xref: /PHP-7.3/ext/phar/tar.c (revision ccca2c44)
1 /*
2   +----------------------------------------------------------------------+
3   | TAR archive support for Phar                                         |
4   +----------------------------------------------------------------------+
5   | Copyright (c) 2005-2018 The PHP Group                                |
6   +----------------------------------------------------------------------+
7   | This source file is subject to version 3.01 of the PHP license,      |
8   | that is bundled with this package in the file LICENSE, and is        |
9   | available through the world-wide-web at the following url:           |
10   | http://www.php.net/license/3_01.txt.                                 |
11   | If you did not receive a copy of the PHP license and are unable to   |
12   | obtain it through the world-wide-web, please send a note to          |
13   | license@php.net so we can mail you a copy immediately.               |
14   +----------------------------------------------------------------------+
15   | Authors: Dmitry Stogov <dmitry@php.net>                              |
16   |          Gregory Beaver <cellog@php.net>                             |
17   +----------------------------------------------------------------------+
18 */
19 
20 #include "phar_internal.h"
21 
phar_tar_number(char * buf,size_t len)22 static uint32_t phar_tar_number(char *buf, size_t len) /* {{{ */
23 {
24 	uint32_t num = 0;
25 	int i = 0;
26 
27 	while (i < len && buf[i] == ' ') {
28 		++i;
29 	}
30 
31 	while (i < len && buf[i] >= '0' && buf[i] <= '7') {
32 		num = num * 8 + (buf[i] - '0');
33 		++i;
34 	}
35 
36 	return num;
37 }
38 /* }}} */
39 
40 /* adapted from format_octal() in libarchive
41  *
42  * Copyright (c) 2003-2009 Tim Kientzle
43  * All rights reserved.
44  *
45  * Redistribution and use in source and binary forms, with or without
46  * modification, are permitted provided that the following conditions
47  * are met:
48  * 1. Redistributions of source code must retain the above copyright
49  *    notice, this list of conditions and the following disclaimer.
50  * 2. Redistributions in binary form must reproduce the above copyright
51  *    notice, this list of conditions and the following disclaimer in the
52  *    documentation and/or other materials provided with the distribution.
53  *
54  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
55  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
56  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
57  * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
58  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
59  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
60  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
61  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
62  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
63  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
64  */
phar_tar_octal(char * buf,uint32_t val,int len)65 static int phar_tar_octal(char *buf, uint32_t val, int len) /* {{{ */
66 {
67 	char *p = buf;
68 	int s = len;
69 
70 	p += len;		/* Start at the end and work backwards. */
71 	while (s-- > 0) {
72 		*--p = (char)('0' + (val & 7));
73 		val >>= 3;
74 	}
75 
76 	if (val == 0)
77 		return SUCCESS;
78 
79 	/* If it overflowed, fill field with max value. */
80 	while (len-- > 0)
81 		*p++ = '7';
82 
83 	return FAILURE;
84 }
85 /* }}} */
86 
phar_tar_checksum(char * buf,size_t len)87 static uint32_t phar_tar_checksum(char *buf, size_t len) /* {{{ */
88 {
89 	uint32_t sum = 0;
90 	char *end = buf + len;
91 
92 	while (buf != end) {
93 		sum += (unsigned char)*buf;
94 		++buf;
95 	}
96 	return sum;
97 }
98 /* }}} */
99 
phar_is_tar(char * buf,char * fname)100 int phar_is_tar(char *buf, char *fname) /* {{{ */
101 {
102 	tar_header *header = (tar_header *) buf;
103 	uint32_t checksum = phar_tar_number(header->checksum, sizeof(header->checksum));
104 	uint32_t ret;
105 	char save[sizeof(header->checksum)], *bname;
106 
107 	/* assume that the first filename in a tar won't begin with <?php */
108 	if (!strncmp(buf, "<?php", sizeof("<?php")-1)) {
109 		return 0;
110 	}
111 
112 	memcpy(save, header->checksum, sizeof(header->checksum));
113 	memset(header->checksum, ' ', sizeof(header->checksum));
114 	ret = (checksum == phar_tar_checksum(buf, 512));
115 	memcpy(header->checksum, save, sizeof(header->checksum));
116 	if ((bname = strrchr(fname, PHP_DIR_SEPARATOR))) {
117 		fname = bname;
118 	}
119 	if (!ret && (bname = strstr(fname, ".tar")) && (bname[4] == '\0' || bname[4] == '.')) {
120 		/* probably a corrupted tar - so we will pretend it is one */
121 		return 1;
122 	}
123 	return ret;
124 }
125 /* }}} */
126 
phar_open_or_create_tar(char * fname,size_t fname_len,char * alias,size_t alias_len,int is_data,uint32_t options,phar_archive_data ** pphar,char ** error)127 int phar_open_or_create_tar(char *fname, size_t fname_len, char *alias, size_t alias_len, int is_data, uint32_t options, phar_archive_data** pphar, char **error) /* {{{ */
128 {
129 	phar_archive_data *phar;
130 	int ret = phar_create_or_parse_filename(fname, fname_len, alias, alias_len, is_data, options, &phar, error);
131 
132 	if (FAILURE == ret) {
133 		return FAILURE;
134 	}
135 
136 	if (pphar) {
137 		*pphar = phar;
138 	}
139 
140 	phar->is_data = is_data;
141 
142 	if (phar->is_tar) {
143 		return ret;
144 	}
145 
146 	if (phar->is_brandnew) {
147 		phar->is_tar = 1;
148 		phar->is_zip = 0;
149 		phar->internal_file_start = 0;
150 		return SUCCESS;
151 	}
152 
153 	/* we've reached here - the phar exists and is a regular phar */
154 	if (error) {
155 		spprintf(error, 4096, "phar tar error: \"%s\" already exists as a regular phar and must be deleted from disk prior to creating as a tar-based phar", fname);
156 	}
157 	return FAILURE;
158 }
159 /* }}} */
160 
phar_tar_process_metadata(phar_entry_info * entry,php_stream * fp)161 static int phar_tar_process_metadata(phar_entry_info *entry, php_stream *fp) /* {{{ */
