2016-01-05 23:01:17 +08:00
|
|
|
// texthook.cc
|
|
|
|
// 8/24/2013 jichi
|
|
|
|
// Branch: ITH_DLL/texthook.cpp, rev 128
|
|
|
|
// 8/24/2013 TODO: Clean up this file
|
|
|
|
|
2018-11-11 12:29:12 +08:00
|
|
|
#include "texthook.h"
|
2018-08-23 23:53:23 +08:00
|
|
|
#include "main.h"
|
2016-01-05 23:01:17 +08:00
|
|
|
#include "ithsys/ithsys.h"
|
|
|
|
|
2019-02-28 00:33:17 +08:00
|
|
|
extern const char* FUNC_MISSING;
|
|
|
|
extern const char* MODULE_MISSING;
|
|
|
|
extern const char* GARBAGE_MEMORY;
|
|
|
|
extern const char* SEND_ERROR;
|
|
|
|
extern const char* READ_ERROR;
|
|
|
|
|
2019-02-17 11:51:10 +08:00
|
|
|
extern WinMutex viewMutex;
|
2018-11-11 12:29:12 +08:00
|
|
|
|
2016-01-05 23:01:17 +08:00
|
|
|
// - Unnamed helpers -
|
|
|
|
|
|
|
|
namespace { // unnamed
|
2018-08-27 03:14:45 +08:00
|
|
|
#ifndef _WIN64
|
2018-11-05 09:48:27 +08:00
|
|
|
BYTE common_hook[] = {
|
2018-12-21 00:46:11 +08:00
|
|
|
0x9c, // pushfd
|
|
|
|
0x60, // pushad
|
|
|
|
0x9c, // pushfd ; Artikash 11/4/2018: not sure why pushfd happens twice. Anyway, after this a total of 0x28 bytes are pushed
|
|
|
|
0x8d, 0x44, 0x24, 0x28, // lea eax,[esp+0x28]
|
|
|
|
0x50, // push eax ; dwDatabase
|
|
|
|
0xb9, 0,0,0,0, // mov ecx,@this
|
|
|
|
0xbb, 0,0,0,0, // mov ebx,@TextHook::Send
|
|
|
|
0xff, 0xd3, // call ebx
|
|
|
|
0x9d, // popfd
|
|
|
|
0x61, // popad
|
2021-01-15 21:07:23 +08:00
|
|
|
0x9d, // popfd
|
2018-12-21 00:46:11 +08:00
|
|
|
0x68, 0,0,0,0, // push @original
|
|
|
|
0xc3 // ret ; basically absolute jmp to @original
|
2018-08-26 03:45:25 +08:00
|
|
|
};
|
2019-01-02 07:44:27 +08:00
|
|
|
int this_offset = 9, send_offset = 14, original_offset = 24;
|
2018-08-27 03:14:45 +08:00
|
|
|
#else
|
2018-12-21 00:46:11 +08:00
|
|
|
BYTE common_hook[] = {
|
|
|
|
0x9c, // push rflags
|
|
|
|
0x50, // push rax
|
|
|
|
0x53, // push rbx
|
|
|
|
0x51, // push rcx
|
|
|
|
0x52, // push rdx
|
|
|
|
0x54, // push rsp
|
|
|
|
0x55, // push rbp
|
|
|
|
0x56, // push rsi
|
|
|
|
0x57, // push rdi
|
|
|
|
0x41, 0x50, // push r8
|
|
|
|
0x41, 0x51, // push r9
|
|
|
|
0x41, 0x52, // push r10
|
|
|
|
0x41, 0x53, // push r11
|
|
|
|
0x41, 0x54, // push r12
|
|
|
|
0x41, 0x55, // push r13
|
|
|
|
0x41, 0x56, // push r14
|
|
|
|
0x41, 0x57, // push r15
|
|
|
|
// https://docs.microsoft.com/en-us/cpp/build/x64-calling-convention
|
|
|
|
// https://stackoverflow.com/questions/43358429/save-value-of-xmm-registers
|
|
|
|
0x48, 0x83, 0xec, 0x20, // sub rsp,0x20
