/* * Rufus: The Reliable USB Formatting Utility * Networking functionality (web file download, check for update, etc.) * Copyright © 2012-2019 Pete Batard * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ /* Memory leaks detection - define _CRTDBG_MAP_ALLOC as preprocessor macro */ #ifdef _CRTDBG_MAP_ALLOC #include #include #endif #include #include #include #include #include #include #include #include "rufus.h" #include "missing.h" #include "resource.h" #include "msapi_utf8.h" #include "localization.h" #include "bled/bled.h" #include "settings.h" /* Maximum download chunk size, in bytes */ #define DOWNLOAD_BUFFER_SIZE (10*KB) /* Default delay between update checks (1 day) */ #define DEFAULT_UPDATE_INTERVAL (24*3600) DWORD DownloadStatus; BYTE* fido_script = NULL; HANDLE update_check_thread = NULL; extern loc_cmd* selected_locale; extern HANDLE dialog_handle; extern BOOL is_x86_32, close_fido_cookie_prompts; static DWORD error_code, fido_len = 0; static BOOL force_update_check = FALSE; static const char* request_headers = "Accept-Encoding: gzip, deflate"; /* * FormatMessage does not handle internet errors * https://docs.microsoft.com/en-us/windows/desktop/wininet/wininet-errors */ const char* WinInetErrorString(void) { static char error_string[256]; DWORD size = sizeof(error_string); PF_TYPE_DECL(WINAPI, BOOL, InternetGetLastResponseInfoA, (LPDWORD, LPSTR, LPDWORD)); PF_INIT(InternetGetLastResponseInfoA, WinInet); error_code = HRESULT_CODE(GetLastError()); if ((error_code < INTERNET_ERROR_BASE) || (error_code > INTERNET_ERROR_LAST)) return WindowsErrorString(); switch(error_code) { case ERROR_INTERNET_OUT_OF_HANDLES: return "No more handles could be generated at this time."; case ERROR_INTERNET_TIMEOUT: return "The request has timed out."; case ERROR_INTERNET_INTERNAL_ERROR: return "An internal error has occurred."; case ERROR_INTERNET_INVALID_URL: return "The URL is invalid."; case ERROR_INTERNET_UNRECOGNIZED_SCHEME: return "The URL scheme could not be recognized or is not supported."; case ERROR_INTERNET_NAME_NOT_RESOLVED: return "The server name could not be resolved."; case ERROR_INTERNET_PROTOCOL_NOT_FOUND: return "The requested protocol could not be located."; case ERROR_INTERNET_INVALID_OPTION: return "A request specified an invalid option value."; case ERROR_INTERNET_BAD_OPTION_LENGTH: return "The length of an option supplied is incorrect for the type of option specified."; case ERROR_INTERNET_OPTION_NOT_SETTABLE: return "The request option cannot be set, only queried."; case ERROR_INTERNET_SHUTDOWN: return "The Win32 Internet function support is being shut down or unloaded."; case ERROR_INTERNET_INCORRECT_USER_NAME: return "The request to connect and log on to an FTP server could not be completed because the supplied user name is incorrect."; case ERROR_INTERNET_INCORRECT_PASSWORD: return "The request to connect and log on to an FTP server could not be completed because the supplied password is incorrect."; case ERROR_INTERNET_LOGIN_FAILURE: return "The request to connect to and log on to an FTP server failed."; case ERROR_INTERNET_INVALID_OPERATION: return "The requested operation is invalid."; case ERROR_INTERNET_OPERATION_CANCELLED: return "The operation was cancelled, usually because the handle on which the request was operating was closed before the operation completed."; case ERROR_INTERNET_INCORRECT_HANDLE_TYPE: return "The type of handle supplied is incorrect for this operation."; case ERROR_INTERNET_INCORRECT_HANDLE_STATE: return "The requested operation cannot be carried out because the handle supplied is not in the correct state."; case ERROR_INTERNET_NOT_PROXY_REQUEST: return "The request cannot be made via a proxy."; case ERROR_INTERNET_REGISTRY_VALUE_NOT_FOUND: return "A required registry value could not be located."; case ERROR_INTERNET_BAD_REGISTRY_PARAMETER: return "A required registry value was located but is an incorrect type or has an invalid value."; case ERROR_INTERNET_NO_DIRECT_ACCESS: return "Direct network access cannot be made at this time."; case ERROR_INTERNET_NO_CONTEXT: return "An asynchronous request could not be made because a zero context value was supplied."; case ERROR_INTERNET_NO_CALLBACK: return "An asynchronous request could not be made because a callback function has not been set."; case ERROR_INTERNET_REQUEST_PENDING: return "The required operation could not be completed because one or more requests are pending."; case ERROR_INTERNET_INCORRECT_FORMAT: return "The format of the request is invalid."; case ERROR_INTERNET_ITEM_NOT_FOUND: return "The requested item could not be located."; case ERROR_INTERNET_CANNOT_CONNECT: return "The attempt to connect to the server failed."; case ERROR_INTERNET_CONNECTION_ABORTED: return "The connection with the server has been terminated."; case ERROR_INTERNET_CONNECTION_RESET: return "The connection with the server has been reset."; case ERROR_INTERNET_FORCE_RETRY: return "Calls for the Win32 Internet function to redo the request."; case ERROR_INTERNET_INVALID_PROXY_REQUEST: return "The request to the proxy was invalid."; case ERROR_INTERNET_HANDLE_EXISTS: return "The request failed