162 {
163 	char *metadata;
164 	size_t save = php_stream_tell(fp), read;
165 	phar_entry_info *mentry;
166 
167 	metadata = (char *) safe_emalloc(1, entry->uncompressed_filesize, 1);
168 
169 	read = php_stream_read(fp, metadata, entry->uncompressed_filesize);
170 	if (read != entry->uncompressed_filesize) {
171 		efree(metadata);
172 		php_stream_seek(fp, save, SEEK_SET);
173 		return FAILURE;
174 	}
175 
176 	if (phar_parse_metadata(&metadata, &entry->metadata, entry->uncompressed_filesize) == FAILURE) {
177 		/* if not valid serialized data, it is a regular string */
178 		efree(metadata);
179 		php_stream_seek(fp, save, SEEK_SET);
180 		return FAILURE;
181 	}
182 
183 	if (entry->filename_len == sizeof(".phar/.metadata.bin")-1 && !memcmp(entry->filename, ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1)) {
184 		if (Z_TYPE(entry->phar->metadata) != IS_UNDEF) {
185 			efree(metadata);
186 			return FAILURE;
187 		}
188 		entry->phar->metadata = entry->metadata;
189 		ZVAL_UNDEF(&entry->metadata);
190 	} else if (entry->filename_len >= sizeof(".phar/.metadata/") + sizeof("/.metadata.bin") - 1 && NULL != (mentry = zend_hash_str_find_ptr(&(entry->phar->manifest), entry->filename + sizeof(".phar/.metadata/") - 1, entry->filename_len - (sizeof("/.metadata.bin") - 1 + sizeof(".phar/.metadata/") - 1)))) {
191 		if (Z_TYPE(mentry->metadata) != IS_UNDEF) {
192 			efree(metadata);
193 			return FAILURE;
194 		}
195 		/* transfer this metadata to the entry it refers */
196 		mentry->metadata = entry->metadata;
197 		ZVAL_UNDEF(&entry->metadata);
198 	}
199 
200 	efree(metadata);
201 	php_stream_seek(fp, save, SEEK_SET);
202 	return SUCCESS;
203 }
204 /* }}} */
205 
206 #if !HAVE_STRNLEN
strnlen(const char * s,size_t maxlen)207 static size_t strnlen(const char *s, size_t maxlen) {
208         char *r = (char *)memchr(s, '\0', maxlen);
209         return r ? r-s : maxlen;
210 }
211 #endif
212 
phar_parse_tarfile(php_stream * fp,char * fname,size_t fname_len,char * alias,size_t alias_len,phar_archive_data ** pphar,int is_data,uint32_t compression,char ** error)213 int phar_parse_tarfile(php_stream* fp, char *fname, size_t fname_len, char *alias, size_t alias_len, phar_archive_data** pphar, int is_data, uint32_t compression, char **error) /* {{{ */
214 {
215 	char buf[512], *actual_alias = NULL, *p;
216 	phar_entry_info entry = {0};
217 	size_t pos = 0, read, totalsize;
218 	tar_header *hdr;
219 	uint32_t sum1, sum2, size, old;
220 	phar_archive_data *myphar, *actual;
221 	int last_was_longlink = 0;
222 	size_t linkname_len;
223 
224 	if (error) {
225 		*error = NULL;
226 	}
227 
228 	php_stream_seek(fp, 0, SEEK_END);
229 	totalsize = php_stream_tell(fp);
230 	php_stream_seek(fp, 0, SEEK_SET);
231 	read = php_stream_read(fp, buf, sizeof(buf));
232 
233 	if (read != sizeof(buf)) {
234 		if (error) {
235 			spprintf(error, 4096, "phar error: \"%s\" is not a tar file or is truncated", fname);
236 		}
237 		php_stream_close(fp);
238 		return FAILURE;
239 	}
240 
241 	hdr = (tar_header*)buf;
242 	old = (memcmp(hdr->magic, "ustar", sizeof("ustar")-1) != 0);
243 
244 	myphar = (phar_archive_data *) pecalloc(1, sizeof(phar_archive_data), PHAR_G(persist));
245 	myphar->is_persistent = PHAR_G(persist);
246 	/* estimate number of entries, can't be certain with tar files */
247 	zend_hash_init(&myphar->manifest, 2 + (totalsize >> 12),
248 		zend_get_hash_value, destroy_phar_manifest_entry, (zend_bool)myphar->is_persistent);
249 	zend_hash_init(&myphar->mounted_dirs, 5,
250 		zend_get_hash_value, NULL, (zend_bool)myphar->is_persistent);
251 	zend_hash_init(&myphar->virtual_dirs, 4 + (totalsize >> 11),
252 		zend_get_hash_value, NULL, (zend_bool)myphar->is_persistent);
253 	myphar->is_tar = 1;
254 	/* remember whether this entire phar was compressed with gz/bzip2 */
255 	myphar->flags = compression;
256 
257 	entry.is_tar = 1;
258 	entry.is_crc_checked = 1;
259 	entry.phar = myphar;
260 	pos += sizeof(buf);
261 
262 	do {
263 		phar_entry_info *newentry;
264 
265 		pos = php_stream_tell(fp);
266 		hdr = (tar_header*) buf;
267 		sum1 = phar_tar_number(hdr->checksum, sizeof(hdr->checksum));
268 		if (sum1 == 0 && phar_tar_checksum(buf, sizeof(buf)) == 0) {
269 			break;
270 		}
271 		memset(hdr->checksum, ' ', sizeof(hdr->checksum));
272 		sum2 = phar_tar_checksum(buf, old?sizeof(old_tar_header):sizeof(tar_header));
273 
274 		size = entry.uncompressed_filesize = entry.compressed_filesize =
275 			phar_tar_number(hdr->size, sizeof(hdr->size));
276 
277 		/* skip global/file headers (pax) */
278 		if (!old && (hdr->typeflag == TAR_GLOBAL_HDR || hdr->typeflag == TAR_FILE_HDR)) {
279 			size = (size+511)&~511;
280 			goto next;
281 		}
282 
283 		if (((!old && hdr->prefix[0] == 0) || old) && strnlen(hdr->name, 100) == sizeof(".phar/signature.bin")-1 && !strncmp(hdr->name, ".phar/signature.bin", sizeof(".phar/signature.bin")-1)) {
284 			zend_off_t curloc;
285 			size_t sig_len;
286 
287 			if (size > 511) {
288 				if (error) {
289 					spprintf(error, 4096, "phar error: tar-based phar \"%s\" has signature that is larger than 511 bytes, cannot process", fname);
290 				}
291 bail:
292 				php_stream_close(fp);
293 				phar_destroy_phar_data(myphar);
294 				return FAILURE;
295 			}
296 			curloc = php_stream_tell(fp);
297 			read = php_stream_read(fp, buf, size);
298 			if (read != size || read <= 8) {
299 				if (error) {
300 					spprintf(error, 4096, "phar error: tar-based phar \"%s\" signature cannot be read", fname);
301 				}
302 				goto bail;
303 			}
304 #ifdef WORDS_BIGENDIAN
305 # define PHAR_GET_32(buffer) \
306 	(((((unsigned char*)(buffer))[3]) << 24) \
307 		| ((((unsigned char*)(buffer))[2]) << 16) \
308 		| ((((unsigned char*)(buffer))[1]) <<  8) \
309 		| (((unsigned char*)(buffer))[0]))
310 #else
311 # define PHAR_GET_32(buffer) (uint32_t) *(buffer)
312 #endif
313 			myphar->sig_flags = PHAR_GET_32(buf);