|
|
|
|
0xc5, 0xfa, 0x7f, 0x24, 0x24, // vmovdqu [rsp],xmm4
|
|
|
|
0xc5, 0xfa, 0x7f, 0x6c, 0x24, 0x10, // vmovdqu [rsp+0x10],xmm5
|
|
|
|
0x48, 0x8d, 0x94, 0x24, 0xa8, 0x00, 0x00, 0x00, // lea rdx,[rsp+0xa8]
|
|
|
|
0x48, 0xb9, 0,0,0,0,0,0,0,0, // mov rcx,@this
|
|
|
|
0x48, 0xb8, 0,0,0,0,0,0,0,0, // mov rax,@TextHook::Send
|
2019-06-09 12:48:30 +08:00
|
|
|
0x48, 0x89, 0xe3, // mov rbx,rsp
|
|
|
|
0x48, 0x83, 0xe4, 0xf0, // and rsp,0xfffffffffffffff0 ; align stack
|
2018-12-21 00:46:11 +08:00
|
|
|
0xff, 0xd0, // call rax
|
2019-06-09 12:48:30 +08:00
|
|
|
0x48, 0x89, 0xdc, // mov rsp,rbx
|
2018-12-21 00:46:11 +08:00
|
|
|
0xc5, 0xfa, 0x6f, 0x6c, 0x24, 0x10, // vmovdqu xmm5,XMMWORD PTR[rsp + 0x10]
|
|
|
|
0xc5, 0xfa, 0x6f, 0x24, 0x24, // vmovdqu xmm4,XMMWORD PTR[rsp]
|
|
|
|
0x48, 0x83, 0xc4, 0x20, // add rsp,0x20
|
|
|
|
0x41, 0x5f, // pop r15
|
|
|
|
0x41, 0x5e, // pop r14
|
|
|
|
0x41, 0x5d, // pop r13
|
|
|
|
0x41, 0x5c, // pop r12
|
|
|
|
0x41, 0x5b, // pop r11
|
|
|
|
0x41, 0x5a, // pop r10
|
|
|
|
0x41, 0x59, // pop r9
|
|
|
|
0x41, 0x58, // pop r8
|
|
|
|
0x5f, // pop rdi
|
|
|
|
0x5e, // pop rsi
|
|
|
|
0x5d, // pop rbp
|
|
|
|
0x5c, // pop rsp
|
|
|
|
0x5a, // pop rdx
|
|
|
|
0x59, // pop rcx
|
|
|
|
0x5b, // pop rbx
|
|
|
|
0x58, // pop rax
|
|
|
|
0x9d, // pop rflags
|
2021-01-15 21:07:23 +08:00
|
|
|
0xff, 0x25, 0x00, 0x00, 0x00, 0x00, // jmp qword ptr [rip] ; relative to next instruction (i.e. jmp @original)
|
2018-12-21 00:46:11 +08:00
|
|
|
0,0,0,0,0,0,0,0 // @original
|
2018-08-27 03:14:45 +08:00
|
|
|
};
|
2019-06-09 12:48:30 +08:00
|
|
|
int this_offset = 50, send_offset = 60, original_offset = 126;
|
2018-08-27 03:14:45 +08:00
|
|
|
#endif
|
2018-11-11 13:34:42 +08:00
|
|
|
|
2020-03-24 09:37:11 +08:00
|
|
|
thread_local BYTE buffer[PIPE_BUFFER_SIZE];
|
2019-01-23 04:18:28 +08:00
|
|
|
enum { TEXT_BUFFER_SIZE = PIPE_BUFFER_SIZE - sizeof(ThreadParam) };
|
2016-01-05 23:01:17 +08:00
|
|
|
} // unnamed namespace
|
|
|
|
|
|
|
|
// - TextHook methods -
|
|
|
|
|
2019-10-04 04:00:19 +08:00
|
|
|
bool TextHook::Insert(HookParam hp, DWORD set_flag)
|
2018-08-08 03:44:13 +08:00
|
|
|
{
|
2020-03-18 03:53:46 +08:00
|
|
|
{
|
|
|
|
std::scoped_lock lock(viewMutex);
|
|
|
|
hp.type |= set_flag;
|
|
|
|
if (hp.type & USING_UTF8) hp.codepage = CP_UTF8;
|
|
|
|
this->hp = hp;
|
|
|
|
address = hp.address;
|
|
|
|
}
|
2018-11-01 00:04:32 +08:00
|
|
|
if (hp.type & DIRECT_READ) return InsertReadCode();
