Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2009 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 17 | // See imgdiff.cpp in this directory for a description of the patch file |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 18 | // format. |
| 19 | |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 20 | #include <applypatch/imgpatch.h> |
| 21 | |
| 22 | #include <errno.h> |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 23 | #include <stdio.h> |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 24 | #include <string.h> |
Mark Salyzyn | f3bb31c | 2014-03-14 09:39:48 -0700 | [diff] [blame] | 25 | #include <sys/cdefs.h> |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 26 | #include <sys/stat.h> |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 27 | #include <unistd.h> |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 28 | |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 29 | #include <memory> |
Tianjie Xu | aced5d9 | 2016-10-12 10:55:04 -0700 | [diff] [blame] | 30 | #include <string> |
Yabin Cui | d483c20 | 2016-02-03 17:08:52 -0800 | [diff] [blame] | 31 | #include <vector> |
| 32 | |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 33 | #include <android-base/logging.h> |
| 34 | #include <android-base/memory.h> |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 35 | #include <applypatch/applypatch.h> |
| 36 | #include <applypatch/imgdiff.h> |
| 37 | #include <openssl/sha.h> |
| 38 | #include <zlib.h> |
| 39 | |
Tao Bao | 38d78d1 | 2017-10-09 11:03:38 -0700 | [diff] [blame] | 40 | #include "edify/expr.h" |
Tianjie Xu | 9e1ccd4 | 2018-04-25 17:19:20 -0700 | [diff] [blame] | 41 | #include "otautil/print_sha1.h" |
Tao Bao | 38d78d1 | 2017-10-09 11:03:38 -0700 | [diff] [blame] | 42 | |
Tianjie Xu | 12b9055 | 2017-03-07 14:44:14 -0800 | [diff] [blame] | 43 | static inline int64_t Read8(const void *address) { |
| 44 | return android::base::get_unaligned<int64_t>(address); |
| 45 | } |
| 46 | |
| 47 | static inline int32_t Read4(const void *address) { |
| 48 | return android::base::get_unaligned<int32_t>(address); |
| 49 | } |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 50 | |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 51 | // This function is a wrapper of ApplyBSDiffPatch(). It has a custom sink function to deflate the |
| 52 | // patched data and stream the deflated data to output. |
| 53 | static bool ApplyBSDiffPatchAndStreamOutput(const uint8_t* src_data, size_t src_len, |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 54 | const Value& patch, size_t patch_offset, |
Tao Bao | 8b0b0f1 | 2018-04-19 21:02:13 -0700 | [diff] [blame] | 55 | const char* deflate_header, SinkFn sink) { |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 56 | size_t expected_target_length = static_cast<size_t>(Read8(deflate_header + 32)); |
| 57 | int level = Read4(deflate_header + 40); |
| 58 | int method = Read4(deflate_header + 44); |
| 59 | int window_bits = Read4(deflate_header + 48); |
| 60 | int mem_level = Read4(deflate_header + 52); |
| 61 | int strategy = Read4(deflate_header + 56); |
| 62 | |
Tianjie Xu | 3f638ee | 2018-04-26 17:23:23 -0700 | [diff] [blame] | 63 | // TODO(b/67849209) Remove after debugging the unit test flakiness. |
| 64 | if (android::base::GetMinimumLogSeverity() <= android::base::LogSeverity::DEBUG) { |
| 65 | LOG(DEBUG) << "zlib version " << zlibVersion(); |
| 66 | } |
| 67 | |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 68 | z_stream strm; |
| 69 | strm.zalloc = Z_NULL; |
| 70 | strm.zfree = Z_NULL; |
| 71 | strm.opaque = Z_NULL; |
| 72 | strm.avail_in = 0; |
| 73 | strm.next_in = nullptr; |
| 74 | int ret = deflateInit2(&strm, level, method, window_bits, mem_level, strategy); |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 75 | if (ret != Z_OK) { |
| 76 | LOG(ERROR) << "Failed to init uncompressed data deflation: " << ret; |
| 77 | return false; |
| 78 | } |
| 79 | |
| 80 | // Define a custom sink wrapper that feeds to bspatch. It deflates the available patch data on |
| 81 | // the fly and outputs the compressed data to the given sink. |
| 82 | size_t actual_target_length = 0; |
| 83 | size_t total_written = 0; |
| 84 | static constexpr size_t buffer_size = 32768; |
Tianjie Xu | 9e1ccd4 | 2018-04-25 17:19:20 -0700 | [diff] [blame] | 85 | SHA_CTX sha_ctx; |
| 86 | SHA1_Init(&sha_ctx); |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 87 | auto compression_sink = [&strm, &actual_target_length, &expected_target_length, &total_written, |