314 			if (FAILURE == phar_verify_signature(fp, php_stream_tell(fp) - size - 512, myphar->sig_flags, buf + 8, size - 8, fname, &myphar->signature, &sig_len, error)) {
315 				if (error) {
316 					char *save = *error;
317 					spprintf(error, 4096, "phar error: tar-based phar \"%s\" signature cannot be verified: %s", fname, save);
318 					efree(save);
319 				}
320 				goto bail;
321 			}
322 			myphar->sig_len = sig_len;
323 			php_stream_seek(fp, curloc + 512, SEEK_SET);
324 			/* signature checked out, let's ensure this is the last file in the phar */
325 			if (((hdr->typeflag == '\0') || (hdr->typeflag == TAR_FILE)) && size > 0) {
326 				/* this is not good enough - seek succeeds even on truncated tars */
327 				php_stream_seek(fp, 512, SEEK_CUR);
328 				if ((uint32_t)php_stream_tell(fp) > totalsize) {
329 					if (error) {
330 						spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
331 					}
332 					php_stream_close(fp);
333 					phar_destroy_phar_data(myphar);
334 					return FAILURE;
335 				}
336 			}
337 
338 			read = php_stream_read(fp, buf, sizeof(buf));
339 
340 			if (read != sizeof(buf)) {
341 				if (error) {
342 					spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
343 				}
344 				php_stream_close(fp);
345 				phar_destroy_phar_data(myphar);
346 				return FAILURE;
347 			}
348 
349 			hdr = (tar_header*) buf;
350 			sum1 = phar_tar_number(hdr->checksum, sizeof(hdr->checksum));
351 
352 			if (sum1 == 0 && phar_tar_checksum(buf, sizeof(buf)) == 0) {
353 				break;
354 			}
355 
356 			if (error) {
357 				spprintf(error, 4096, "phar error: \"%s\" has entries after signature, invalid phar", fname);
358 			}
359 
360 			goto bail;
361 		}
362 
363 		if (!last_was_longlink && hdr->typeflag == 'L') {
364 			last_was_longlink = 1;
365 			/* support the ././@LongLink system for storing long filenames */
366 			entry.filename_len = entry.uncompressed_filesize;
367 
368 			/* Check for overflow - bug 61065 */
369 			if (entry.filename_len == UINT_MAX || entry.filename_len == 0) {
370 				if (error) {
371 					spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (invalid entry size)", fname);
372 				}
373 				php_stream_close(fp);
374 				phar_destroy_phar_data(myphar);
375 				return FAILURE;
376 			}
377 			entry.filename = pemalloc(entry.filename_len+1, myphar->is_persistent);
378 
379 			read = php_stream_read(fp, entry.filename, entry.filename_len);
380 			if (read != entry.filename_len) {
381 				efree(entry.filename);
382 				if (error) {
383 					spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
384 				}
385 				php_stream_close(fp);
386 				phar_destroy_phar_data(myphar);
387 				return FAILURE;
388 			}
389 			entry.filename[entry.filename_len] = '\0';
390 
391 			/* skip blank stuff */
392 			size = ((size+511)&~511) - size;
393 
394 			/* this is not good enough - seek succeeds even on truncated tars */
395 			php_stream_seek(fp, size, SEEK_CUR);
396 			if ((uint32_t)php_stream_tell(fp) > totalsize) {
397 				efree(entry.filename);
398 				if (error) {
399 					spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
400 				}
401 				php_stream_close(fp);
402 				phar_destroy_phar_data(myphar);
403 				return FAILURE;
404 			}
405 
406 			read = php_stream_read(fp, buf, sizeof(buf));
407 
408 			if (read != sizeof(buf)) {
409 				efree(entry.filename);
410 				if (error) {
411 					spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
412 				}
413 				php_stream_close(fp);
414 				phar_destroy_phar_data(myphar);
415 				return FAILURE;
416 			}
417 			continue;
418 		} else if (!last_was_longlink && !old && hdr->prefix[0] != 0) {
419 			char name[256];
420 			int i, j;
421 
422 			for (i = 0; i < 155; i++) {
423 				name[i] = hdr->prefix[i];
424 				if (name[i] == '\0') {
425 					break;
426 				}
427 			}
428 			name[i++] = '/';
429 			for (j = 0; j < 100; j++) {
430 				name[i+j] = hdr->name[j];
431 				if (name[i+j] == '\0') {
432 					break;
433 				}
434 			}
435 
436 			entry.filename_len = i+j;
437 
438 			if (name[entry.filename_len - 1] == '/') {
439 				/* some tar programs store directories with trailing slash */
440 				entry.filename_len--;
441 			}
442 			entry.filename = pestrndup(name, entry.filename_len, myphar->is_persistent);
443 		} else if (!last_was_longlink) {
444 			int i;
445 
446 			/* calculate strlen, which can be no longer than 100 */
447 			for (i = 0; i < 100; i++) {
448 				if (hdr->name[i] == '\0') {
449 					break;
450 				}
451 			}
452 			entry.filename_len = i;
453 			entry.filename = pestrndup(hdr->name, i, myphar->is_persistent);
454 
455 			if (i > 0 && entry.filename[entry.filename_len - 1] == '/') {
456 				/* some tar programs store directories with trailing slash */
457 				entry.filename[entry.filename_len - 1] = '\0';
458 				entry.filename_len--;
459 			}
460 		}
461 		last_was_longlink = 0;
462 
463 		phar_add_virtual_dirs(myphar, entry.filename, entry.filename_len);
464 
465 		if (sum1 != sum2) {
466 			if (error) {
467 				spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (checksum mismatch of file \"%s\")", fname, entry.filename);
468 			}
469 			pefree(entry.filename, myphar->is_persistent);
470 			php_stream_close(fp);
471 			phar_destroy_phar_data(myphar);
472 			return FAILURE;
473 		}
474 
475 		entry.tar_type = ((old & (hdr->typeflag == '\0')) ? TAR_FILE : hdr->typeflag);
476 		entry.offset = entry.offset_abs = pos; /* header_offset unused in tar */
477 		entry.fp_type = PHAR_FP;
478 		entry.flags = phar_tar_number(hdr->mode, sizeof(hdr->mode)) & PHAR_ENT_PERM_MASK;
479 		entry.timestamp = phar_tar_number(hdr->mtime, sizeof(hdr->mtime));
480 		entry.is_persistent = myphar->is_persistent;
481 
482 		if (old && entry.tar_type == TAR_FILE && S_ISDIR(entry.flags)) {
483 			entry.tar_type = TAR_DIR;
484 		}
485 
486 		if (entry.tar_type == TAR_DIR) {
487 			entry.is_dir = 1;
488 		} else {
489 			entry.is_dir = 0;
490 		}
491 
492 		entry.link = NULL;
493 		/* link field is null-terminated unless it has 100 non-null chars.
