			if (len > buf_len - pos) { | ||||||
|  | 				uprintf("get_oid_data_from_asn1: Overflow error (computed length %d is larger than remaining data)", len); | ||||||
|  | 				return NULL; | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 
 | ||||||
|  | 		if (len != 0) { | ||||||
|  | 			if (is_sequence) { | ||||||
|  | 				ret = get_oid_data_from_asn1_internal(&buf[pos], len, oid, oid_len, asn1_type, data_len, matched); | ||||||
|  | 				if (ret != NULL) | ||||||
|  | 					return ret; | ||||||
|  | 			} else { | ||||||
|  | 				// NB: 0x06 = "OID" tag
 | ||||||
|  | 				if ((!*matched) && (tag == 0x06) && (len == oid_len) && (memcmp(&buf[pos], oid, oid_len) == 0)) { | ||||||
|  | 					*matched = TRUE; | ||||||
|  | 				} else if ((*matched) && (tag == asn1_type)) { | ||||||
|  | 					*data_len = len; | ||||||
|  | 					return (void*) &buf[pos]; | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 			pos += len; | ||||||
|  | 		} | ||||||
|  | 	}; | ||||||
|  | 
 | ||||||
|  | 	return NULL; | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | /*
 | ||||||
|  |  * Parse an ASN.1 binary buffer and return a pointer to the first instance of OID data of type 'asn1_type', | ||||||
|  |  * matching the binary OID 'oid' (of size 'oid_len'). If successful, the length or the returned data is | ||||||
|  |  * placed in 'data_len'. | ||||||
|  |  * If 'oid' is NULL, the first data element of type 'asn1_type' is returned. | ||||||
|  |  */ | ||||||
|  | void* get_oid_data_from_asn1(const uint8_t* buf, size_t buf_len, const uint8_t* oid, size_t oid_len, | ||||||
|  | 	uint8_t asn1_type, size_t* data_len) | ||||||
|  | { | ||||||
|  | 	BOOL matched = (oid == NULL); | ||||||
|  | 	return get_oid_data_from_asn1_internal(buf, buf_len, oid, oid_len, asn1_type, data_len, &matched); | ||||||
|  | } | ||||||
|  |  | ||||||
							
								
								
									
										168
									
								
								src/pki.c
									
										
									
									
									
								
							
							
						
						
									
										168
									
								
								src/pki.c
									
										
									
									
									