because the handle already exists."; case ERROR_INTERNET_SEC_INVALID_CERT: return "The SSL certificate is invalid."; case ERROR_INTERNET_SEC_CERT_DATE_INVALID: return "SSL certificate date that was received from the server is bad. The certificate is expired."; case ERROR_INTERNET_SEC_CERT_CN_INVALID: return "SSL certificate common name (host name field) is incorrect."; case ERROR_INTERNET_SEC_CERT_ERRORS: return "The SSL certificate contains errors."; case ERROR_INTERNET_SEC_CERT_NO_REV: return "The SSL certificate was not revoked."; case ERROR_INTERNET_SEC_CERT_REV_FAILED: return "The revocation check of the SSL certificate failed."; case ERROR_INTERNET_HTTP_TO_HTTPS_ON_REDIR: return "The application is moving from a non-SSL to an SSL connection because of a redirect."; case ERROR_INTERNET_HTTPS_TO_HTTP_ON_REDIR: return "The application is moving from an SSL to an non-SSL connection because of a redirect."; case ERROR_INTERNET_MIXED_SECURITY: return "Some of the content being viewed may have come from unsecured servers."; case ERROR_INTERNET_CHG_POST_IS_NON_SECURE: return "The application is posting and attempting to change multiple lines of text on a server that is not secure."; case ERROR_INTERNET_POST_IS_NON_SECURE: return "The application is posting data to a server that is not secure."; case ERROR_FTP_TRANSFER_IN_PROGRESS: return "The requested operation cannot be made on the FTP session handle because an operation is already in progress."; case ERROR_FTP_DROPPED: return "The FTP operation was not completed because the session was aborted."; case ERROR_GOPHER_PROTOCOL_ERROR: case ERROR_GOPHER_NOT_FILE: case ERROR_GOPHER_DATA_ERROR: case ERROR_GOPHER_END_OF_DATA: case ERROR_GOPHER_INVALID_LOCATOR: case ERROR_GOPHER_INCORRECT_LOCATOR_TYPE: case ERROR_GOPHER_NOT_GOPHER_PLUS: case ERROR_GOPHER_ATTRIBUTE_NOT_FOUND: case ERROR_GOPHER_UNKNOWN_LOCATOR: return "Gopher? Really??? What is this, 1994?"; case ERROR_HTTP_HEADER_NOT_FOUND: return "The requested header could not be located."; case ERROR_HTTP_DOWNLEVEL_SERVER: return "The server did not return any headers."; case ERROR_HTTP_INVALID_SERVER_RESPONSE: return "The server response could not be parsed."; case ERROR_HTTP_INVALID_HEADER: return "The supplied header is invalid."; case ERROR_HTTP_INVALID_QUERY_REQUEST: return "The request made to HttpQueryInfo is invalid."; case ERROR_HTTP_HEADER_ALREADY_EXISTS: return "The header could not be added because it already exists."; case ERROR_HTTP_REDIRECT_FAILED: return "The redirection failed because either the scheme changed or all attempts made to redirect failed."; case ERROR_INTERNET_SECURITY_CHANNEL_ERROR: return "This system's SSL library is too old to be able to access this website."; case ERROR_INTERNET_CLIENT_AUTH_CERT_NEEDED: return "Client Authentication certificate needed"; case ERROR_INTERNET_BAD_AUTO_PROXY_SCRIPT: return "Bad auto proxy script."; case ERROR_INTERNET_UNABLE_TO_DOWNLOAD_SCRIPT: return "Unable to download script."; case ERROR_INTERNET_NOT_INITIALIZED: return "Internet has not be initialized."; case ERROR_INTERNET_UNABLE_TO_CACHE_FILE: return "Unable to cache the file."; case ERROR_INTERNET_TCPIP_NOT_INSTALLED: return "TPC/IP not installed."; case ERROR_INTERNET_DISCONNECTED: return "Internet is disconnected."; case ERROR_INTERNET_SERVER_UNREACHABLE: return "Server could not be reached."; case ERROR_INTERNET_PROXY_SERVER_UNREACHABLE: return "Proxy server could not be reached."; case ERROR_INTERNET_FAILED_DUETOSECURITYCHECK: return "A security check prevented internet connection."; case ERROR_INTERNET_NEED_MSN_SSPI_PKG: return "This connection requires an MSN Security Support Provider Interface package."; case ERROR_INTERNET_LOGIN_FAILURE_DISPLAY_ENTITY_BODY: return "Please ask Microsoft about that one!"; case ERROR_INTERNET_EXTENDED_ERROR: if (pfInternetGetLastResponseInfoA != NULL) { pfInternetGetLastResponseInfoA(&error_code, error_string, &size); return error_string; } // fall through default: static_sprintf(error_string, "Unknown internet error 0x%08lX", error_code); return error_string; } } static char* GetShortName(const char* url) { static char short_name[128]; char *p; size_t i, len = safe_strlen(url); if (len < 5) return NULL; for (i = len - 2; i > 0; i--) { if (url[i] == '/') { i++; break; } } memset(short_name, 0, sizeof(short_name)); static_strcpy(short_name, &url[i]); // If the URL is followed by a query, remove that part // Make sure we detect escaped queries too p = strstr(short_name, "%3F"); if (p != NULL) *p = 0; p = strstr(short_name, "%3f"); if (p != NULL) *p = 0; for (i = 0; i < strlen(short_name); i++) { if ((short_name[i] == '?') || (short_name[i] == '#')) { short_name[i] = 0; break; } } return short_name; } // Open an Internet session static HINTERNET GetInternetSession(BOOL bRetry) { int i; char agent[64]; BOOL r, decodingSupport = TRUE; DWORD dwFlags, dwTimeout = NET_SESSION_TIMEOUT, dwProtocolSupport = HTTP_PROTOCOL_FLAG_HTTP2; HINTERNET hSession = NULL; PF_TYPE_DECL(WINAPI, BOOL, InternetGetConnectedState, (LPDWORD, DWORD)); PF_TYPE_DECL(WINAPI, HINTERNET, InternetOpenA, (LPCSTR, DWORD, LPCSTR, LPCSTR, DWORD)); PF_TYPE_DECL(WINAPI, BOOL, InternetSetOptionA, (HINTERNET, DWORD, LPVOID, DWORD)); PF_INIT_OR_OUT(InternetGetConnectedState, WinInet); PF_INIT_OR_OUT(InternetOpenA, WinInet); PF_INIT_OR_OUT(InternetSetOptionA, WinInet); for (i = 0; i <= WRITE_RETRIES; i++) { r = pfInternetGetConnectedState(&dwFlags, 0); if (r || !bRetry) break; Sleep(1000); } if (!r) { // http://msdn.microsoft.com/en-us/library/windows/desktop/aa384702.aspx is wrong... SetLastError(ERROR_INTERNET_NOT_INITIALIZED); uprintf("Network is unavailable: %s", WinInetErrorString()); goto out; } static_sprintf(agent, APPLICATION_NAME "/%d.