494 		 * Thus we can not use strlen. */
495 		linkname_len = strnlen(hdr->linkname, 100);
496 		if (entry.tar_type == TAR_LINK) {
497 			if (!zend_hash_str_exists(&myphar->manifest, hdr->linkname, linkname_len)) {
498 				if (error) {
499 					spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file - hard link to non-existent file \"%.*s\"", fname, (int)linkname_len, hdr->linkname);
500 				}
501 				pefree(entry.filename, entry.is_persistent);
502 				php_stream_close(fp);
503 				phar_destroy_phar_data(myphar);
504 				return FAILURE;
505 			}
506 			entry.link = estrndup(hdr->linkname, linkname_len);
507 		} else if (entry.tar_type == TAR_SYMLINK) {
508 			entry.link = estrndup(hdr->linkname, linkname_len);
509 		}
510 		phar_set_inode(&entry);
511 
512 		newentry = zend_hash_str_update_mem(&myphar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info));
513 		ZEND_ASSERT(newentry != NULL);
514 
515 		if (entry.is_persistent) {
516 			++entry.manifest_pos;
517 		}
518 
519 		if (entry.filename_len >= sizeof(".phar/.metadata")-1 && !memcmp(entry.filename, ".phar/.metadata", sizeof(".phar/.metadata")-1)) {
520 			if (FAILURE == phar_tar_process_metadata(newentry, fp)) {
521 				if (error) {
522 					spprintf(error, 4096, "phar error: tar-based phar \"%s\" has invalid metadata in magic file \"%s\"", fname, entry.filename);
523 				}
524 				php_stream_close(fp);
525 				phar_destroy_phar_data(myphar);
526 				return FAILURE;
527 			}
528 		}
529 
530 		if (!actual_alias && entry.filename_len == sizeof(".phar/alias.txt")-1 && !strncmp(entry.filename, ".phar/alias.txt", sizeof(".phar/alias.txt")-1)) {
531 			/* found explicit alias */
532 			if (size > 511) {
533 				if (error) {
534 					spprintf(error, 4096, "phar error: tar-based phar \"%s\" has alias that is larger than 511 bytes, cannot process", fname);
535 				}
536 				php_stream_close(fp);
537 				phar_destroy_phar_data(myphar);
538 				return FAILURE;
539 			}
540 
541 			read = php_stream_read(fp, buf, size);
542 
543 			if (read == size) {
544 				buf[size] = '\0';
545 				if (!phar_validate_alias(buf, size)) {
546 					if (size > 50) {
547 						buf[50] = '.';
548 						buf[51] = '.';
549 						buf[52] = '.';
550 						buf[53] = '\0';
551 					}
552 
553 					if (error) {
554 						spprintf(error, 4096, "phar error: invalid alias \"%s\" in tar-based phar \"%s\"", buf, fname);
555 					}
556 
557 					php_stream_close(fp);
558 					phar_destroy_phar_data(myphar);
559 					return FAILURE;
560 				}
561 
562 				actual_alias = pestrndup(buf, size, myphar->is_persistent);
563 				myphar->alias = actual_alias;
564 				myphar->alias_len = size;
565 				php_stream_seek(fp, pos, SEEK_SET);
566 			} else {
567 				if (error) {
568 					spprintf(error, 4096, "phar error: Unable to read alias from tar-based phar \"%s\"", fname);
569 				}
570 
571 				php_stream_close(fp);
572 				phar_destroy_phar_data(myphar);
573 				return FAILURE;
574 			}
575 		}
576 
577 		size = (size+511)&~511;
578 
579 		if (((hdr->typeflag == '\0') || (hdr->typeflag == TAR_FILE)) && size > 0) {
580 next:
581 			/* this is not good enough - seek succeeds even on truncated tars */
582 			php_stream_seek(fp, size, SEEK_CUR);
583 			if ((uint32_t)php_stream_tell(fp) > totalsize) {
584 				if (error) {
585 					spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
586 				}
587 				php_stream_close(fp);
588 				phar_destroy_phar_data(myphar);
589 				return FAILURE;
590 			}
591 		}
592 
593 		read = php_stream_read(fp, buf, sizeof(buf));
594 
595 		if (read != sizeof(buf)) {
596 			if (error) {
597 				spprintf(error, 4096, "phar error: \"%s\" is a corrupted tar file (truncated)", fname);
598 			}
599 			php_stream_close(fp);
600 			phar_destroy_phar_data(myphar);
601 			return FAILURE;
602 		}
603 	} while (!php_stream_eof(fp));
604 
605 	if (zend_hash_str_exists(&(myphar->manifest), ".phar/stub.php", sizeof(".phar/stub.php")-1)) {
606 		myphar->is_data = 0;
607 	} else {
608 		myphar->is_data = 1;
609 	}
610 
611 	/* ensure signature set */
612 	if (!myphar->is_data && PHAR_G(require_hash) && !myphar->signature) {
613 		php_stream_close(fp);
614 		phar_destroy_phar_data(myphar);
615 		if (error) {
616 			spprintf(error, 0, "tar-based phar \"%s\" does not have a signature", fname);
617 		}
618 		return FAILURE;
619 	}
620 
621 	myphar->fname = pestrndup(fname, fname_len, myphar->is_persistent);
622 #ifdef PHP_WIN32
623 	phar_unixify_path_separators(myphar->fname, fname_len);
624 #endif
625 	myphar->fname_len = fname_len;
626 	myphar->fp = fp;
627 	p = strrchr(myphar->fname, '/');
628 
629 	if (p) {
630 		myphar->ext = memchr(p, '.', (myphar->fname + fname_len) - p);
631 		if (myphar->ext == p) {
632 			myphar->ext = memchr(p + 1, '.', (myphar->fname + fname_len) - p - 1);
633 		}
634 		if (myphar->ext) {
635 			myphar->ext_len = (myphar->fname + fname_len) - myphar->ext;
636 		}
637 	}
638 
639 	phar_request_initialize();
640 
641 	if (NULL == (actual = zend_hash_str_add_ptr(&(PHAR_G(phar_fname_map)), myphar->fname, fname_len, myphar))) {
642 		if (error) {
643 			spprintf(error, 4096, "phar error: Unable to add tar-based phar \"%s\" to phar registry", fname);
644 		}
645 		php_stream_close(fp);
646 		phar_destroy_phar_data(myphar);
647 		return FAILURE;
648 	}
649 
650 	myphar = actual;
651 
652 	if (actual_alias) {
653 		phar_archive_data *fd_ptr;
654 
655 		myphar->is_temporary_alias = 0;
656 
657 		if (NULL != (fd_ptr = zend_hash_str_find_ptr(&(PHAR_G(phar_alias_map)), actual_alias, myphar->alias_len))) {
658 			if (SUCCESS != phar_free_alias(fd_ptr, actual_alias, myphar->alias_len)) {
659 				if (error) {
660 					spprintf(error, 4096, "phar error: Unable to add tar-based phar \"%s\", alias is already in use", fname);
661 				}
662 				zend_hash_str_del(&(PHAR_G(phar_fname_map)), myphar->fname, fname_len);
663 				return FAILURE;
664 			}
665 		}
666 
667 		zend_hash_str_add_ptr(&(PHAR_G(phar_alias_map)), actual_alias, myphar->alias_len, myphar);
668 	} else {
669 		phar_archive_data *fd_ptr;
670 
671 		if (alias_len) {
672 			if (NULL != (fd_ptr = zend_hash_str_find_ptr(&(PHAR_G(phar_alias_map)), alias, alias_len))) {
673 				if (SUCCESS != phar_free_alias(fd_ptr, alias, alias_len)) {
674 					if (error) {
675 						spprintf(error, 4096, "phar error: Unable to add tar-based phar \"%s\", alias is already in use", fname);
676 					}
677 					zend_hash_str_del(&(PHAR_G(phar_fname_map)), myphar->fname, fname_len);
678 					return FAILURE;
679 				}
680 			}
681 			zend_hash_str_add_ptr(&(PHAR_G(phar_alias_map)), alias, alias_len, myphar);
682 			myphar->alias = pestrndup(alias, alias_len, myphar->is_persistent);
683 			myphar->alias_len = alias_len;