|
2020-03-18 03:53:46 +08:00
|
|
|
return InsertHookCode();
|
2018-08-08 03:44:13 +08:00
|
|
|
}
|
|
|
|
|
2016-01-05 23:01:17 +08:00
|
|
|
// jichi 5/11/2014:
|
|
|
|
// - dwDataBase: the stack address
|
2018-12-21 00:46:11 +08:00
|
|
|
void TextHook::Send(uintptr_t dwDataBase)
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2020-03-24 09:37:11 +08:00
|
|
|
BYTE(*buffer)[PIPE_BUFFER_SIZE] = &::buffer, *pbData = *buffer + sizeof(ThreadParam);
|
2019-10-04 04:00:19 +08:00
|
|
|
_InterlockedIncrement(&useCount);
|
2018-11-05 09:48:27 +08:00
|
|
|
__try
|
|
|
|
{
|
2020-03-18 03:53:46 +08:00
|
|
|
if (auto current_trigger_fun = trigger_fun.exchange(nullptr))
|
|
|
|
if (!current_trigger_fun(location, *(DWORD*)(dwDataBase - 0x1c), *(DWORD*)(dwDataBase - 0x18))) trigger_fun = current_trigger_fun;
|
2019-06-18 12:41:39 +08:00
|
|
|
|
2018-12-27 02:07:59 +08:00
|
|
|
#ifndef _WIN64
|
2018-12-21 00:46:11 +08:00
|
|
|
DWORD dwCount = 0,
|
|
|
|
dwSplit = 0,
|
|
|
|
dwDataIn = *(DWORD*)(dwDataBase + hp.offset), // default values
|
|
|
|
dwRetn = *(DWORD*)dwDataBase; // first value on stack (if hooked start of function, this is return address)
|
2018-11-05 09:48:27 +08:00
|
|
|
|
|
|
|
// jichi 10/24/2014: generic hook function
|
2018-12-21 00:46:11 +08:00
|
|
|
if (hp.hook_fun && !hp.hook_fun(dwDataBase, &hp)) hp.hook_fun = nullptr;
|
2018-11-05 09:48:27 +08:00
|
|
|
|
2019-10-04 04:00:19 +08:00
|
|
|
if (hp.type & HOOK_EMPTY) goto done; // jichi 10/24/2014: dummy hook only for dynamic hook
|
2018-11-05 09:48:27 +08:00
|
|
|
|
|
|
|
if (hp.text_fun) {
|
|
|
|
hp.text_fun(dwDataBase, &hp, 0, &dwDataIn, &dwSplit, &dwCount);
|
|
|
|
}
|
|
|
|
else {
|
2018-12-21 00:46:11 +08:00
|
|
|
if (hp.type & FIXING_SPLIT) dwSplit = FIXED_SPLIT_VALUE; // fuse all threads, and prevent floating
|
|
|
|
else if (hp.type & USING_SPLIT) {
|
2018-11-05 09:48:27 +08:00
|
|
|
dwSplit = *(DWORD *)(dwDataBase + hp.split);
|
2018-12-21 00:46:11 +08:00
|
|
|
if (hp.type & SPLIT_INDIRECT) dwSplit = *(DWORD *)(dwSplit + hp.split_index);
|
2018-08-26 03:45:25 +08:00
|
|
|
}
|
2018-12-21 00:46:11 +08:00
|
|
|
if (hp.type & DATA_INDIRECT) dwDataIn = *(DWORD *)(dwDataIn + hp.index);
|
2019-06-09 12:48:30 +08:00
|
|
|
dwDataIn += hp.padding;
|
2018-11-05 09:48:27 +08:00
|
|
|
dwCount = GetLength(dwDataBase, dwDataIn);
|
2018-08-26 03:45:25 +08:00
|
|
|
}
|
2018-12-02 04:53:54 +08:00
|
|
|
|
2020-03-24 09:37:11 +08:00
|
|
|
if (dwCount <= 0) goto done;