%d.%d (Windows NT %d.%d%s)", rufus_version[0], rufus_version[1], rufus_version[2], nWindowsVersion >> 4, nWindowsVersion & 0x0F, is_x64() ? "; WOW64" : ""); hSession = pfInternetOpenA(agent, INTERNET_OPEN_TYPE_PRECONFIG, NULL, NULL, 0); // Set the timeouts pfInternetSetOptionA(hSession, INTERNET_OPTION_CONNECT_TIMEOUT, (LPVOID)&dwTimeout, sizeof(dwTimeout)); pfInternetSetOptionA(hSession, INTERNET_OPTION_SEND_TIMEOUT, (LPVOID)&dwTimeout, sizeof(dwTimeout)); pfInternetSetOptionA(hSession, INTERNET_OPTION_RECEIVE_TIMEOUT, (LPVOID)&dwTimeout, sizeof(dwTimeout)); // Enable gzip and deflate decoding schemes pfInternetSetOptionA(hSession, INTERNET_OPTION_HTTP_DECODING, (LPVOID)&decodingSupport, sizeof(decodingSupport)); // Enable HTTP/2 protocol support pfInternetSetOptionA(hSession, INTERNET_OPTION_ENABLE_HTTP_PROTOCOL, (LPVOID)&dwProtocolSupport, sizeof(dwProtocolSupport)); out: return hSession; } /* * Download a file or fill a buffer from an URL * Mostly taken from http://support.microsoft.com/kb/234913 * If file is NULL, a buffer is allocated for the download (that needs to be freed by the caller) * If hProgressDialog is not NULL, this function will send INIT and EXIT messages * to the dialog in question, with WPARAM being set to nonzero for EXIT on success * and also attempt to indicate progress using an IDC_PROGRESS control * Note that when a buffer is used, the actual size of the buffer is one more than its reported * size (with the extra byte set to 0) to accomodate for calls that need a NUL-terminated buffer. */ uint64_t DownloadToFileOrBuffer(const char* url, const char* file, BYTE** buffer, HWND hProgressDialog, BOOL bTaskBarProgress) { const char* accept_types[] = {"*/*\0", NULL}; const char* short_name; unsigned char buf[DOWNLOAD_BUFFER_SIZE]; char hostname[64], urlpath[128], strsize[32]; BOOL r = FALSE; DWORD dwSize, dwWritten, dwDownloaded; HANDLE hFile = INVALID_HANDLE_VALUE; HINTERNET hSession = NULL, hConnection = NULL, hRequest = NULL; URL_COMPONENTSA UrlParts = {sizeof(URL_COMPONENTSA), NULL, 1, (INTERNET_SCHEME)0, hostname, sizeof(hostname), 0, NULL, 1, urlpath, sizeof(urlpath), NULL, 1}; uint64_t size = 0, total_size = 0; // Can't link with wininet.lib because of sideloading issues PF_TYPE_DECL(WINAPI, BOOL, InternetCrackUrlA, (LPCSTR, DWORD, DWORD, LPURL_COMPONENTSA)); PF_TYPE_DECL(WINAPI, HINTERNET, InternetConnectA, (HINTERNET, LPCSTR, INTERNET_PORT, LPCSTR, LPCSTR, DWORD, DWORD, DWORD_PTR)); PF_TYPE_DECL(WINAPI, BOOL, InternetReadFile, (HINTERNET, LPVOID, DWORD, LPDWORD)); PF_TYPE_DECL(WINAPI, BOOL, InternetCloseHandle, (HINTERNET)); PF_TYPE_DECL(WINAPI, HINTERNET, HttpOpenRequestA, (HINTERNET, LPCSTR, LPCSTR, LPCSTR, LPCSTR, LPCSTR*, DWORD, DWORD_PTR)); PF_TYPE_DECL(WINAPI, BOOL, HttpSendRequestA, (HINTERNET, LPCSTR, DWORD, LPVOID, DWORD)); PF_TYPE_DECL(WINAPI, BOOL, HttpQueryInfoA, (HINTERNET, DWORD, LPVOID, LPDWORD, LPDWORD)); PF_INIT_OR_OUT(InternetCrackUrlA, WinInet); PF_INIT_OR_OUT(InternetConnectA, WinInet); PF_INIT_OR_OUT(InternetReadFile, WinInet); PF_INIT_OR_OUT(InternetCloseHandle, WinInet); PF_INIT_OR_OUT(HttpOpenRequestA, WinInet); PF_INIT_OR_OUT(HttpSendRequestA, WinInet); PF_INIT_OR_OUT(HttpQueryInfoA, WinInet); FormatStatus = 0; DownloadStatus = 404; if (hProgressDialog != NULL) UpdateProgressWithInfoInit(hProgressDialog, FALSE); assert(url != NULL); if (buffer != NULL) *buffer = NULL; short_name = (file != NULL) ? PathFindFileNameU(file) : PathFindFileNameU(url); if (hProgressDialog != NULL) { PrintInfo(0, MSG_085, short_name); uprintf("Downloading %s", url); } if ( (!pfInternetCrackUrlA(url, (DWORD)safe_strlen(url), 0, &UrlParts)) || (UrlParts.lpszHostName == NULL) || (UrlParts.lpszUrlPath == NULL)) { uprintf("Unable to decode URL: %s", WinInetErrorString()); goto out; } hostname[sizeof(hostname)-1] = 0; hSession = GetInternetSession(TRUE); if (hSession == NULL) { uprintf("Could not open Internet session: %s", WinInetErrorString()); goto out; } hConnection = pfInternetConnectA(hSession, UrlParts.lpszHostName, UrlParts.nPort, NULL, NULL, INTERNET_SERVICE_HTTP, 0, (DWORD_PTR)NULL); if (hConnection == NULL) { uprintf("Could not connect to server %s:%d: %s", UrlParts.lpszHostName, UrlParts.nPort, WinInetErrorString()); goto out; } hRequest = pfHttpOpenRequestA(hConnection, "GET", UrlParts.lpszUrlPath, NULL, NULL, accept_types, INTERNET_FLAG_IGNORE_REDIRECT_TO_HTTP|INTERNET_FLAG_IGNORE_REDIRECT_TO_HTTPS| INTERNET_FLAG_NO_COOKIES|INTERNET_FLAG_NO_UI|INTERNET_FLAG_NO_CACHE_WRITE|INTERNET_FLAG_HYPERLINK| ((UrlParts.nScheme==INTERNET_SCHEME_HTTPS)?INTERNET_FLAG_SECURE:0), (DWORD_PTR)NULL); if (hRequest == NULL) { uprintf("Could not open URL %s: %s", url, WinInetErrorString()); goto out; } if (!pfHttpSendRequestA(hRequest, request_headers, -1L, NULL, 0)) { uprintf("Unable to send request: %s", WinInetErrorString()); goto out; } // Get the file size dwSize = sizeof(DownloadStatus); pfHttpQueryInfoA(hRequest, HTTP_QUERY_STATUS_CODE|HTTP_QUERY_FLAG_NUMBER, (LPVOID)&DownloadStatus, &dwSize, NULL); if (DownloadStatus != 200) { error_code = ERROR_INTERNET_ITEM_NOT_FOUND; SetLastError(ERROR_SEVERITY_ERROR | FAC(FACILITY_HTTP) | error_code); uprintf("Unable to access file: %d", DownloadStatus); goto out; } dwSize = sizeof(strsize); if (!pfHttpQueryInfoA(hRequest, HTTP_QUERY_CONTENT_LENGTH, (LPVOID)strsize, &dwSize, NULL)) { uprintf("Unable to retrieve file length: %s", WinInetErrorString()); goto out; } total_size = (uint64_t)atoll(strsize); if (hProgressDialog != NULL) { char msg[128]; uprintf("File length: %s", SizeToHumanReadable(total_size, FALSE, FALSE)); if (right_to_left_mode) static_sprintf(msg, "(%s) %s", SizeToHumanReadable(total_size, FALSE, FALSE), GetShortName(url)); else static_sprintf(msg, "%s (%s)", GetShortName(url), SizeToHumanReadable(total_size, FALSE, FALSE)); PrintStatus(0, MSG_085, msg); } if (file != NULL) { hFile = CreateFileU(file, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL); if (hFile == INVALID_HANDLE_VALUE) { uprintf("Unable to create file '%s': %s", short_name, WinInetErrorString()); goto out; } } else { if (buffer == NULL) { uprintf("No buffer pointer provided for download"); goto out; } // Allocate one extra byte, so that caller can rely on NUL-terminated text if needed *buffer = calloc((size_t)total_size + 1, 1); if (*buffer == NULL) { uprintf("Could not allocate buffer for download"); goto out; } } // Keep checking for data until there is nothing left. while (1) { // User may have cancelled the download if (IS_ERROR(FormatStatus)) goto out; if (!pfInternetReadFile(hRequest, buf, sizeof(buf), &dwDownloaded) || (dwDownloaded == 0)) break; if (hProgressDialog != NULL) UpdateProgressWithInfo(OP_NOOP, MSG_241, size, total_size); if (file != NULL) { if (!WriteFile(hFile, buf, dwDownloaded, &dwWritten, NULL)) { uprintf("Error writing file '%s': %s", short_name, WinInetErrorString()); goto out; } else if (dwDownloaded != dwWritten) { uprintf("Error writing file '%s': Only %d/%d bytes written", short_name, dwWritten, dwDownloaded); goto out; } } else { memcpy(&(*buffer)[size], buf, dwDownloaded); } size += dwDownloaded; } if (size != total_size) { uprintf("Could not download complete file - read: %lld bytes, expected: %lld bytes", size, total_size); FormatStatus = ERROR_SEVERITY_ERROR|FAC(FACILITY_STORAGE)|ERROR_WRITE_FAULT; goto out; } else { DownloadStatus = 200; r = TRUE; if (hProgressDialog != NULL) { UpdateProgressWithInfo(OP_NOOP, MSG_241, total_size, total_size); uprintf("Successfully downloaded '%s'", short_name); } } out: error_code = GetLastError(); if (hFile != INVALID_HANDLE_VALUE) { // Force a flush - May help with the PKI API trying to process downloaded updates too early... FlushFileBuffers(hFile); CloseHandle(hFile); } if (!r) { if (file != NULL) DeleteFileU(file); if (buffer != NULL) safe_free(*buffer); } if (hRequest) pfInternetCloseHandle(hRequest); if (hConnection) pfInternetCloseHandle(hConnection); if (hSession) pfInternetCloseHandle(hSession); SetLastError(error_code); return r ? size : 0; } // Download and validate a signed file. The file must have a corresponding '.sig' on the server. DWORD DownloadSignedFile(const char* url, const char* file, HWND hProgressDialog, BOOL bPromptOnError) { char* url_sig = NULL; BYTE *buf = NULL, *sig = NULL; DWORD buf_len = 0, sig_len = 0; DWORD ret = 0; HANDLE hFile = INVALID_HANDLE_VALUE; assert(url != NULL); url_sig = malloc(strlen(url) + 5); if (url_sig == NULL) { uprintf("Could not allocate signature URL"); goto out; } strcpy(url_sig, url); strcat(url_sig, ".sig"); buf_len = (DWORD)DownloadToFileOrBuffer(url, NULL, &buf, hProgressDialog, FALSE); if (buf_len == 0) goto out; sig_len = (DWORD)DownloadToFileOrBuffer(url_sig, NULL, &sig, NULL, FALSE); if ((sig_len != RSA_SIGNATURE_SIZE) || (!ValidateOpensslSignature(buf, buf_len, sig, sig_len))) { uprintf("FATAL: Download signature is invalid ✗"); DownloadStatus = 403; // Forbidden FormatStatus = ERROR_SEVERITY_ERROR | FAC(FACILITY_STORAGE) | APPERR(ERROR_BAD_SIGNATURE); SendMessage(GetDlgItem(hProgressDialog, IDC_PROGRESS), PBM_SETSTATE, (WPARAM)PBST_ERROR, 0); SetTaskbarProgressState(TASKBAR_ERROR); goto out; } uprintf("Download signature is valid ✓"); DownloadStatus = 206; // Partial content hFile = CreateFileU(file, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL); if (hFile == INVALID_HANDLE_VALUE) { uprintf("Unable to create file '%s': %s", PathFindFileNameU(file), WinInetErrorString()); goto out; } if (!WriteFile(hFile, buf, buf_len, &ret, NULL)) { uprintf("Error writing file '%s': %s", PathFindFileNameU(file), WinInetErrorString()); ret = 0; goto out; } else if (ret != buf_len) { uprintf("Error writing file '%s': Only %d/%d bytes written", PathFindFileNameU(file), ret, buf_len); ret = 0; goto out; } DownloadStatus = 200; // Full content out: if (hProgressDialog != NULL) SendMessage(hProgressDialog, UM_PROGRESS_EXIT, (WPARAM)ret, 0); if ((bPromptOnError) && (DownloadStatus != 200)) { PrintInfo(0, MSG_242); SetLastError(error_code); MessageBoxExU(hMainDialog, IS_ERROR(FormatStatus) ? StrError(FormatStatus, FALSE) : WinInetErrorString(), lmprintf(MSG_044), MB_OK | MB_ICONERROR | MB_IS_RTL, selected_langid); } safe_closehandle(hFile); free(url_sig); free(buf); free(sig); return ret; } /* Threaded download */ typedef struct { const char* url; const char* file; HWND hProgressDialog; BOOL bPromptOnError; } DownloadSignedFileThreadArgs; static DWORD WINAPI DownloadSignedFileThread(LPVOID param) { DownloadSignedFileThreadArgs* args = (DownloadSignedFileThreadArgs*)param; ExitThread(DownloadSignedFile(args->url, args->file, args->hProgressDialog, args->bPromptOnError)); } HANDLE DownloadSignedFileThreaded(const char* url, const char* file, HWND hProgressDialog, BOOL bPromptOnError) { static DownloadSignedFileThreadArgs args; args.url = url; args.file = file; args.hProgressDialog = hProgressDialog; args.bPromptOnError = bPromptOnError; return CreateThread(NULL, 0, DownloadSignedFileThread, &args, 0, NULL); } static __inline uint64_t to_uint64_t(uint16_t x[4]) { int i; uint64_t ret = 0; for (i=0; i<3; i++) ret = (ret<<16) + x[i]; return ret; } /* * Background thread to check for updates */ static DWORD WINAPI CheckForUpdatesThread(LPVOID param) { BOOL releases_only = TRUE, found_new_version = FALSE; int status = 0; const char* server_url = RUFUS_URL "/"; int i, j, k, max_channel, verbose = 0, verpos[4]; static const char* archname[] = {"win_x86", "win_x64", "win_arm", "win_arm64", "win_none"}; static const char* channel[] = {"release", "beta", "test"}; // release channel const char* accept_types[] = {"*/*\0", NULL}; char* buf = NULL; char agent[64], hostname[64], urlpath[128], sigpath[256]; DWORD dwSize, dwDownloaded, dwTotalSize, dwStatus; BYTE *sig = NULL; OSVERSIONINFOA os_version = {sizeof(OSVERSIONINFOA), 0, 0, 0, 0, ""}; HINTERNET hSession = NULL, hConnection = NULL, hRequest = NULL; URL_COMPONENTSA UrlParts = {sizeof(URL_COMPONENTSA), NULL, 1, (INTERNET_SCHEME)0, hostname, sizeof(hostname), 0, NULL, 1, urlpath, sizeof(urlpath), NULL, 1}; SYSTEMTIME ServerTime, LocalTime; FILETIME FileTime; int64_t local_time = 0, reg_time, server_time, update_interval; // Can't link with wininet.lib because of sideloading issues PF_TYPE_DECL(WINAPI, BOOL, InternetCrackUrlA, (LPCSTR, DWORD, DWORD, LPURL_COMPONENTSA)); PF_TYPE_DECL(WINAPI, HINTERNET, InternetConnectA, (HINTERNET, LPCSTR, INTERNET_PORT, LPCSTR, LPCSTR, DWORD, DWORD, DWORD_PTR)); PF_TYPE_DECL(WINAPI, BOOL, InternetReadFile, (HINTERNET, LPVOID, DWORD, LPDWORD)); PF_TYPE_DECL(WINAPI, BOOL, InternetCloseHandle, (HINTERNET)); PF_TYPE_DECL(WINAPI, HINTERNET, HttpOpenRequestA, (HINTERNET, LPCSTR, LPCSTR, LPCSTR, LPCSTR, LPCSTR*, DWORD, DWORD_PTR)); PF_TYPE_DECL(WINAPI, BOOL, HttpSendRequestA, (HINTERNET, LPCSTR, DWORD, LPVOID, DWORD)); PF_TYPE_DECL(WINAPI, BOOL, HttpQueryInfoA, (HINTERNET, DWORD, LPVOID, LPDWORD, LPDWORD)); PF_INIT_OR_OUT(InternetCrackUrlA, WinInet); PF_INIT_OR_OUT(InternetConnectA, WinInet); PF_INIT_OR_OUT(InternetReadFile, WinInet); PF_INIT_OR_OUT(InternetCloseHandle, WinInet); PF_INIT_OR_OUT(HttpOpenRequestA, WinInet); PF_INIT_OR_OUT(HttpSendRequestA, WinInet); PF_INIT_OR_OUT(HttpQueryInfoA, WinInet); verbose = ReadSetting32(SETTING_VERBOSE_UPDATES); // Without this the FileDialog will produce error 0x8001010E when compiled for Vista or later IGNORE_RETVAL(CoInitializeEx(NULL, COINIT_APARTMENTTHREADED)); // Unless the update was forced, wait a while before performing the update check if (!force_update_check) { // It would of course be a lot nicer to use a timer and wake the thread, but my // development time is limited and this is FASTER to implement. do { for (i=0; (i<30) && (!force_update_check); i++) Sleep(500); } while ((!force_update_check) && ((op_in_progress || (dialog_showing > 0)))); if (!force_update_check) { if ((ReadSetting32(SETTING_UPDATE_INTERVAL) == -1)) { vuprintf("Check for updates disabled, as per settings."); goto out; } reg_time = ReadSetting64(SETTING_LAST_UPDATE); update_interval = (int64_t)ReadSetting32(SETTING_UPDATE_INTERVAL); if (update_interval == 0) { WriteSetting32(SETTING_UPDATE_INTERVAL, DEFAULT_UPDATE_INTERVAL); update_interval = DEFAULT_UPDATE_INTERVAL; } GetSystemTime(&LocalTime); if (!SystemTimeToFileTime(&LocalTime, &FileTime)) goto out; local_time = ((((int64_t)FileTime.dwHighDateTime)<<32) + FileTime.dwLowDateTime) / 10000000; vvuprintf("Local time: %" PRId64, local_time); if (local_time < reg_time + update_interval) { vuprintf("Next update check in %" PRId64 " seconds.", reg_time + update_interval - local_time); goto out; } } } PrintInfoDebug(3000, MSG_243); status++; // 1 if (!GetVersionExA(&os_version)) { uprintf("Could not read Windows version - Check for updates cancelled."); goto out; } if (!pfInternetCrackUrlA(server_url, (DWORD)safe_strlen(server_url), 0, &UrlParts)) goto out; hostname[sizeof(hostname)-1] = 0; static_sprintf(agent, APPLICATION_NAME "/%d.