								
							|  | @ -119,6 +119,8 @@ const char* WinPKIErrorString(void) | ||||||
| 		return "Not digitally signed."; | 		return "Not digitally signed."; | ||||||
| 	case TRUST_E_EXPLICIT_DISTRUST: | 	case TRUST_E_EXPLICIT_DISTRUST: | ||||||
| 		return "One of the certificates used was marked as untrusted by the user."; | 		return "One of the certificates used was marked as untrusted by the user."; | ||||||
|  | 	case TRUST_E_TIME_STAMP: | ||||||
|  | 		return "The timestamp could not be verified."; | ||||||
| 	default: | 	default: | ||||||
| 		static_sprintf(error_string, "Unknown PKI error 0x%08lX", error_code); | 		static_sprintf(error_string, "Unknown PKI error 0x%08lX", error_code); | ||||||
| 		return error_string; | 		return error_string; | ||||||
|  | @ -137,7 +139,6 @@ char* GetSignatureName(const char* path) | ||||||
| 	PCCERT_CONTEXT pCertContext = NULL; | 	PCCERT_CONTEXT pCertContext = NULL; | ||||||
| 	DWORD dwSize, dwEncoding, dwContentType, dwFormatType, dwSubjectSize; | 	DWORD dwSize, dwEncoding, dwContentType, dwFormatType, dwSubjectSize; | ||||||
| 	PCMSG_SIGNER_INFO pSignerInfo = NULL; | 	PCMSG_SIGNER_INFO pSignerInfo = NULL; | ||||||
| 	PCMSG_SIGNER_INFO pCounterSignerInfo = NULL; |  | ||||||
| 	DWORD dwSignerInfo = 0; | 	DWORD dwSignerInfo = 0; | ||||||
| 	CERT_INFO CertInfo = { 0 }; | 	CERT_INFO CertInfo = { 0 }; | ||||||
| 	SPROG_PUBLISHERINFO ProgPubInfo = { 0 }; | 	SPROG_PUBLISHERINFO ProgPubInfo = { 0 }; | ||||||
|  | @ -221,7 +222,6 @@ out: | ||||||
| 	safe_free(ProgPubInfo.lpszPublisherLink); | 	safe_free(ProgPubInfo.lpszPublisherLink); | ||||||
| 	safe_free(ProgPubInfo.lpszMoreInfoLink); | 	safe_free(ProgPubInfo.lpszMoreInfoLink); | ||||||
| 	safe_free(pSignerInfo); | 	safe_free(pSignerInfo); | ||||||
| 	safe_free(pCounterSignerInfo); |  | ||||||
| 	if (pCertContext != NULL) | 	if (pCertContext != NULL) | ||||||
| 		CertFreeCertificateContext(pCertContext); | 		CertFreeCertificateContext(pCertContext); | ||||||
| 	if (hStore != NULL) | 	if (hStore != NULL) | ||||||
|  | @ -231,6 +231,154 @@ out: | ||||||
| 	return p; | 	return p; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
|  | // The timestamping authorities we use are RFC 3161 compliant
 | ||||||
|  | static uint64_t GetRFC3161TimeStamp(PCMSG_SIGNER_INFO pSignerInfo) | ||||||
|  | { | ||||||
|  | 	// Binary representation of szOID_TIMESTAMP_TOKEN or "1.2.840.113549.1.9.16.1.4"
 | ||||||
|  | 	const uint8_t OID_RFC3161_timeStamp[] = { 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x10, 0x01, 0x04 }; | ||||||
|  | 	BOOL r; | ||||||
|  | 	DWORD n, dwSize; | ||||||
|  | 	PCRYPT_CONTENT_INFO pCounterSignerInfo = NULL; | ||||||
|  | 	uint64_t ts = 0ULL; | ||||||
|  | 	uint8_t *timestamp_token; | ||||||
|  | 	size_t timestamp_token_size; | ||||||
|  | 	char* timestamp_str; | ||||||
|  | 	size_t timestamp_str_size; | ||||||
|  | 
 | ||||||
|  | 	// Loop through unathenticated attributes for szOID_RFC3161_counterSign OID
 | ||||||
|  | 	for (n = 0; n < pSignerInfo->UnauthAttrs.cAttr; n++) { | ||||||
|  | 		if (lstrcmpA(pSignerInfo->UnauthAttrs.rgAttr[n].pszObjId, szOID_RFC3161_counterSign) == 0) { | ||||||
|  | 			// Get size
 | ||||||
|  | 			r = CryptDecodeObject(PKCS_7_ASN_ENCODING, PKCS_CONTENT_INFO, | ||||||
|  | 				pSignerInfo->UnauthAttrs.rgAttr[n].rgValue[0].pbData, | ||||||
|  | 				pSignerInfo->UnauthAttrs.rgAttr[n].rgValue[0].cbData, | ||||||
|  | 				0, NULL, &dwSize); | ||||||
|  | 			if (!r) { | ||||||
|  | 				uprintf("PKI: Could not get CounterSigner (timestamp) data size: %s", WinPKIErrorString()); | ||||||
|  | 				continue; | ||||||
|  | 			} | ||||||
|  | 
 | ||||||
|  | 			// Allocate memory.
 | ||||||
|  | 			pCounterSignerInfo = calloc(dwSize, 1); | ||||||