684 		} else {
685 			myphar->alias = pestrndup(myphar->fname, fname_len, myphar->is_persistent);
686 			myphar->alias_len = fname_len;
687 		}
688 
689 		myphar->is_temporary_alias = 1;
690 	}
691 
692 	if (pphar) {
693 		*pphar = myphar;
694 	}
695 
696 	return SUCCESS;
697 }
698 /* }}} */
699 
700 struct _phar_pass_tar_info {
701 	php_stream *old;
702 	php_stream *new;
703 	int free_fp;
704 	int free_ufp;
705 	char **error;
706 };
707 
phar_tar_writeheaders_int(phar_entry_info * entry,void * argument)708 static int phar_tar_writeheaders_int(phar_entry_info *entry, void *argument) /* {{{ */
709 {
710 	tar_header header;
711 	size_t pos;
712 	struct _phar_pass_tar_info *fp = (struct _phar_pass_tar_info *)argument;
713 	char padding[512];
714 
715 	if (entry->is_mounted) {
716 		return ZEND_HASH_APPLY_KEEP;
717 	}
718 
719 	if (entry->is_deleted) {
720 		if (entry->fp_refcount <= 0) {
721 			return ZEND_HASH_APPLY_REMOVE;
722 		} else {
723 			/* we can't delete this in-memory until it is closed */
724 			return ZEND_HASH_APPLY_KEEP;
725 		}
726 	}
727 
728 	phar_add_virtual_dirs(entry->phar, entry->filename, entry->filename_len);
729 	memset((char *) &header, 0, sizeof(header));
730 
731 	if (entry->filename_len > 100) {
732 		char *boundary;
733 		if (entry->filename_len > 256) {
734 			if (fp->error) {
735 				spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, filename \"%s\" is too long for tar file format", entry->phar->fname, entry->filename);
736 			}
737 			return ZEND_HASH_APPLY_STOP;
738 		}
739 		boundary = entry->filename + entry->filename_len - 101;
740 		while (*boundary && *boundary != '/') {
741 			++boundary;
742 		}
743 		if (!*boundary || ((boundary - entry->filename) > 155)) {
744 			if (fp->error) {
745 				spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, filename \"%s\" is too long for tar file format", entry->phar->fname, entry->filename);
746 			}
747 			return ZEND_HASH_APPLY_STOP;
748 		}
749 		memcpy(header.prefix, entry->filename, boundary - entry->filename);
750 		memcpy(header.name, boundary + 1, entry->filename_len - (boundary + 1 - entry->filename));
751 	} else {
752 		memcpy(header.name, entry->filename, entry->filename_len);
753 	}
754 
755 	phar_tar_octal(header.mode, entry->flags & PHAR_ENT_PERM_MASK, sizeof(header.mode)-1);
756 
757 	if (FAILURE == phar_tar_octal(header.size, entry->uncompressed_filesize, sizeof(header.size)-1)) {
758 		if (fp->error) {
759 			spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, filename \"%s\" is too large for tar file format", entry->phar->fname, entry->filename);
760 		}
761 		return ZEND_HASH_APPLY_STOP;
762 	}
763 
764 	if (FAILURE == phar_tar_octal(header.mtime, entry->timestamp, sizeof(header.mtime)-1)) {
765 		if (fp->error) {
766 			spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, file modification time of file \"%s\" is too large for tar file format", entry->phar->fname, entry->filename);
767 		}
768 		return ZEND_HASH_APPLY_STOP;
769 	}
770 
771 	/* calc checksum */
772 	header.typeflag = entry->tar_type;
773 
774 	if (entry->link) {
775 		if (strlcpy(header.linkname, entry->link, sizeof(header.linkname)) >= sizeof(header.linkname)) {
776 			if (fp->error) {
777 				spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, link \"%s\" is too long for format", entry->phar->fname, entry->link);
778 			}
779 			return ZEND_HASH_APPLY_STOP;
780 		}
781 	}
782 
783 	strncpy(header.magic, "ustar", sizeof("ustar")-1);
784 	strncpy(header.version, "00", sizeof("00")-1);
785 	strncpy(header.checksum, "        ", sizeof("        ")-1);
786 	entry->crc32 = phar_tar_checksum((char *)&header, sizeof(header));
787 
788 	if (FAILURE == phar_tar_octal(header.checksum, entry->crc32, sizeof(header.checksum)-1)) {
789 		if (fp->error) {
790 			spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, checksum of file \"%s\" is too large for tar file format", entry->phar->fname, entry->filename);
791 		}
792 		return ZEND_HASH_APPLY_STOP;
793 	}
794 
795 	/* write header */
796 	entry->header_offset = php_stream_tell(fp->new);
797 
798 	if (sizeof(header) != php_stream_write(fp->new, (char *) &header, sizeof(header))) {
799 		if (fp->error) {
800 			spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, header for  file \"%s\" could not be written", entry->phar->fname, entry->filename);
801 		}
802 		return ZEND_HASH_APPLY_STOP;
803 	}
804 
805 	pos = php_stream_tell(fp->new); /* save start of file within tar */
806 
807 	/* write contents */
808 	if (entry->uncompressed_filesize) {
809 		if (FAILURE == phar_open_entry_fp(entry, fp->error, 0)) {
810 			return ZEND_HASH_APPLY_STOP;
811 		}
812 
813 		if (-1 == phar_seek_efp(entry, 0, SEEK_SET, 0, 0)) {
814 			if (fp->error) {
815 				spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, contents of file \"%s\" could not be written, seek failed", entry->phar->fname, entry->filename);
816 			}
817 			return ZEND_HASH_APPLY_STOP;
818 		}
819 
820 		if (SUCCESS != php_stream_copy_to_stream_ex(phar_get_efp(entry, 0), fp->new, entry->uncompressed_filesize, NULL)) {
821 			if (fp->error) {
822 				spprintf(fp->error, 4096, "tar-based phar \"%s\" cannot be created, contents of file \"%s\" could not be written", entry->phar->fname, entry->filename);
823 			}
824 			return ZEND_HASH_APPLY_STOP;
825 		}
826 
827 		memset(padding, 0, 512);
828 		php_stream_write(fp->new, padding, ((entry->uncompressed_filesize +511)&~511) - entry->uncompressed_filesize);
829 	}
830 
831 	if (!entry->is_modified && entry->fp_refcount) {
832 		/* open file pointers refer to this fp, do not free the stream */
833 		switch (entry->fp_type) {
834 			case PHAR_FP:
835 				fp->free_fp = 0;
836 				break;
837 			case PHAR_UFP:
838 				fp->free_ufp = 0;
839 			default:
840 				break;
841 		}
842 	}
843 
844 	entry->is_modified = 0;
845 
846 	if (entry->fp_type == PHAR_MOD && entry->fp != entry->phar->fp && entry->fp != entry->phar->ufp) {
847 		if (!entry->fp_refcount) {
848 			php_stream_close(entry->fp);
849 		}
850 		entry->fp = NULL;
851 	}
852 
853 	entry->fp_type = PHAR_FP;
854 
855 	/* note new location within tar */
856 	entry->offset = entry->offset_abs = pos;
857 	return ZEND_HASH_APPLY_KEEP;
858 }
859 /* }}} */
860 
phar_tar_writeheaders(zval * zv,void * argument)861 static int phar_tar_writeheaders(zval *zv, void *argument) /* {{{ */
862 {
863 	return phar_tar_writeheaders_int(Z_PTR_P(zv), argument);
864 }
865 /* }}} */
866 
phar_tar_setmetadata(zval * metadata,phar_entry_info * entry,char ** error)867 int phar_tar_setmetadata(zval *metadata, phar_entry_info *entry, char **error) /* {{{ */
868 {
869 	php_serialize_data_t metadata_hash;
870 