%d.%d (Windows NT %d.%d%s)", rufus_version[0], rufus_version[1], rufus_version[2], nWindowsVersion >> 4, nWindowsVersion & 0x0F, is_x64() ? "; WOW64" : ""); hSession = GetInternetSession(FALSE); if (hSession == NULL) goto out; hConnection = pfInternetConnectA(hSession, UrlParts.lpszHostName, UrlParts.nPort, NULL, NULL, INTERNET_SERVICE_HTTP, 0, (DWORD_PTR)NULL); if (hConnection == NULL) goto out; status++; // 2 // BETAs are only made available for x86_32 if (is_x86_32) releases_only = !ReadSettingBool(SETTING_INCLUDE_BETAS); // Test releases get their own distribution channel (and also force beta checks) #if defined(TEST) max_channel = (int)ARRAYSIZE(channel); #else max_channel = releases_only ? 1 : (int)ARRAYSIZE(channel) - 1; #endif vuprintf("Using %s for the update check", RUFUS_URL); for (k=0; (k___.ver" // and then remove each of the components until we find our match. For instance, we may first // look for rufus_win_x64_6.2.ver (Win8 x64) but only get a match for rufus_win_x64_6.ver (Vista x64 or later) // This allows sunsetting OS versions (eg XP) or providing different downloads for different archs/groups. static_sprintf(urlpath, "%s%s%s_%s_%lu.%lu.ver", APPLICATION_NAME, (k==0)?"":"_", (k==0)?"":channel[k], archname[GetCpuArch()], os_version.dwMajorVersion, os_version.dwMinorVersion); vuprintf("Base update check: %s", urlpath); for (i=0, j=(int)safe_strlen(urlpath)-5; (j>0)&&(i= ARRAYSIZE(channel))) goto out; continue; } vuprintf("Found match for %s on server %s", urlpath, server_url); // We also get a date from the web server, which we'll use to avoid out of sync check, // in case some set their clock way into the future and back. // On the other hand, if local clock is set way back in the past, we will never check. dwSize = sizeof(ServerTime); // If we can't get a date we can trust, don't bother... if ( (!pfHttpQueryInfoA(hRequest, HTTP_QUERY_DATE|HTTP_QUERY_FLAG_SYSTEMTIME, (LPVOID)&ServerTime, &dwSize, NULL)) || (!SystemTimeToFileTime(&ServerTime, &FileTime)) ) goto out; server_time = ((((int64_t)FileTime.dwHighDateTime)<<32) + FileTime.dwLowDateTime) / 10000000; vvuprintf("Server time: %" PRId64, server_time); // Always store the server response time - the only clock we trust! WriteSetting64(SETTING_LAST_UPDATE, server_time); // Might as well let the user know if (!force_update_check) { if ((local_time > server_time + 600) || (local_time < server_time - 600)) { uprintf("IMPORTANT: Your local clock is more than 10 minutes in the %s. Unless you fix this, " APPLICATION_NAME " may not be able to check for updates...", (local_time > server_time + 600)?"future":"past"); } } dwSize = sizeof(dwTotalSize); if (!pfHttpQueryInfoA(hRequest, HTTP_QUERY_CONTENT_LENGTH|HTTP_QUERY_FLAG_NUMBER, (LPVOID)&dwTotalSize, &dwSize, NULL)) goto out; // Make sure the file is NUL terminated buf = (char*)calloc(dwTotalSize+1, 1); if (buf == NULL) goto out; // This is a version file - we should be able to gulp it down in one go if (!pfInternetReadFile(hRequest, buf, dwTotalSize, &dwDownloaded) || (dwDownloaded != dwTotalSize)) goto out; vuprintf("Successfully downloaded version file (%d bytes)", dwTotalSize); // Now download the signature file static_sprintf(sigpath, "%s/%s.sig", server_url, urlpath); dwDownloaded = (DWORD)DownloadToFileOrBuffer(sigpath, NULL, &sig, NULL, FALSE); if ((dwDownloaded != RSA_SIGNATURE_SIZE) || (!ValidateOpensslSignature(buf, dwTotalSize, sig, dwDownloaded))) { uprintf("FATAL: Version signature is invalid ✗"); goto out; } vuprintf("Version signature is valid ✓"); status++; parse_update(buf, dwTotalSize + 1); vuprintf("UPDATE DATA:"); vuprintf(" version: %d.%d.%d (%s)", update.version[0], update.version[1], update.version[2], channel[k]); vuprintf(" platform_min: %d.%d", update.platform_min[0], update.platform_min[1]); vuprintf(" url: %s", update.download_url); found_new_version = ((to_uint64_t(update.version) > to_uint64_t(rufus_version)) || (force_update)) && ((os_version.dwMajorVersion > update.platform_min[0]) || ((os_version.dwMajorVersion == update.platform_min[0]) && (os_version.dwMinorVersion >= update.platform_min[1]))); uprintf("N%sew %s version found%c", found_new_version ? "" : "o n", channel[k], found_new_version ? '!' : '.'); } out: safe_free(buf); safe_free(sig); if (hRequest) pfInternetCloseHandle(hRequest); if (hConnection) pfInternetCloseHandle(hConnection); if (hSession) pfInternetCloseHandle(hSession); switch (status) { case 1: PrintInfoDebug(3000, MSG_244); break; case 2: PrintInfoDebug(3000, MSG_245); break; case 3: case 4: PrintInfo(3000, found_new_version ? MSG_246 : MSG_247); default: break; } // Start the new download after cleanup if (found_new_version) { // User may have started an operation while we were checking while ((!force_update_check) && (op_in_progress || (dialog_showing > 0))) { Sleep(15000); } DownloadNewVersion(); } else if (force_update_check) { PostMessage(hMainDialog, UM_NO_UPDATE, 0, 0); } force_update_check = FALSE; update_check_thread = NULL; ExitThread(0); } /* * Initiate a check for updates. If force is true, ignore the wait period */ BOOL CheckForUpdates(BOOL force) { force_update_check = force; if (update_check_thread != NULL) return FALSE; update_check_thread = CreateThread(NULL, 0, CheckForUpdatesThread, NULL, 0, NULL); if (update_check_thread == NULL) { uprintf("Unable to start update check thread"); return FALSE; } return TRUE; } /* * Download an ISO through Fido */ static DWORD WINAPI DownloadISOThread(LPVOID param) { char locale_str[1024], cmdline[sizeof(locale_str) + 512], pipe[MAX_GUID_STRING_LENGTH + 16] = "\\\\.