|  | 			if (pCounterSignerInfo == NULL) { | ||||||
|  | 				uprintf("PKI: Unable to allocate memory for CounterSigner (timestamp) data"); | ||||||
|  | 				continue; | ||||||
|  | 			} | ||||||
|  | 
 | ||||||
|  | 			// Now read the CounterSigner message data
 | ||||||
|  | 			r = CryptDecodeObject(PKCS_7_ASN_ENCODING, PKCS_CONTENT_INFO, | ||||||
|  | 				pSignerInfo->UnauthAttrs.rgAttr[n].rgValue[0].pbData, | ||||||
|  | 				pSignerInfo->UnauthAttrs.rgAttr[n].rgValue[0].cbData, | ||||||
|  | 				0, (PVOID)pCounterSignerInfo, &dwSize); | ||||||
|  | 			if (!r) { | ||||||
|  | 				uprintf("PKI: Could not retrieve CounterSigner (timestamp) data: %s", WinPKIErrorString()); | ||||||
|  | 				continue; | ||||||
|  | 			} | ||||||
|  | 
 | ||||||
|  | 			// Get the RFC 3161 timestamp message
 | ||||||
|  | 			timestamp_token = get_oid_data_from_asn1(pCounterSignerInfo->Content.pbData, | ||||||
|  | 				pCounterSignerInfo->Content.cbData, OID_RFC3161_timeStamp, sizeof(OID_RFC3161_timeStamp), | ||||||
|  | 				// 0x04 = "Octet String" ASN.1 tag
 | ||||||
|  | 				0x04, ×tamp_token_size); | ||||||
|  | 			if (timestamp_token) { | ||||||
|  | 				timestamp_str = get_oid_data_from_asn1(timestamp_token, timestamp_token_size, NULL, 0, | ||||||
|  | 					// 0x18 = "Generalized Time" ASN.1 tag
 | ||||||
|  | 					0x18, ×tamp_str_size); | ||||||
|  | 				if (timestamp_str) { | ||||||
|  | 					// As per RFC 3161 The syntax is: YYYYMMDDhhmmss[.s...]Z
 | ||||||
|  | 					if ((timestamp_str_size < 14) || (timestamp_str[timestamp_str_size - 1] != 'Z')) { | ||||||
|  | 						// Sanity checks
 | ||||||
|  | 						uprintf("PKI: Not an RFC 3161 timestamp"); | ||||||
|  | 						DumpBufferHex(timestamp_str, timestamp_str_size); | ||||||
|  | 					} else { | ||||||
|  | 						ts = strtoull(timestamp_str, NULL, 10); | ||||||
|  | 					} | ||||||
|  | 				} | ||||||
|  | 			} | ||||||
|  | 			safe_free(pCounterSignerInfo); | ||||||
|  | 		} | ||||||
|  | 	} | ||||||
|  | 	return ts; | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // Return the signature timestamp (as a YYYYMMDDHHMMSS value) or 0 on error
 | ||||||
|  | uint64_t GetSignatureTimeStamp(const char* path) | ||||||
|  | { | ||||||
|  | 	char *mpath = NULL; | ||||||
|  | 	BOOL r; | ||||||
|  | 	HMODULE hm; | ||||||
|  | 	HCERTSTORE hStore = NULL; | ||||||
|  | 	HCRYPTMSG hMsg = NULL; | ||||||
|  | 	DWORD dwSize, dwEncoding, dwContentType, dwFormatType; | ||||||
|  | 	PCMSG_SIGNER_INFO pSignerInfo = NULL; | ||||||
|  | 	DWORD dwSignerInfo = 0; | ||||||
|  | 	wchar_t *szFileName; | ||||||
|  | 	uint64_t timestamp = 0ULL; | ||||||
|  | 
 | ||||||
|  | 	// If the path is NULL, get the signature of the current runtime
 | ||||||
|  | 	if (path == NULL) { | ||||||
|  | 		szFileName = calloc(MAX_PATH, sizeof(wchar_t)); | ||||||
|  | 		if (szFileName == NULL) | ||||||
|  | 			goto out; | ||||||
|  | 		hm = GetModuleHandle(NULL); | ||||||
|  | 		if (hm == NULL) { | ||||||
|  | 			uprintf("PKI: Could not get current executable handle: %s", WinPKIErrorString()); | ||||||
|  | 			goto out; | ||||||
|  | 		} | ||||||
|  | 		dwSize = GetModuleFileNameW(hm, szFileName, MAX_PATH); | ||||||
|  | 		if ((dwSize == 0) || ((dwSize == MAX_PATH) && (GetLastError() == ERROR_INSUFFICIENT_BUFFER))) { | ||||||
|  | 			uprintf("PKI: Could not get module filename: %s", WinPKIErrorString()); | ||||||
|  | 			goto out; | ||||||
|  | 		} | ||||||
|  | 		mpath = wchar_to_utf8(szFileName); | ||||||
|  | 	} else { | ||||||
|  | 		szFileName = utf8_to_wchar(path); | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	// Get message handle and store handle from the signed file.
 | ||||||
|  | 	r = CryptQueryObject(CERT_QUERY_OBJECT_FILE, szFileName, | ||||||