Tianjie Xu | 9e1ccd4 | 2018-04-25 17:19:20 -0700 | [diff] [blame] | 88 | &ret, &sink, &sha_ctx](const uint8_t* data, size_t len) -> size_t { |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 89 | // The input patch length for an update never exceeds INT_MAX. |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 90 | strm.avail_in = len; |
| 91 | strm.next_in = data; |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 92 | do { |
| 93 | std::vector<uint8_t> buffer(buffer_size); |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 94 | strm.avail_out = buffer_size; |
| 95 | strm.next_out = buffer.data(); |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 96 | if (actual_target_length + len < expected_target_length) { |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 97 | ret = deflate(&strm, Z_NO_FLUSH); |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 98 | } else { |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 99 | ret = deflate(&strm, Z_FINISH); |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 100 | } |
| 101 | if (ret != Z_OK && ret != Z_STREAM_END) { |
| 102 | LOG(ERROR) << "Failed to deflate stream: " << ret; |
| 103 | // zero length indicates an error in the sink function of bspatch(). |
| 104 | return 0; |
| 105 | } |
| 106 | |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 107 | size_t have = buffer_size - strm.avail_out; |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 108 | total_written += have; |
| 109 | if (sink(buffer.data(), have) != have) { |
| 110 | LOG(ERROR) << "Failed to write " << have << " compressed bytes to output."; |
| 111 | return 0; |
| 112 | } |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 113 | } while ((strm.avail_in != 0 || strm.avail_out == 0) && ret != Z_STREAM_END); |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 114 | |
Tianjie Xu | 3f638ee | 2018-04-26 17:23:23 -0700 | [diff] [blame] | 115 | // TODO(b/67849209) Remove after debugging the unit test flakiness. |
| 116 | if (android::base::GetMinimumLogSeverity() <= android::base::LogSeverity::DEBUG) { |
| 117 | SHA1_Update(&sha_ctx, data, len); |
| 118 | } |
| 119 | |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 120 | actual_target_length += len; |
| 121 | return len; |
| 122 | }; |
| 123 | |
Tao Bao | 8b0b0f1 | 2018-04-19 21:02:13 -0700 | [diff] [blame] | 124 | int bspatch_result = ApplyBSDiffPatch(src_data, src_len, patch, patch_offset, compression_sink); |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 125 | deflateEnd(&strm); |
| 126 | |
Tianjie Xu | 9e1ccd4 | 2018-04-25 17:19:20 -0700 | [diff] [blame] | 127 | if (android::base::GetMinimumLogSeverity() <= android::base::LogSeverity::DEBUG) { |
| 128 | uint8_t digest[SHA_DIGEST_LENGTH]; |
| 129 | SHA1_Final(digest, &sha_ctx); |
| 130 | LOG(DEBUG) << "sha1 of " << actual_target_length << " bytes input data: " << short_sha1(digest); |
| 131 | } |
Tao Bao | fdec103 | 2017-10-24 12:25:41 -0700 | [diff] [blame] | 132 | if (bspatch_result != 0) { |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 133 | return false; |
| 134 | } |
| 135 | |
| 136 | if (ret != Z_STREAM_END) { |
| 137 | LOG(ERROR) << "ret is expected to be Z_STREAM_END, but it's " << ret; |
| 138 | return false; |
| 139 | } |
| 140 | |
| 141 | if (expected_target_length != actual_target_length) { |
| 142 | LOG(ERROR) << "target length is expected to be " << expected_target_length << ", but it's " |
| 143 | << actual_target_length; |
| 144 | return false; |
| 145 | } |
| 146 | LOG(DEBUG) << "bspatch writes " << total_written << " bytes in total to streaming output."; |
| 147 | |
| 148 | return true; |
| 149 | } |
| 150 | |
Tao Bao | f7eb760 | 2017-03-27 15:12:48 -0700 | [diff] [blame] | 151 | int ApplyImagePatch(const unsigned char* old_data, size_t old_size, const unsigned char* patch_data, |
Tao Bao | c0e1c46 | 2017-02-01 10:20:10 -0800 | [diff] [blame] | 152 | size_t patch_size, SinkFn sink) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 153 | Value patch(VAL_BLOB, std::string(reinterpret_cast<const char*>(patch_data), patch_size)); |
Tao Bao | 8b0b0f1 | 2018-04-19 21:02:13 -0700 | [diff] [blame] | 154 | return ApplyImagePatch(old_data, old_size, patch, sink, nullptr); |
Sen Jiang | 0cce9cd | 2016-01-22 20:49:07 +0800 | [diff] [blame] | 155 | } |
| 156 | |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 157 | int ApplyImagePatch(const unsigned char* old_data, size_t old_size, const Value& patch, SinkFn sink, |
Tao Bao | 8b0b0f1 | 2018-04-19 21:02:13 -0700 | [diff] [blame] | 158 | const Value* bonus_data) { |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 159 | if (patch.data.size() < 12) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 160 | printf("patch too short to contain header\n"); |