871 	if (entry->metadata_str.s) {
872 		smart_str_free(&entry->metadata_str);
873 	}
874 
875 	entry->metadata_str.s = NULL;
876 	PHP_VAR_SERIALIZE_INIT(metadata_hash);
877 	php_var_serialize(&entry->metadata_str, metadata, &metadata_hash);
878 	PHP_VAR_SERIALIZE_DESTROY(metadata_hash);
879 	entry->uncompressed_filesize = entry->compressed_filesize = entry->metadata_str.s ? ZSTR_LEN(entry->metadata_str.s) : 0;
880 
881 	if (entry->fp && entry->fp_type == PHAR_MOD) {
882 		php_stream_close(entry->fp);
883 	}
884 
885 	entry->fp_type = PHAR_MOD;
886 	entry->is_modified = 1;
887 	entry->fp = php_stream_fopen_tmpfile();
888 	entry->offset = entry->offset_abs = 0;
889 	if (entry->fp == NULL) {
890 		spprintf(error, 0, "phar error: unable to create temporary file");
891 		return -1;
892 	}
893 	if (ZSTR_LEN(entry->metadata_str.s) != php_stream_write(entry->fp, ZSTR_VAL(entry->metadata_str.s), ZSTR_LEN(entry->metadata_str.s))) {
894 		spprintf(error, 0, "phar tar error: unable to write metadata to magic metadata file \"%s\"", entry->filename);
895 		zend_hash_str_del(&(entry->phar->manifest), entry->filename, entry->filename_len);
896 		return ZEND_HASH_APPLY_STOP;
897 	}
898 
899 	return ZEND_HASH_APPLY_KEEP;
900 }
901 /* }}} */
902 
phar_tar_setupmetadata(zval * zv,void * argument)903 static int phar_tar_setupmetadata(zval *zv, void *argument) /* {{{ */
904 {
905 	int lookfor_len;
906 	struct _phar_pass_tar_info *i = (struct _phar_pass_tar_info *)argument;
907 	char *lookfor, **error = i->error;
908 	phar_entry_info *entry = (phar_entry_info *)Z_PTR_P(zv), *metadata, newentry = {0};
909 
910 	if (entry->filename_len >= sizeof(".phar/.metadata") && !memcmp(entry->filename, ".phar/.metadata", sizeof(".phar/.metadata")-1)) {
911 		if (entry->filename_len == sizeof(".phar/.metadata.bin")-1 && !memcmp(entry->filename, ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1)) {
912 			return phar_tar_setmetadata(&entry->phar->metadata, entry, error);
913 		}
914 		/* search for the file this metadata entry references */
915 		if (entry->filename_len >= sizeof(".phar/.metadata/") + sizeof("/.metadata.bin") - 1 && !zend_hash_str_exists(&(entry->phar->manifest), entry->filename + sizeof(".phar/.metadata/") - 1, entry->filename_len - (sizeof("/.metadata.bin") - 1 + sizeof(".phar/.metadata/") - 1))) {
916 			/* this is orphaned metadata, erase it */
917 			return ZEND_HASH_APPLY_REMOVE;
918 		}
919 		/* we can keep this entry, the file that refers to it exists */
920 		return ZEND_HASH_APPLY_KEEP;
921 	}
922 
923 	if (!entry->is_modified) {
924 		return ZEND_HASH_APPLY_KEEP;
925 	}
926 
927 	/* now we are dealing with regular files, so look for metadata */
928 	lookfor_len = spprintf(&lookfor, 0, ".phar/.metadata/%s/.metadata.bin", entry->filename);
929 
930 	if (Z_TYPE(entry->metadata) == IS_UNDEF) {
931 		zend_hash_str_del(&(entry->phar->manifest), lookfor, lookfor_len);
932 		efree(lookfor);
933 		return ZEND_HASH_APPLY_KEEP;
934 	}
935 
936 	if (NULL != (metadata = zend_hash_str_find_ptr(&(entry->phar->manifest), lookfor, lookfor_len))) {
937 		int ret;
938 		ret = phar_tar_setmetadata(&entry->metadata, metadata, error);
939 		efree(lookfor);
940 		return ret;
941 	}
942 
943 	newentry.filename = lookfor;
944 	newentry.filename_len = lookfor_len;
945 	newentry.phar = entry->phar;
946 	newentry.tar_type = TAR_FILE;
947 	newentry.is_tar = 1;
948 
949 	if (NULL == (metadata = zend_hash_str_add_mem(&(entry->phar->manifest), lookfor, lookfor_len, (void *)&newentry, sizeof(phar_entry_info)))) {
950 		efree(lookfor);
951 		spprintf(error, 0, "phar tar error: unable to add magic metadata file to manifest for file \"%s\"", entry->filename);
952 		return ZEND_HASH_APPLY_STOP;
953 	}
954 
955 	return phar_tar_setmetadata(&entry->metadata, metadata, error);
956 }
957 /* }}} */
958 
phar_tar_flush(phar_archive_data * phar,char * user_stub,zend_long len,int defaultstub,char ** error)959 int phar_tar_flush(phar_archive_data *phar, char *user_stub, zend_long len, int defaultstub, char **error) /* {{{ */
960 {
961 	phar_entry_info entry = {0};
962 	static const char newstub[] = "<?php // tar-based phar archive stub file\n__HALT_COMPILER();";
963 	php_stream *oldfile, *newfile, *stubfile;
964 	int closeoldfile, free_user_stub;
965 	size_t signature_length;
966 	struct _phar_pass_tar_info pass;
967 	char *buf, *signature, *tmp, sigbuf[8];
968 	char halt_stub[] = "__HALT_COMPILER();";
969 
970 	entry.flags = PHAR_ENT_PERM_DEF_FILE;
971 	entry.timestamp = time(NULL);
972 	entry.is_modified = 1;
973 	entry.is_crc_checked = 1;
974 	entry.is_tar = 1;
975 	entry.tar_type = '0';
976 	entry.phar = phar;
977 	entry.fp_type = PHAR_MOD;
978 	entry.fp = NULL;
979 	entry.filename = NULL;
980 
981 	if (phar->is_persistent) {
982 		if (error) {
983 			spprintf(error, 0, "internal error: attempt to flush cached tar-based phar \"%s\"", phar->fname);
984 		}
985 		return EOF;
986 	}
987 
988 	if (phar->is_data) {
989 		goto nostub;
990 	}
991 
992 	/* set alias */
993 	if (!phar->is_temporary_alias && phar->alias_len) {
994 		entry.filename = estrndup(".phar/alias.txt", sizeof(".phar/alias.txt")-1);
995 		entry.filename_len = sizeof(".phar/alias.txt")-1;
996 		entry.fp = php_stream_fopen_tmpfile();
997 		if (entry.fp == NULL) {
998 			efree(entry.filename);
999 			spprintf(error, 0, "phar error: unable to create temporary file");
1000 			return -1;
1001 		}
1002 		if (phar->alias_len != php_stream_write(entry.fp, phar->alias, phar->alias_len)) {
1003 			if (error) {
1004 				spprintf(error, 0, "unable to set alias in tar-based phar \"%s\"", phar->fname);
1005 			}
1006 			php_stream_close(entry.fp);
1007 			efree(entry.filename);
1008 			return EOF;
1009 		}
1010 
1011 		entry.uncompressed_filesize = phar->alias_len;
1012 
1013 		zend_hash_str_update_mem(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info));
1014 		/* At this point the entry is saved into the manifest. The manifest destroy
1015 			routine will care about any resources to be freed. */
1016 	} else {
1017 		zend_hash_str_del(&phar->manifest, ".phar/alias.txt", sizeof(".phar/alias.txt")-1);
1018 	}
1019 
1020 	/* set stub */
1021 	if (user_stub && !defaultstub) {
1022 		char *pos;
1023 		if (len < 0) {
1024 			/* resource passed in */
1025 			if (!(php_stream_from_zval_no_verify(stubfile, (zval *)user_stub))) {
1026 				if (error) {
1027 					spprintf(error, 0, "unable to access resource to copy stub to new tar-based phar \"%s\"", phar->fname);
1028 				}
1029 				return EOF;
1030 			}
1031 			if (len == -1) {
1032 				len = PHP_STREAM_COPY_ALL;
1033 			} else {
1034 				len = -len;
1035 			}
1036 			user_stub = 0;
1037 
1038 			// TODO: refactor to avoid reallocation ???