\\pipe\\"; char powershell_path[MAX_PATH], icon_path[MAX_PATH] = { 0 }, script_path[MAX_PATH] = { 0 }; char *url = NULL, sig_url[128]; uint64_t uncompressed_size; int64_t size = -1; BYTE *compressed = NULL, *sig = NULL; HANDLE hFile, hPipe; DWORD dwExitCode = 99, dwCompressedSize, dwSize, dwAvail, dwPipeSize = 4096; GUID guid; dialog_showing++; IGNORE_RETVAL(CoInitializeEx(NULL, COINIT_APARTMENTTHREADED)); // Use a GUID as random unique string, else ill-intentioned security "researchers" // may either spam our pipe or replace our script to fool antivirus solutions into // thinking that Rufus is doing something malicious... IGNORE_RETVAL(CoCreateGuid(&guid)); // coverity[fixed_size_dest] strcpy(&pipe[9], GuidToString(&guid)); static_sprintf(icon_path, "%s%s.ico", temp_dir, APPLICATION_NAME); ExtractAppIcon(icon_path, TRUE); //#define FORCE_URL "https://github.com/pbatard/rufus/raw/master/res/loc/test/windows_to_go.iso" //#define FORCE_URL "https://cdimage.debian.org/debian-cd/current/amd64/iso-cd/debian-9.8.0-amd64-netinst.iso" #if !defined(FORCE_URL) #if defined(RUFUS_TEST) IGNORE_RETVAL(hFile); IGNORE_RETVAL(sig_url); IGNORE_RETVAL(dwCompressedSize); IGNORE_RETVAL(uncompressed_size); // In test mode, just use our local script static_strcpy(script_path, "D:\\Projects\\Fido\\Fido.ps1"); #else // If we don't have the script, download it if (fido_script == NULL) { dwCompressedSize = (DWORD)DownloadToFileOrBuffer(fido_url, NULL, &compressed, hMainDialog, FALSE); if (dwCompressedSize == 0) goto out; static_sprintf(sig_url, "%s.sig", fido_url); dwSize = (DWORD)DownloadToFileOrBuffer(sig_url, NULL, &sig, NULL, FALSE); if ((dwSize != RSA_SIGNATURE_SIZE) || (!ValidateOpensslSignature(compressed, dwCompressedSize, sig, dwSize))) { uprintf("FATAL: Signature is invalid ✗"); FormatStatus = ERROR_SEVERITY_ERROR | FAC(FACILITY_STORAGE) | APPERR(ERROR_BAD_SIGNATURE); SendMessage(hProgress, PBM_SETSTATE, (WPARAM)PBST_ERROR, 0); SetTaskbarProgressState(TASKBAR_ERROR); safe_free(compressed); free(sig); goto out; } free(sig); uprintf("Signature is valid ✓"); uncompressed_size = *((uint64_t*)&compressed[5]); if ((uncompressed_size < 1 * MB) && (bled_init(_uprintf, NULL, NULL, NULL, NULL, &FormatStatus) >= 0)) { fido_script = malloc((size_t)uncompressed_size); size = bled_uncompress_from_buffer_to_buffer(compressed, dwCompressedSize, fido_script, (size_t)uncompressed_size, BLED_COMPRESSION_LZMA); bled_exit(); } safe_free(compressed); if (size != uncompressed_size) { uprintf("FATAL: Could not uncompressed download script"); safe_free(fido_script); FormatStatus = ERROR_SEVERITY_ERROR | FAC(FACILITY_STORAGE) | ERROR_INVALID_DATA; SendMessage(hProgress, PBM_SETSTATE, (WPARAM)PBST_ERROR, 0); SetTaskbarProgressState(TASKBAR_ERROR); goto out; } fido_len = (DWORD)size; SendMessage(hProgress, PBM_SETSTATE, (WPARAM)PBST_NORMAL, 0); SetTaskbarProgressState(TASKBAR_NORMAL); SetTaskbarProgressValue(0, MAX_PROGRESS); SendMessage(hProgress, PBM_SETPOS, 0, 0); } PrintInfo(0, MSG_148); assert((fido_script != NULL) && (fido_len != 0)); static_sprintf(script_path, "%s%s.ps1", temp_dir, GuidToString(&guid)); hFile = CreateFileU(script_path, GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_READONLY, NULL); if (hFile == INVALID_HANDLE_VALUE) { uprintf("Unable to create download script '%s': %s", script_path, WindowsErrorString()); goto out; } if ((!WriteFile(hFile, fido_script, fido_len, &dwSize, NULL)) || (dwSize != fido_len)) { uprintf("Unable to write download script '%s': %s", script_path, WindowsErrorString()); goto out; } // Why oh why does PowerShell refuse to open read-only files that haven't been closed? // Because of this limitation, we can't use LockFileEx() on the file we create... safe_closehandle(hFile); #endif static_sprintf(powershell_path, "%s\\WindowsPowerShell\\v1.0\\powershell.exe", system_dir); static_sprintf(locale_str, "%s|%s|%s|%s|%s|%s|%s|%s|%s|%s|%s|%s|%s|%s|%s|%s|%s", selected_locale->txt[0], lmprintf(MSG_135), lmprintf(MSG_136), lmprintf(MSG_137), lmprintf(MSG_138), lmprintf(MSG_139), lmprintf(MSG_040), lmprintf(MSG_140), lmprintf(MSG_141), lmprintf(MSG_006), lmprintf(MSG_007), lmprintf(MSG_042), lmprintf(MSG_142), lmprintf(MSG_143), lmprintf(MSG_144), lmprintf(MSG_145), lmprintf(MSG_146)); hPipe = CreateNamedPipeA(pipe, PIPE_ACCESS_INBOUND, PIPE_TYPE_MESSAGE | PIPE_READMODE_MESSAGE | PIPE_WAIT, PIPE_UNLIMITED_INSTANCES, dwPipeSize, dwPipeSize, 0, NULL); if (hPipe == INVALID_HANDLE_VALUE) { uprintf("Could not create pipe '%s': %s", pipe, WindowsErrorString); goto out; } static_sprintf(cmdline, "\"%s\" -NonInteractive -Sta -NoProfile –ExecutionPolicy Bypass " "-File \"%s\" -DisableFirstRunCustomize -PipeName %s -LocData \"%s\" -Icon \"%s\" -AppTitle \"%s\"", powershell_path, script_path, &pipe[9], locale_str, icon_path, lmprintf(MSG_149)); // Signal our Windows alert hook that it should close the IE cookie prompts from Fido close_fido_cookie_prompts = TRUE; dwExitCode = RunCommand(cmdline, app_dir, TRUE); uprintf("Exited download script with code: %d", dwExitCode); close_fido_cookie_prompts = FALSE; if ((dwExitCode == 0) && PeekNamedPipe(hPipe, NULL, dwPipeSize, NULL, &dwAvail, NULL) && (dwAvail != 0)) { url = malloc(dwAvail + 1); if ((url != NULL) && ReadFile(hPipe, url, dwAvail, &dwSize, NULL) && (dwSize > 4)) { #else { { url = strdup(FORCE_URL); dwSize = (DWORD)strlen(FORCE_URL); #endif IMG_SAVE img_save = { 0 }; url[dwSize] = 0; EXT_DECL(img_ext, GetShortName(url), __VA_GROUP__("*.iso"), __VA_GROUP__(lmprintf(MSG_036))); img_save.Type = IMG_SAVE_TYPE_ISO; img_save.ImagePath = FileDialog(TRUE, NULL, &img_ext, 0); if (img_save.ImagePath == NULL) { goto out; } // Download the ISO and report errors if any SendMessage(hMainDialog, UM_PROGRESS_INIT, 0, 0); FormatStatus = 0; SendMessage(hMainDialog, UM_TIMER_START, 0, 0); if (DownloadToFileOrBuffer(url, img_save.ImagePath, NULL, hMainDialog, TRUE) == 0) { SendMessage(hMainDialog, UM_PROGRESS_EXIT, 0, 0); if (SCODE_CODE(FormatStatus) == ERROR_CANCELLED) { uprintf("Download cancelled by user"); Notification(MSG_INFO, NULL, NULL, lmprintf(MSG_211), lmprintf(MSG_041)); PrintInfo(0, MSG_211); } else { Notification(MSG_ERROR, NULL, NULL, lmprintf(MSG_194, GetShortName(url)), lmprintf(MSG_043, WinInetErrorString())); PrintInfo(0, MSG_212); } } else { // Download was successful => Select and scan the ISO image_path = safe_strdup(img_save.ImagePath); PostMessage(hMainDialog, UM_SELECT_ISO, 0, 0); } safe_free(img_save.ImagePath); } } out: if (icon_path[0] != 0) DeleteFileU(icon_path); #if !defined(RUFUS_TEST) if (script_path[0] != 0) { SetFileAttributesU(script_path, FILE_ATTRIBUTE_NORMAL); DeleteFileU(script_path); } #endif free(url); SendMessage(hMainDialog, UM_ENABLE_CONTROLS, 0, 0); dialog_showing--; ExitThread(dwExitCode); } BOOL DownloadISO() { if (CreateThread(NULL, 0, DownloadISOThread, NULL, 0, NULL) == NULL) { uprintf("Unable to start Windows ISO download thread"); FormatStatus = ERROR_SEVERITY_ERROR | FAC(FACILITY_STORAGE) | APPERR(ERROR_CANT_START_THREAD); SendMessage(hMainDialog, UM_ENABLE_CONTROLS, 0, 0); return FALSE; } return TRUE; } BOOL IsDownloadable(const char* url) { DWORD dwSize, dwTotalSize = 0; const char* accept_types[] = { "*/*\0", NULL }; char hostname[64], urlpath[128]; HINTERNET hSession = NULL, hConnection = NULL, hRequest = NULL; URL_COMPONENTSA UrlParts = { sizeof(URL_COMPONENTSA), NULL, 1, (INTERNET_SCHEME)0, hostname, sizeof(hostname), 0, NULL, 1, urlpath, sizeof(urlpath), NULL, 1 }; PF_TYPE_DECL(WINAPI, BOOL, InternetCrackUrlA, (LPCSTR, DWORD, DWORD, LPURL_COMPONENTSA)); PF_TYPE_DECL(WINAPI, HINTERNET, InternetConnectA, (HINTERNET, LPCSTR, INTERNET_PORT, LPCSTR, LPCSTR, DWORD, DWORD, DWORD_PTR)); PF_TYPE_DECL(WINAPI, BOOL, InternetCloseHandle, (HINTERNET)); PF_TYPE_DECL(WINAPI, HINTERNET, HttpOpenRequestA, (HINTERNET, LPCSTR, LPCSTR, LPCSTR, LPCSTR, LPCSTR*, DWORD, DWORD_PTR)); PF_TYPE_DECL(WINAPI, BOOL, HttpSendRequestA, (HINTERNET, LPCSTR, DWORD, LPVOID, DWORD)); PF_TYPE_DECL(WINAPI, BOOL, HttpQueryInfoA, (HINTERNET, DWORD, LPVOID, LPDWORD, LPDWORD)); PF_INIT_OR_OUT(InternetCrackUrlA, WinInet); PF_INIT_OR_OUT(InternetConnectA, WinInet); PF_INIT_OR_OUT(InternetCloseHandle, WinInet); PF_INIT_OR_OUT(HttpOpenRequestA, WinInet); PF_INIT_OR_OUT(HttpSendRequestA, WinInet); PF_INIT_OR_OUT(HttpQueryInfoA, WinInet); if (url == NULL) return FALSE; FormatStatus = 0; DownloadStatus = 404; if ((!pfInternetCrackUrlA(url, (DWORD)safe_strlen(url), 0, &UrlParts)) || (UrlParts.lpszHostName == NULL) || (UrlParts.lpszUrlPath == NULL)) goto out; hostname[sizeof(hostname) - 1] = 0; // Open an Internet session hSession = GetInternetSession(FALSE); if (hSession == NULL) goto out; hConnection = pfInternetConnectA(hSession, UrlParts.lpszHostName, UrlParts.nPort, NULL, NULL, INTERNET_SERVICE_HTTP, 0, (DWORD_PTR)NULL); if (hConnection == NULL) goto out; hRequest = pfHttpOpenRequestA(hConnection, "GET", UrlParts.lpszUrlPath, NULL, NULL, accept_types, INTERNET_FLAG_IGNORE_REDIRECT_TO_HTTP | INTERNET_FLAG_IGNORE_REDIRECT_TO_HTTPS | INTERNET_FLAG_NO_COOKIES | INTERNET_FLAG_NO_UI | INTERNET_FLAG_NO_CACHE_WRITE | INTERNET_FLAG_HYPERLINK | ((UrlParts.nScheme == INTERNET_SCHEME_HTTPS) ? INTERNET_FLAG_SECURE : 0), (DWORD_PTR)NULL); if (hRequest == NULL) goto out; if (!pfHttpSendRequestA(hRequest, request_headers, -1L, NULL, 0)) goto out; // Get the file size dwSize = sizeof(DownloadStatus); pfHttpQueryInfoA(hRequest, HTTP_QUERY_STATUS_CODE | HTTP_QUERY_FLAG_NUMBER, (LPVOID)&DownloadStatus, &dwSize, NULL); if (DownloadStatus != 200) goto out; dwSize = sizeof(dwTotalSize); pfHttpQueryInfoA(hRequest, HTTP_QUERY_CONTENT_LENGTH | HTTP_QUERY_FLAG_NUMBER, (LPVOID)&dwTotalSize, &dwSize, NULL); out: if (hRequest) pfInternetCloseHandle(hRequest); if (hConnection) pfInternetCloseHandle(hConnection); if (hSession) pfInternetCloseHandle(hSession); return (dwTotalSize > 0); }