| 161 | return -1; |
| 162 | } |
| 163 | |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 164 | // IMGDIFF2 uses CHUNK_NORMAL, CHUNK_DEFLATE, and CHUNK_RAW. (IMGDIFF1, which is no longer |
| 165 | // supported, used CHUNK_NORMAL and CHUNK_GZIP.) |
| 166 | const char* const patch_header = patch.data.data(); |
| 167 | if (memcmp(patch_header, "IMGDIFF2", 8) != 0) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 168 | printf("corrupt patch file header (magic number)\n"); |
| 169 | return -1; |
| 170 | } |
| 171 | |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 172 | int num_chunks = Read4(patch_header + 8); |
| 173 | size_t pos = 12; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 174 | for (int i = 0; i < num_chunks; ++i) { |
| 175 | // each chunk's header record starts with 4 bytes. |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 176 | if (pos + 4 > patch.data.size()) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 177 | printf("failed to read chunk %d record\n", i); |
| 178 | return -1; |
| 179 | } |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 180 | int type = Read4(patch_header + pos); |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 181 | pos += 4; |
| 182 | |
| 183 | if (type == CHUNK_NORMAL) { |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 184 | const char* normal_header = patch_header + pos; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 185 | pos += 24; |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 186 | if (pos > patch.data.size()) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 187 | printf("failed to read chunk %d normal header data\n", i); |
Doug Zongker | c4351c7 | 2010-02-22 14:46:32 -0800 | [diff] [blame] | 188 | return -1; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 189 | } |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 190 | |
Tianjie Xu | 12b9055 | 2017-03-07 14:44:14 -0800 | [diff] [blame] | 191 | size_t src_start = static_cast<size_t>(Read8(normal_header)); |
| 192 | size_t src_len = static_cast<size_t>(Read8(normal_header + 8)); |
| 193 | size_t patch_offset = static_cast<size_t>(Read8(normal_header + 16)); |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 194 | |
Tao Bao | f7eb760 | 2017-03-27 15:12:48 -0700 | [diff] [blame] | 195 | if (src_start + src_len > old_size) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 196 | printf("source data too short\n"); |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 197 | return -1; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 198 | } |
Tao Bao | 8b0b0f1 | 2018-04-19 21:02:13 -0700 | [diff] [blame] | 199 | if (ApplyBSDiffPatch(old_data + src_start, src_len, patch, patch_offset, sink) != 0) { |
Jinguang Dong | 391bb7b | 2017-04-26 10:40:45 +0800 | [diff] [blame] | 200 | printf("Failed to apply bsdiff patch.\n"); |
| 201 | return -1; |
| 202 | } |
Tianjie Xu | ffed57a | 2018-04-23 17:51:45 -0700 | [diff] [blame] | 203 | |
| 204 | LOG(DEBUG) << "Processed chunk type normal"; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 205 | } else if (type == CHUNK_RAW) { |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 206 | const char* raw_header = patch_header + pos; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 207 | pos += 4; |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 208 | if (pos > patch.data.size()) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 209 | printf("failed to read chunk %d raw header data\n", i); |
| 210 | return -1; |
| 211 | } |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 212 | |
Tao Bao | f7eb760 | 2017-03-27 15:12:48 -0700 | [diff] [blame] | 213 | size_t data_len = static_cast<size_t>(Read4(raw_header)); |
Doug Zongker | c4351c7 | 2010-02-22 14:46:32 -0800 | [diff] [blame] | 214 | |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 215 | if (pos + data_len > patch.data.size()) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 216 | printf("failed to read chunk %d raw data\n", i); |
| 217 | return -1; |
| 218 | } |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 219 | if (sink(reinterpret_cast<const unsigned char*>(patch_header + pos), data_len) != data_len) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 220 | printf("failed to write chunk %d raw data\n", i); |
| 221 | return -1; |
| 222 | } |
| 223 | pos += data_len; |
Tianjie Xu | ffed57a | 2018-04-23 17:51:45 -0700 | [diff] [blame] | 224 | |
| 225 | LOG(DEBUG) << "Processed chunk type raw"; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 226 | } else if (type == CHUNK_DEFLATE) { |