|
2019-01-23 04:18:28 +08:00
|
|
|
if (dwCount > TEXT_BUFFER_SIZE) dwCount = TEXT_BUFFER_SIZE;
|
2018-11-05 09:48:27 +08:00
|
|
|
if (hp.length_offset == 1) {
|
|
|
|
dwDataIn &= 0xffff;
|
2018-12-21 00:46:11 +08:00
|
|
|
if ((hp.type & BIG_ENDIAN) && (dwDataIn >> 8)) dwDataIn = _byteswap_ushort(dwDataIn & 0xffff);
|
2018-12-06 14:52:41 +08:00
|
|
|
if (dwCount == 1) dwDataIn &= 0xff;
|
2018-11-11 12:29:12 +08:00
|
|
|
*(WORD*)pbData = dwDataIn & 0xffff;
|
2018-08-26 03:45:25 +08:00
|
|
|
}
|
2018-12-06 14:52:41 +08:00
|
|
|
else ::memcpy(pbData, (void*)dwDataIn, dwCount);
|
2018-08-26 03:45:25 +08:00
|
|
|
|
2019-10-04 04:00:19 +08:00
|
|
|
if (hp.filter_fun && !hp.filter_fun(pbData, &dwCount, &hp, 0) || dwCount <= 0) goto done;
|
2018-08-26 03:45:25 +08:00
|
|
|
|
2018-12-21 00:46:11 +08:00
|
|
|
if (hp.type & (NO_CONTEXT | FIXING_SPLIT)) dwRetn = 0;
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2020-03-24 09:37:11 +08:00
|
|
|
TextOutput({ GetCurrentProcessId(), address, dwRetn, dwSplit }, buffer, dwCount);
|
2018-12-21 00:46:11 +08:00
|
|
|
#else // _WIN32
|
2019-10-04 04:00:19 +08:00
|
|
|
if (hp.type & HOOK_EMPTY) goto done; // jichi 10/24/2014: dummy hook only for dynamic hook
|
2018-12-21 00:46:11 +08:00
|
|
|
int count = 0;
|
|
|
|
ThreadParam tp = { GetCurrentProcessId(), address, *(uintptr_t*)dwDataBase, 0 }; // first value on stack (if hooked start of function, this is return address)
|
|
|
|
uintptr_t data = *(uintptr_t*)(dwDataBase + hp.offset); // default value
|
|
|
|
|
|
|
|
if (hp.type & USING_SPLIT)
|
|
|
|
{
|
|
|
|
tp.ctx2 = *(uintptr_t*)(dwDataBase + hp.split);
|
|
|
|
if (hp.type & SPLIT_INDIRECT) tp.ctx2 = *(uintptr_t*)(tp.ctx2 + hp.split_index);
|
|
|
|
}
|
|
|
|
if (hp.type & DATA_INDIRECT) data = *(uintptr_t*)(data + hp.index);
|
|
|
|
|
2019-06-09 12:48:30 +08:00
|
|
|
data += hp.padding;
|
2018-12-21 00:46:11 +08:00
|
|
|
count = GetLength(dwDataBase, data);
|
2020-03-24 09:37:11 +08:00
|
|
|
if (count <= 0) goto done;
|
2019-01-23 04:18:28 +08:00
|
|
|
if (count > TEXT_BUFFER_SIZE) count = TEXT_BUFFER_SIZE;
|
2018-12-21 00:46:11 +08:00
|
|
|
if (hp.length_offset == 1)
|
|
|
|
{
|
|
|
|
data &= 0xffff;
|
|
|
|
if ((hp.type & BIG_ENDIAN) && (data >> 8)) data = _byteswap_ushort(data & 0xffff);
|
|
|
|
if (count == 1) data &= 0xff;
|
|
|
|
*(WORD*)pbData = data & 0xffff;
|
|
|
|
}
|
|
|
|
else ::memcpy(pbData, (void*)data, count);
|
|
|
|
|
|
|
|