1039 //???		len = php_stream_copy_to_mem(stubfile, &user_stub, len, 0)
1040 			{
1041 				zend_string *str = php_stream_copy_to_mem(stubfile, len, 0);
1042 				if (str) {
1043 					len = ZSTR_LEN(str);
1044 					user_stub = estrndup(ZSTR_VAL(str), ZSTR_LEN(str));
1045 					zend_string_release_ex(str, 0);
1046 				} else {
1047 					user_stub = NULL;
1048 					len = 0;
1049 				}
1050 			}
1051 
1052 			if (!len || !user_stub) {
1053 				if (error) {
1054 					spprintf(error, 0, "unable to read resource to copy stub to new tar-based phar \"%s\"", phar->fname);
1055 				}
1056 				return EOF;
1057 			}
1058 			free_user_stub = 1;
1059 		} else {
1060 			free_user_stub = 0;
1061 		}
1062 
1063 		tmp = estrndup(user_stub, len);
1064 		if ((pos = php_stristr(tmp, halt_stub, len, sizeof(halt_stub) - 1)) == NULL) {
1065 			efree(tmp);
1066 			if (error) {
1067 				spprintf(error, 0, "illegal stub for tar-based phar \"%s\"", phar->fname);
1068 			}
1069 			if (free_user_stub) {
1070 				efree(user_stub);
1071 			}
1072 			return EOF;
1073 		}
1074 		pos = user_stub + (pos - tmp);
1075 		efree(tmp);
1076 
1077 		len = pos - user_stub + 18;
1078 		entry.fp = php_stream_fopen_tmpfile();
1079 		if (entry.fp == NULL) {
1080 			spprintf(error, 0, "phar error: unable to create temporary file");
1081 			return EOF;
1082 		}
1083 		entry.uncompressed_filesize = len + 5;
1084 
1085 		if ((size_t)len != php_stream_write(entry.fp, user_stub, len)
1086 		||            5 != php_stream_write(entry.fp, " ?>\r\n", 5)) {
1087 			if (error) {
1088 				spprintf(error, 0, "unable to create stub from string in new tar-based phar \"%s\"", phar->fname);
1089 			}
1090 			if (free_user_stub) {
1091 				efree(user_stub);
1092 			}
1093 			php_stream_close(entry.fp);
1094 			return EOF;
1095 		}
1096 
1097 		entry.filename = estrndup(".phar/stub.php", sizeof(".phar/stub.php")-1);
1098 		entry.filename_len = sizeof(".phar/stub.php")-1;
1099 		zend_hash_str_update_mem(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info));
1100 
1101 		if (free_user_stub) {
1102 			efree(user_stub);
1103 		}
1104 	} else {
1105 		/* Either this is a brand new phar (add the stub), or the default stub is required (overwrite the stub) */
1106 		entry.fp = php_stream_fopen_tmpfile();
1107 		if (entry.fp == NULL) {
1108 			spprintf(error, 0, "phar error: unable to create temporary file");
1109 			return EOF;
1110 		}
1111 		if (sizeof(newstub)-1 != php_stream_write(entry.fp, newstub, sizeof(newstub)-1)) {
1112 			php_stream_close(entry.fp);
1113 			if (error) {
1114 				spprintf(error, 0, "unable to %s stub in%star-based phar \"%s\", failed", user_stub ? "overwrite" : "create", user_stub ? " " : " new ", phar->fname);
1115 			}
1116 			return EOF;
1117 		}
1118 
1119 		entry.uncompressed_filesize = entry.compressed_filesize = sizeof(newstub) - 1;
1120 		entry.filename = estrndup(".phar/stub.php", sizeof(".phar/stub.php")-1);
1121 		entry.filename_len = sizeof(".phar/stub.php")-1;
1122 
1123 		if (!defaultstub) {
1124 			if (!zend_hash_str_exists(&phar->manifest, ".phar/stub.php", sizeof(".phar/stub.php")-1)) {
1125 				if (NULL == zend_hash_str_add_mem(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info))) {
1126 					php_stream_close(entry.fp);
1127 					efree(entry.filename);
1128 					if (error) {
1129 						spprintf(error, 0, "unable to create stub in tar-based phar \"%s\"", phar->fname);
1130 					}
1131 					return EOF;
1132 				}
1133 			} else {
1134 				php_stream_close(entry.fp);
1135 				efree(entry.filename);
1136 			}
1137 		} else {
1138 			zend_hash_str_update_mem(&phar->manifest, entry.filename, entry.filename_len, (void*)&entry, sizeof(phar_entry_info));
1139 		}
1140 	}
1141 nostub:
1142 	if (phar->fp && !phar->is_brandnew) {
1143 		oldfile = phar->fp;
1144 		closeoldfile = 0;
1145 		php_stream_rewind(oldfile);
1146 	} else {
1147 		oldfile = php_stream_open_wrapper(phar->fname, "rb", 0, NULL);
1148 		closeoldfile = oldfile != NULL;
1149 	}
1150 
1151 	newfile = php_stream_fopen_tmpfile();
1152 	if (!newfile) {
1153 		if (error) {
1154 			spprintf(error, 0, "unable to create temporary file");
1155 		}
1156 		if (closeoldfile) {
1157 			php_stream_close(oldfile);
1158 		}
1159 		return EOF;
1160 	}
1161 
1162 	pass.old = oldfile;
1163 	pass.new = newfile;
1164 	pass.error = error;
1165 	pass.free_fp = 1;
1166 	pass.free_ufp = 1;
1167 
1168 	if (Z_TYPE(phar->metadata) != IS_UNDEF) {
1169 		phar_entry_info *mentry;
1170 		if (NULL != (mentry = zend_hash_str_find_ptr(&(phar->manifest), ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1))) {
1171 			if (ZEND_HASH_APPLY_KEEP != phar_tar_setmetadata(&phar->metadata, mentry, error)) {
1172 				if (closeoldfile) {
1173 					php_stream_close(oldfile);
1174 				}
1175 				return EOF;
1176 			}
1177 		} else {
1178 			phar_entry_info newentry = {0};
1179 
1180 			newentry.filename = estrndup(".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1);
1181 			newentry.filename_len = sizeof(".phar/.metadata.bin")-1;
1182 			newentry.phar = phar;
1183 			newentry.tar_type = TAR_FILE;
1184 			newentry.is_tar = 1;
1185 
1186 			if (NULL == (mentry = zend_hash_str_add_mem(&(phar->manifest), ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1, (void *)&newentry, sizeof(phar_entry_info)))) {
1187 				spprintf(error, 0, "phar tar error: unable to add magic metadata file to manifest for phar archive \"%s\"", phar->fname);
1188 				if (closeoldfile) {
1189 					php_stream_close(oldfile);
1190 				}
1191 				return EOF;
1192 			}
1193 
1194 			if (ZEND_HASH_APPLY_KEEP != phar_tar_setmetadata(&phar->metadata, mentry, error)) {
1195 				zend_hash_str_del(&(phar->manifest), ".phar/.metadata.bin", sizeof(".phar/.metadata.bin")-1);
1196 				if (closeoldfile) {
1197 					php_stream_close(oldfile);
1198 				}
1199 				return EOF;
1200 			}
1201 		}
1202 	}
1203 
1204 	zend_hash_apply_with_argument(&phar->manifest, phar_tar_setupmetadata, (void *) &pass);
1205 
1206 	if (error && *error) {
1207 		if (closeoldfile) {