|  | 		CERT_QUERY_CONTENT_FLAG_PKCS7_SIGNED_EMBED, CERT_QUERY_FORMAT_FLAG_BINARY, | ||||||
|  | 		0, &dwEncoding, &dwContentType, &dwFormatType, &hStore, &hMsg, NULL); | ||||||
|  | 	if (!r) { | ||||||
|  | 		uprintf("PKI: Failed to get signature for '%s': %s", (path == NULL) ? mpath : path, WinPKIErrorString()); | ||||||
|  | 		goto out; | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	// Get signer information size.
 | ||||||
|  | 	r = CryptMsgGetParam(hMsg, CMSG_SIGNER_INFO_PARAM, 0, NULL, &dwSignerInfo); | ||||||
|  | 	if (!r) { | ||||||
|  | 		uprintf("PKI: Failed to get signer size: %s", WinPKIErrorString()); | ||||||
|  | 		goto out; | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	// Allocate memory for signer information.
 | ||||||
|  | 	pSignerInfo = (PCMSG_SIGNER_INFO)calloc(dwSignerInfo, 1); | ||||||
|  | 	if (!pSignerInfo) { | ||||||
|  | 		uprintf("PKI: Could not allocate memory for signer information"); | ||||||
|  | 		goto out; | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	// Get Signer Information.
 | ||||||
|  | 	r = CryptMsgGetParam(hMsg, CMSG_SIGNER_INFO_PARAM, 0, (PVOID)pSignerInfo, &dwSignerInfo); | ||||||
|  | 	if (!r) { | ||||||
|  | 		uprintf("PKI: Failed to get signer information: %s", WinPKIErrorString()); | ||||||
|  | 		goto out; | ||||||
|  | 	} | ||||||
|  | 
 | ||||||
|  | 	// Get the RFC 3161 timestamp
 | ||||||
|  | 	timestamp = GetRFC3161TimeStamp(pSignerInfo); | ||||||
|  | 
 | ||||||
|  | out: | ||||||
|  | 	safe_free(mpath); | ||||||
|  | 	safe_free(szFileName); | ||||||
|  | 	safe_free(pSignerInfo); | ||||||
|  | 	if (hStore != NULL) | ||||||
|  | 		CertCloseStore(hStore, 0); | ||||||
|  | 	if (hMsg != NULL) | ||||||
|  | 		CryptMsgClose(hMsg); | ||||||
|  | 	return timestamp; | ||||||
|  | } | ||||||
|  | 
 | ||||||
| // From https://msdn.microsoft.com/en-us/library/windows/desktop/aa382384.aspx
 | // From https://msdn.microsoft.com/en-us/library/windows/desktop/aa382384.aspx
 | ||||||
| LONG ValidateSignature(HWND hDlg, const char* path) | LONG ValidateSignature(HWND hDlg, const char* path) | ||||||
| { | { | ||||||
|  | @ -241,6 +389,7 @@ LONG ValidateSignature(HWND hDlg, const char* path) | ||||||
| 		{ 0xaac56b, 0xcd44, 0x11d0,{ 0x8c, 0xc2, 0x0, 0xc0, 0x4f, 0xc2, 0x95, 0xee } }; | 		{ 0xaac56b, 0xcd44, 0x11d0,{ 0x8c, 0xc2, 0x0, 0xc0, 0x4f, 0xc2, 0x95, 0xee } }; | ||||||
| 	char *signature_name; | 	char *signature_name; | ||||||
| 	size_t i, len; | 	size_t i, len; | ||||||
|  | 	uint64_t current_ts, update_ts; | ||||||
| 
 | 
 | ||||||
| 	// Check the signature name. Make it specific enough (i.e. don't simply check for "Akeo")
 | 	// Check the signature name. Make it specific enough (i.e. don't simply check for "Akeo")
 | ||||||
| 	// so that, besides hacking our server, it'll place an extra hurdle on any malicious entity
 | 	// so that, besides hacking our server, it'll place an extra hurdle on any malicious entity
 | ||||||
|  | @ -292,6 +441,21 @@ LONG ValidateSignature(HWND hDlg, const char* path) | ||||||
| 	safe_free(trust_file.pcwszFilePath); | 	safe_free(trust_file.pcwszFilePath); | ||||||
| 	switch (r) { | 	switch (r) { | ||||||
| 	case ERROR_SUCCESS: | 	case ERROR_SUCCESS: | ||||||
|  | 		// Verify that the timestamp of the downloaded update is in the future of our current one.
 | ||||||
|  | 		// This is done to prevent the use of an officially signed, but older binary, as potential attack vector.
 | ||||||
|  | 		current_ts = GetSignatureTimeStamp(NULL); | ||||||
|  | 		if (current_ts == 0ULL) { | ||||||
|  | 			uprintf("PKI: Cannot retreive the current binary's timestamp - Aborting update"); | ||||||
|  | 			r = TRUST_E_TIME_STAMP; | ||||||
|  | 		} else { | ||||||