if (hp.type & (NO_CONTEXT | FIXING_SPLIT)) tp.ctx = 0;
|
|
|
|
|
2020-03-24 09:37:11 +08:00
|
|
|
TextOutput(tp, buffer, count);
|
2018-12-27 02:07:59 +08:00
|
|
|
#endif // _WIN64
|
2018-12-21 00:46:11 +08:00
|
|
|
}
|
|
|
|
__except (EXCEPTION_EXECUTE_HANDLER)
|
|
|
|
{
|
2020-03-05 17:19:04 +08:00
|
|
|
if (!err && !(hp.type & KNOWN_UNSTABLE))
|
2018-12-27 02:07:59 +08:00
|
|
|
{
|
|
|
|
err = true;
|
2020-02-02 10:01:37 +08:00
|
|
|
ConsoleOutput("%s in %s", SEND_ERROR, hp.name);
|
2018-12-27 02:07:59 +08:00
|
|
|
}
|
2018-12-21 00:46:11 +08:00
|
|
|
}
|
2019-10-04 04:00:19 +08:00
|
|
|
done:
|
|
|
|
_InterlockedDecrement(&useCount);
|
2018-12-21 00:46:11 +08:00
|
|
|
}
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-08-26 03:45:25 +08:00
|
|
|
bool TextHook::InsertHookCode()
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-08-26 03:45:25 +08:00
|
|
|
// jichi 9/17/2013: might raise 0xC0000005 AccessViolationException on win7
|
2018-11-01 00:04:32 +08:00
|
|
|
// Artikash 10/30/2018: No, I think that's impossible now that I moved to minhook
|
2018-10-31 08:50:50 +08:00
|
|
|
if (hp.type & MODULE_OFFSET) // Map hook offset to real address
|
2018-10-12 00:58:30 +08:00
|
|
|
if (hp.type & FUNCTION_OFFSET)
|
2018-12-20 15:48:21 +08:00
|
|
|
if (FARPROC function = GetProcAddress(GetModuleHandleW(hp.module), hp.function)) address += (uint64_t)function;
|
2018-11-11 13:34:42 +08:00
|
|
|
else return ConsoleOutput(FUNC_MISSING), false;
|
2018-12-20 15:48:21 +08:00
|
|
|
else if (HMODULE moduleBase = GetModuleHandleW(hp.module)) address += (uint64_t)moduleBase;
|
2018-11-11 13:34:42 +08:00
|
|
|
else return ConsoleOutput(MODULE_MISSING), false;
|
2018-08-26 03:45:25 +08:00
|
|
|
|
2020-03-05 17:19:04 +08:00
|
|
|
VirtualProtect(location, 10, PAGE_EXECUTE_READWRITE, DUMMY);
|
2018-11-11 12:29:12 +08:00
|
|
|
void* original;
|
2019-01-02 07:44:27 +08:00
|
|
|
MH_STATUS error;
|
|
|
|
while ((error = MH_CreateHook(location, trampoline, &original)) != MH_OK)
|
|
|
|
if (error == MH_ERROR_ALREADY_CREATED) RemoveHook(address);
|
|
|
|
else return ConsoleOutput(MH_StatusToString(error)), false;
|
|
|
|
|
|
|
|
*(TextHook**)(common_hook + this_offset) = this;
|
|
|
|
*(void(TextHook::**)(uintptr_t))(common_hook + send_offset) = &TextHook::Send;
|
|
|
|
*(void**)(common_hook + original_offset) = original;
|
2018-12-21 00:46:11 +08:00
|
|
|
memcpy(trampoline, common_hook, sizeof(common_hook));
|
2018-12-20 15:48:21 +08:00
|
|
|