1208 			php_stream_close(oldfile);
1209 		}
1210 
1211 		/* on error in the hash iterator above, error is set */
1212 		php_stream_close(newfile);
1213 		return EOF;
1214 	}
1215 
1216 	zend_hash_apply_with_argument(&phar->manifest, phar_tar_writeheaders, (void *) &pass);
1217 
1218 	/* add signature for executable tars or tars explicitly set with setSignatureAlgorithm */
1219 	if (!phar->is_data || phar->sig_flags) {
1220 		if (FAILURE == phar_create_signature(phar, newfile, &signature, &signature_length, error)) {
1221 			if (error) {
1222 				char *save = *error;
1223 				spprintf(error, 0, "phar error: unable to write signature to tar-based phar: %s", save);
1224 				efree(save);
1225 			}
1226 
1227 			if (closeoldfile) {
1228 				php_stream_close(oldfile);
1229 			}
1230 
1231 			php_stream_close(newfile);
1232 			return EOF;
1233 		}
1234 
1235 		entry.filename = ".phar/signature.bin";
1236 		entry.filename_len = sizeof(".phar/signature.bin")-1;
1237 		entry.fp = php_stream_fopen_tmpfile();
1238 		if (entry.fp == NULL) {
1239 			spprintf(error, 0, "phar error: unable to create temporary file");
1240 			return EOF;
1241 		}
1242 #ifdef WORDS_BIGENDIAN
1243 # define PHAR_SET_32(var, buffer) \
1244 	*(uint32_t *)(var) = (((((unsigned char*)&(buffer))[3]) << 24) \
1245 		| ((((unsigned char*)&(buffer))[2]) << 16) \
1246 		| ((((unsigned char*)&(buffer))[1]) << 8) \
1247 		| (((unsigned char*)&(buffer))[0]))
1248 #else
1249 # define PHAR_SET_32(var, buffer) *(uint32_t *)(var) = (uint32_t) (buffer)
1250 #endif
1251 		PHAR_SET_32(sigbuf, phar->sig_flags);
1252 		PHAR_SET_32(sigbuf + 4, signature_length);
1253 
1254 		if (8 != php_stream_write(entry.fp, sigbuf, 8) || signature_length != php_stream_write(entry.fp, signature, signature_length)) {
1255 			efree(signature);
1256 			if (error) {
1257 				spprintf(error, 0, "phar error: unable to write signature to tar-based phar %s", phar->fname);
1258 			}
1259 
1260 			if (closeoldfile) {
1261 				php_stream_close(oldfile);
1262 			}
1263 			php_stream_close(newfile);
1264 			return EOF;
1265 		}
1266 
1267 		efree(signature);
1268 		entry.uncompressed_filesize = entry.compressed_filesize = signature_length + 8;
1269 		/* throw out return value and write the signature */
1270 		entry.filename_len = phar_tar_writeheaders_int(&entry, (void *)&pass);
1271 
1272 		if (error && *error) {
1273 			if (closeoldfile) {
1274 				php_stream_close(oldfile);
1275 			}
1276 			/* error is set by writeheaders */
1277 			php_stream_close(newfile);
1278 			return EOF;
1279 		}
1280 	} /* signature */
1281 
1282 	/* add final zero blocks */
1283 	buf = (char *) ecalloc(1024, 1);
1284 	php_stream_write(newfile, buf, 1024);
1285 	efree(buf);
1286 
1287 	if (closeoldfile) {
1288 		php_stream_close(oldfile);
1289 	}
1290 
1291 	/* on error in the hash iterator above, error is set */
1292 	if (error && *error) {
1293 		php_stream_close(newfile);
1294 		return EOF;
1295 	}
1296 
1297 	if (phar->fp && pass.free_fp) {
1298 		php_stream_close(phar->fp);
1299 	}
1300 
1301 	if (phar->ufp) {
1302 		if (pass.free_ufp) {
1303 			php_stream_close(phar->ufp);
1304 		}
1305 		phar->ufp = NULL;
1306 	}
1307 
1308 	phar->is_brandnew = 0;
1309 	php_stream_rewind(newfile);
1310 
1311 	if (phar->donotflush) {
1312 		/* deferred flush */
1313 		phar->fp = newfile;
1314 	} else {
1315 		phar->fp = php_stream_open_wrapper(phar->fname, "w+b", IGNORE_URL|STREAM_MUST_SEEK|REPORT_ERRORS, NULL);
1316 		if (!phar->fp) {
1317 			phar->fp = newfile;
1318 			if (error) {
1319 				spprintf(error, 0, "unable to open new phar \"%s\" for writing", phar->fname);
1320 			}
1321 			return EOF;
1322 		}
1323 
1324 		if (phar->flags & PHAR_FILE_COMPRESSED_GZ) {
1325 			php_stream_filter *filter;
1326 			/* to properly compress, we have to tell zlib to add a zlib header */
1327 			zval filterparams;
1328 
1329 			array_init(&filterparams);
1330 /* this is defined in zlib's zconf.h */
1331 #ifndef MAX_WBITS
1332 #define MAX_WBITS 15
1333 #endif
1334 			add_assoc_long(&filterparams, "window", MAX_WBITS + 16);
1335 			filter = php_stream_filter_create("zlib.deflate", &filterparams, php_stream_is_persistent(phar->fp));
1336 			zend_array_destroy(Z_ARR(filterparams));
1337 
1338 			if (!filter) {
1339 				/* copy contents uncompressed rather than lose them */
1340 				php_stream_copy_to_stream_ex(newfile, phar->fp, PHP_STREAM_COPY_ALL, NULL);
1341 				php_stream_close(newfile);
1342 				if (error) {
1343 					spprintf(error, 4096, "unable to compress all contents of phar \"%s\" using zlib, PHP versions older than 5.2.6 have a buggy zlib", phar->fname);
1344 				}
1345 				return EOF;
1346 			}
1347 
1348 			php_stream_filter_append(&phar->fp->writefilters, filter);
1349 			php_stream_copy_to_stream_ex(newfile, phar->fp, PHP_STREAM_COPY_ALL, NULL);
1350 			php_stream_filter_flush(filter, 1);
1351 			php_stream_filter_remove(filter, 1);
1352 			php_stream_close(phar->fp);
1353 			/* use the temp stream as our base */
1354 			phar->fp = newfile;
1355 		} else if (phar->flags & PHAR_FILE_COMPRESSED_BZ2) {
1356 			php_stream_filter *filter;
1357 
1358 			filter = php_stream_filter_create("bzip2.compress", NULL, php_stream_is_persistent(phar->fp));
1359 			php_stream_filter_append(&phar->fp->writefilters, filter);
1360 			php_stream_copy_to_stream_ex(newfile, phar->fp, PHP_STREAM_COPY_ALL, NULL);
1361 			php_stream_filter_flush(filter, 1);
1362 			php_stream_filter_remove(filter, 1);
1363 			php_stream_close(phar->fp);
1364 			/* use the temp stream as our base */
1365 			phar->fp = newfile;
1366 		} else {
1367 			php_stream_copy_to_stream_ex(newfile, phar->fp, PHP_STREAM_COPY_ALL, NULL);
1368 			/* we could also reopen the file in "rb" mode but there is no need for that */
1369 			php_stream_close(newfile);
1370 		}
1371 	}
1372 	return EOF;
1373 }
1374 /* }}} */
1375 
1376 /*
1377  * Local variables:
1378  * tab-width: 4
1379  * c-basic-offset: 4
1380  * End:
1381  * vim600: noet sw=4 ts=4 fdm=marker
1382  * vim<600: noet sw=4 ts=4
1383  */
1384