|  | 			update_ts = GetSignatureTimeStamp(path); | ||||||
|  | 			if (update_ts < current_ts) { | ||||||
|  | 				uprintf("PKI: Update timestamp (%" PRIi64 ") is older than ours (%" PRIi64 ")! - Aborting update", update_ts, current_ts); | ||||||
|  | 				r = TRUST_E_TIME_STAMP; | ||||||
|  | 			} | ||||||
|  | 		} | ||||||
|  | 		if (r != ERROR_SUCCESS) | ||||||
|  | 		MessageBoxExU(hDlg, lmprintf(MSG_300), lmprintf(MSG_299), MB_OK | MB_ICONERROR | MB_IS_RTL, selected_langid); | ||||||
| 		break; | 		break; | ||||||
| 	case TRUST_E_NOSIGNATURE: | 	case TRUST_E_NOSIGNATURE: | ||||||
| 		// Should already have been reported, but since we have a custom message for it...
 | 		// Should already have been reported, but since we have a custom message for it...
 | ||||||
|  |  | ||||||
|  | @ -481,7 +481,8 @@ | ||||||
| #define MSG_297                         3297 | #define MSG_297                         3297 | ||||||
| #define MSG_298                         3298 | #define MSG_298                         3298 | ||||||
| #define MSG_299                         3299 | #define MSG_299                         3299 | ||||||
| #define MSG_MAX                         3300 | #define MSG_300                         3300 | ||||||
|  | #define MSG_MAX                         3301 | ||||||
| 
 | 
 | ||||||
| // Next default values for new objects
 | // Next default values for new objects
 | ||||||
| // 
 | // 
 | ||||||
|  |  | ||||||
|  | @ -477,6 +477,8 @@ extern char* insert_section_data(const char* filename, const char* section, cons | ||||||
| extern char* replace_in_token_data(const char* filename, const char* token, const char* src, const char* rep, BOOL dos2unix); | extern char* replace_in_token_data(const char* filename, const char* token, const char* src, const char* rep, BOOL dos2unix); | ||||||
| extern char* replace_char(const char* src, const char c, const char* rep); | extern char* replace_char(const char* src, const char c, const char* rep); | ||||||
| extern void parse_update(char* buf, size_t len); | extern void parse_update(char* buf, size_t len); | ||||||
|  | extern void* get_oid_data_from_asn1(const uint8_t* buf, size_t buf_len, const uint8_t* oid, size_t oid_len, | ||||||
|  | 	uint8_t asn1_type, size_t* data_len); | ||||||
| extern uint8_t WimExtractCheck(void); | extern uint8_t WimExtractCheck(void); | ||||||
| extern BOOL WimExtractFile(const char* wim_image, int index, const char* src, const char* dst); | extern BOOL WimExtractFile(const char* wim_image, int index, const char* src, const char* dst); | ||||||
| extern BOOL WimExtractFile_API(const char* image, int index, const char* src, const char* dst); | extern BOOL WimExtractFile_API(const char* image, int index, const char* src, const char* dst); | ||||||
|  | @ -487,6 +489,7 @@ extern BOOL AppendVHDFooter(const char* vhd_path); | ||||||
| extern int SetWinToGoIndex(void); | extern int SetWinToGoIndex(void); | ||||||
| extern int IsHDD(DWORD DriveIndex, uint16_t vid, uint16_t pid, const char* strid); | extern int IsHDD(DWORD DriveIndex, uint16_t vid, uint16_t pid, const char* strid); | ||||||
| extern char* GetSignatureName(const char* path); | extern char* GetSignatureName(const char* path); | ||||||
|  | extern uint64_t GetSignatureTimeStamp(const char* path); | ||||||
| extern LONG ValidateSignature(HWND hDlg, const char* path); | extern LONG ValidateSignature(HWND hDlg, const char* path); | ||||||
| extern BOOL IsFontAvailable(const char* font_name); | extern BOOL IsFontAvailable(const char* font_name); | ||||||
| extern BOOL WriteFileWithRetry(HANDLE hFile, LPCVOID lpBuffer, DWORD nNumberOfBytesToWrite, | extern BOOL WriteFileWithRetry(HANDLE hFile, LPCVOID lpBuffer, DWORD nNumberOfBytesToWrite, | ||||||
|  |  | ||||||
							