return MH_EnableHook(location) == MH_OK;
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
2018-08-08 03:44:13 +08:00
|
|
|
|
2019-06-09 12:48:30 +08:00
|
|
|
void TextHook::Read()
|
2018-08-08 03:44:13 +08:00
|
|
|
{
|
2020-02-12 15:30:01 +08:00
|
|
|
int dataLen = 1;
|
2020-03-24 09:37:11 +08:00
|
|
|
BYTE(*buffer)[PIPE_BUFFER_SIZE] = &::buffer, *pbData = *buffer + sizeof(ThreadParam);
|
2018-11-05 09:48:27 +08:00
|
|
|
__try
|
2018-08-08 03:44:13 +08:00
|
|
|
{
|
2020-03-24 09:37:11 +08:00
|
|
|
while (WaitForSingleObject(readerEvent, 500) == WAIT_TIMEOUT) if (memcmp(pbData, location, dataLen) != 0) if (int currentLen = HookStrlen((BYTE*)location))
|
2018-08-08 03:44:13 +08:00
|
|
|
{
|
2020-02-12 15:30:01 +08:00
|
|
|
dataLen = min(currentLen, TEXT_BUFFER_SIZE);
|
2020-03-24 09:37:11 +08:00
|
|
|
memcpy(pbData, location, dataLen);
|
2020-02-12 15:30:01 +08:00
|
|
|
TextOutput({ GetCurrentProcessId(), address, 0, 0 }, buffer, dataLen);
|
2018-11-05 09:48:27 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
__except (EXCEPTION_EXECUTE_HANDLER)
|
|
|
|
{
|
2020-02-02 10:01:37 +08:00
|
|
|
ConsoleOutput("%s in %s", READ_ERROR, hp.name);
|
2019-06-09 12:48:30 +08:00
|
|
|
Clear();
|
2018-08-08 03:44:13 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-26 03:45:25 +08:00
|
|
|
bool TextHook::InsertReadCode()
|
2018-08-08 03:44:13 +08:00
|
|
|
{
|
2019-06-09 12:48:30 +08:00
|
|
|
readerThread = CreateThread(nullptr, 0, [](void* This) { ((TextHook*)This)->Read(); return 0UL; }, this, 0, nullptr);
|
2018-12-02 04:53:54 +08:00
|
|
|
readerEvent = CreateEventW(nullptr, FALSE, FALSE, NULL);
|
2018-08-26 03:45:25 +08:00
|
|
|
return true;
|
2018-08-08 03:44:13 +08:00
|
|
|
}
|
2016-01-05 23:01:17 +08:00
|
|
|
|
2018-08-26 03:45:25 +08:00
|
|
|
void TextHook::RemoveHookCode()
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-12-20 15:48:21 +08:00
|
|
|
MH_DisableHook(location);
|
2019-10-04 04:00:19 +08:00
|
|
|
while (useCount != 0);
|
2019-10-02 17:18:34 +08:00
|
|
|
MH_RemoveHook(location);
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2018-08-26 03:45:25 +08:00
|
|
|
void TextHook::RemoveReadCode()
|
2018-08-05 06:01:59 +08:00
|
|
|
{
|
2018-12-02 04:53:54 +08:00
|
|
|
SetEvent(readerEvent);
|
|
|
|
if (GetThreadId(readerThread) != GetCurrentThreadId()) WaitForSingleObject(readerThread, 1000);
|
|
|
|
CloseHandle(readerEvent);
|
|
|
|
CloseHandle(readerThread);
|
2018-08-05 06:01:59 +08:00
|
|
|
}
|
|
|
|
|
2019-06-11 03:06:43 +08:00
|
|
|
void TextHook::Clear()
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2019-06-10 13:49:11 +08:00
|
|
|
if (address == 0) return;
|
2018-08-26 03:45:25 +08:00
|
|
|
if (hp.type & DIRECT_READ) RemoveReadCode();
|
|
|
|
else RemoveHookCode();
|
2019-09-30 20:51:34 +08:00
|
|
|
NotifyHookRemove(address, hp.name);
|
|
|
|
std::scoped_lock lock(viewMutex);
|
2019-09-30 20:32:56 +08:00
|
|
|
memset(&hp, 0, sizeof(HookParam));
|
|
|
|
address = 0;
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2018-12-21 00:46:11 +08:00
|
|
|
int TextHook::GetLength(uintptr_t base, uintptr_t in)
|
2016-01-05 23:01:17 +08:00
|
|
|
{
|
2018-08-26 03:45:25 +08:00
|
|
|
int len;
|
2019-06-18 16:48:48 +08:00
|
|
|
if (hp.length_fun) return hp.length_fun(base, in);
|
2018-08-26 03:45:25 +08:00
|
|
|
switch (hp.length_offset) {
|
|
|
|
default: // jichi 12/26/2013: I should not put this default branch to the end
|
2018-12-21 00:46:11 +08:00
|
|
|
len = *((uintptr_t*)base + hp.length_offset);
|
2018-08-26 03:45:25 +08:00
|
|
|
if (len >= 0) {
|
|
|
|
if (hp.type & USING_UNICODE)
|
|
|
|
len <<= 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else if (len != -1)
|
|
|
|
break;
|
|
|
|
//len == -1 then continue to case 0.
|
|
|
|
case 0:
|
2019-03-28 11:35:22 +08:00
|
|
|
len = HookStrlen((BYTE*)in);
|
2018-08-26 03:45:25 +08:00
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
if (hp.type & USING_UNICODE)
|
|
|
|
len = 2;
|
|
|
|
else {
|
|
|
|
if (hp.type & BIG_ENDIAN)
|
|
|
|
in >>= 8;
|
|
|
|
len = LeadByteTable[in & 0xff]; //Slightly faster than IsDBCSLeadByte
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
// jichi 12/25/2013: This function originally return -1 if failed
|
|
|
|
//return len;
|
|
|
|
return max(0, len);
|
2016-01-05 23:01:17 +08:00
|
|
|
}
|
|
|
|
|
2019-03-28 11:35:22 +08:00
|
|
|
int TextHook::HookStrlen(BYTE* data)
|
|
|
|
{
|
2019-06-16 07:38:44 +08:00
|
|
|
if (!hp.null_length) return hp.type & USING_UNICODE ? wcslen((wchar_t*)data) * 2 : strlen((char*)data);
|
2019-03-28 11:35:22 +08:00
|
|
|
BYTE* orig = data;
|
2019-06-16 07:38:44 +08:00
|
|
|
for (int nullsRemaining = hp.null_length; nullsRemaining > 0; ++data)
|
2019-03-28 11:35:22 +08:00
|
|
|
if (*data == 0) nullsRemaining -= 1;
|
2019-06-16 07:38:44 +08:00
|
|
|
else nullsRemaining = hp.null_length;
|
2019-03-28 11:35:22 +08:00
|
|
|
return data - orig;
|
|
|
|
}
|
|
|
|
|
2016-01-05 23:01:17 +08:00
|
|
|
// EOF
|