| 227 | // deflate chunks have an additional 60 bytes in their chunk header. |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 228 | const char* deflate_header = patch_header + pos; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 229 | pos += 60; |
Tao Bao | 1e0941f | 2017-11-10 11:49:53 -0800 | [diff] [blame] | 230 | if (pos > patch.data.size()) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 231 | printf("failed to read chunk %d deflate header data\n", i); |
| 232 | return -1; |
| 233 | } |
| 234 | |
Tianjie Xu | 12b9055 | 2017-03-07 14:44:14 -0800 | [diff] [blame] | 235 | size_t src_start = static_cast<size_t>(Read8(deflate_header)); |
| 236 | size_t src_len = static_cast<size_t>(Read8(deflate_header + 8)); |
| 237 | size_t patch_offset = static_cast<size_t>(Read8(deflate_header + 16)); |
| 238 | size_t expanded_len = static_cast<size_t>(Read8(deflate_header + 24)); |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 239 | |
Tao Bao | f7eb760 | 2017-03-27 15:12:48 -0700 | [diff] [blame] | 240 | if (src_start + src_len > old_size) { |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 241 | printf("source data too short\n"); |
| 242 | return -1; |
| 243 | } |
| 244 | |
| 245 | // Decompress the source data; the chunk header tells us exactly |
| 246 | // how big we expect it to be when decompressed. |
| 247 | |
| 248 | // Note: expanded_len will include the bonus data size if |
| 249 | // the patch was constructed with bonus data. The |
| 250 | // deflation will come up 'bonus_size' bytes short; these |
| 251 | // must be appended from the bonus_data value. |
| 252 | size_t bonus_size = (i == 1 && bonus_data != NULL) ? bonus_data->data.size() : 0; |
| 253 | |
| 254 | std::vector<unsigned char> expanded_source(expanded_len); |
| 255 | |
| 256 | // inflate() doesn't like strm.next_out being a nullptr even with |
| 257 | // avail_out being zero (Z_STREAM_ERROR). |
| 258 | if (expanded_len != 0) { |
| 259 | z_stream strm; |
| 260 | strm.zalloc = Z_NULL; |
| 261 | strm.zfree = Z_NULL; |
| 262 | strm.opaque = Z_NULL; |
| 263 | strm.avail_in = src_len; |
Tao Bao | 087bc0c | 2017-01-19 10:46:39 -0800 | [diff] [blame] | 264 | strm.next_in = old_data + src_start; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 265 | strm.avail_out = expanded_len; |
| 266 | strm.next_out = expanded_source.data(); |
| 267 | |
| 268 | int ret = inflateInit2(&strm, -15); |
| 269 | if (ret != Z_OK) { |
| 270 | printf("failed to init source inflation: %d\n", ret); |
| 271 | return -1; |
Doug Zongker | c4351c7 | 2010-02-22 14:46:32 -0800 | [diff] [blame] | 272 | } |
Doug Zongker | c4351c7 | 2010-02-22 14:46:32 -0800 | [diff] [blame] | 273 | |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 274 | // Because we've provided enough room to accommodate the output |
| 275 | // data, we expect one call to inflate() to suffice. |
| 276 | ret = inflate(&strm, Z_SYNC_FLUSH); |
| 277 | if (ret != Z_STREAM_END) { |
| 278 | printf("source inflation returned %d\n", ret); |
| 279 | return -1; |
Doug Zongker | c4351c7 | 2010-02-22 14:46:32 -0800 | [diff] [blame] | 280 | } |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 281 | // We should have filled the output buffer exactly, except |
| 282 | // for the bonus_size. |
| 283 | if (strm.avail_out != bonus_size) { |
| 284 | printf("source inflation short by %zu bytes\n", strm.avail_out - bonus_size); |
| 285 | return -1; |
| 286 | } |
| 287 | inflateEnd(&strm); |
Doug Zongker | c4351c7 | 2010-02-22 14:46:32 -0800 | [diff] [blame] | 288 | |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 289 | if (bonus_size) { |
| 290 | memcpy(expanded_source.data() + (expanded_len - bonus_size), &bonus_data->data[0], |
| 291 | bonus_size); |
| 292 | } |
| 293 | } |
| 294 | |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 295 | if (!ApplyBSDiffPatchAndStreamOutput(expanded_source.data(), expanded_len, patch, |
Tao Bao | 8b0b0f1 | 2018-04-19 21:02:13 -0700 | [diff] [blame] | 296 | patch_offset, deflate_header, sink)) { |
Tianjie Xu | a897f95 | 2017-05-17 22:41:55 -0700 | [diff] [blame] | 297 | LOG(ERROR) << "Fail to apply streaming bspatch."; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 298 | return -1; |
| 299 | } |
| 300 | |
Tianjie Xu | ffed57a | 2018-04-23 17:51:45 -0700 | [diff] [blame] | 301 | LOG(DEBUG) << "Processed chunk type deflate"; |
Tao Bao | 97555da | 2016-12-15 10:15:06 -0800 | [diff] [blame] | 302 | } else { |
| 303 | printf("patch chunk %d is unknown type %d\n", i, type); |
| 304 | return -1; |
| 305 | } |
| 306 | } |
| 307 | |
| 308 | return 0; |
Doug Zongker | 512536a | 2010-02-17 16:11:44 -0800 | [diff] [blame] | 309 | } |