								
								
									
										10
									
								
								src/rufus.rc
									
										
									
									
									
								
							
							
						
						
									
										10
									
								
								src/rufus.rc
									
										
									
									
									
								
							|  | @ -33,7 +33,7 @@ LANGUAGE LANG_NEUTRAL, SUBLANG_NEUTRAL | ||||||
| IDD_DIALOG DIALOGEX 12, 12, 242, 376 | IDD_DIALOG DIALOGEX 12, 12, 242, 376 | ||||||
| STYLE DS_SETFONT | DS_MODALFRAME | DS_CENTER | WS_MINIMIZEBOX | WS_POPUP | WS_CAPTION | WS_SYSMENU | STYLE DS_SETFONT | DS_MODALFRAME | DS_CENTER | WS_MINIMIZEBOX | WS_POPUP | WS_CAPTION | WS_SYSMENU | ||||||
| EXSTYLE WS_EX_ACCEPTFILES | EXSTYLE WS_EX_ACCEPTFILES | ||||||
| CAPTION "Rufus 2.17.1187" | CAPTION "Rufus 2.17.1188" | ||||||
| FONT 8, "Segoe UI Symbol", 400, 0, 0x0 | FONT 8, "Segoe UI Symbol", 400, 0, 0x0 | ||||||
| BEGIN | BEGIN | ||||||
|     LTEXT           "Device",IDS_DEVICE_TXT,9,6,200,8 |     LTEXT           "Device",IDS_DEVICE_TXT,9,6,200,8 | ||||||
|  | @ -366,8 +366,8 @@ END | ||||||
| // | // | ||||||
| 
 | 
 | ||||||
| VS_VERSION_INFO VERSIONINFO | VS_VERSION_INFO VERSIONINFO | ||||||
|  FILEVERSION 2,17,1187,0 |  FILEVERSION 2,17,1188,0 | ||||||
|  PRODUCTVERSION 2,17,1187,0 |  PRODUCTVERSION 2,17,1188,0 | ||||||
|  FILEFLAGSMASK 0x3fL |  FILEFLAGSMASK 0x3fL | ||||||
| #ifdef _DEBUG | #ifdef _DEBUG | ||||||
|  FILEFLAGS 0x1L |  FILEFLAGS 0x1L | ||||||
|  | @ -384,13 +384,13 @@ BEGIN | ||||||
|         BEGIN |         BEGIN | ||||||
|             VALUE "CompanyName", "Akeo Consulting (http://akeo.ie)" |             VALUE "CompanyName", "Akeo Consulting (http://akeo.ie)" | ||||||
|             VALUE "FileDescription", "Rufus" |             VALUE "FileDescription", "Rufus" | ||||||
|             VALUE "FileVersion", "2.17.1187" |             VALUE "FileVersion", "2.17.1188" | ||||||
|             VALUE "InternalName", "Rufus" |             VALUE "InternalName", "Rufus" | ||||||
|             VALUE "LegalCopyright", "© 2011-2017 Pete Batard (GPL v3)" |             VALUE "LegalCopyright", "© 2011-2017 Pete Batard (GPL v3)" | ||||||
|             VALUE "LegalTrademarks", "http://www.gnu.org/copyleft/gpl.html" |             VALUE "LegalTrademarks", "http://www.gnu.org/copyleft/gpl.html" | ||||||
|             VALUE "OriginalFilename", "rufus.exe" |             VALUE "OriginalFilename", "rufus.exe" | ||||||
|             VALUE "ProductName", "Rufus" |             VALUE "ProductName", "Rufus" | ||||||
|             VALUE "ProductVersion", "2.17.1187" |             VALUE "ProductVersion", "2.17.1188" | ||||||
|         END |         END | ||||||
|     END |     END | ||||||
|     BLOCK "VarFileInfo" |     BLOCK "VarFileInfo" | ||||||
|  |  | ||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue