diff --git a/platform/config.c b/platform/config.c index ad97905..f2eea12 100644 --- a/platform/config.c +++ b/platform/config.c @@ -23,6 +23,7 @@ #include "platform/platform.h" #include "platform/vfs.h" #include "platform/system.h" +#include "platform/opensslpatch.h" void platform_config_load(struct platform_config *cfg, const wchar_t *filename) { @@ -41,6 +42,7 @@ void platform_config_load(struct platform_config *cfg, const wchar_t *filename) nusec_config_load(&cfg->nusec, filename); vfs_config_load(&cfg->vfs, filename); system_config_load(&cfg->system, filename); + openssl_patch_config_load(&cfg->openssl, filename); } void amvideo_config_load(struct amvideo_config *cfg, const wchar_t *filename) @@ -355,3 +357,16 @@ void epay_config_load(struct epay_config *cfg, const wchar_t *filename) cfg->enable = GetPrivateProfileIntW(L"epay", L"enable", 1, filename); } + +void openssl_patch_config_load(struct openssl_patch_config *cfg, const wchar_t *filename) +{ + assert(cfg != NULL); + assert(filename != NULL); + + cfg->enable = GetPrivateProfileIntW( + L"openssl", + L"enable", + 1, + filename + ); +} diff --git a/platform/config.h b/platform/config.h index e945378..9f1f7f4 100644 --- a/platform/config.h +++ b/platform/config.h @@ -36,3 +36,4 @@ void nusec_config_load(struct nusec_config *cfg, const wchar_t *filename); void pcbid_config_load(struct pcbid_config *cfg, const wchar_t *filename); void vfs_config_load(struct vfs_config *cfg, const wchar_t *filename); void system_config_load(struct system_config *cfg, const wchar_t *filename); +void openssl_patch_config_load(struct openssl_patch_config *cfg, const wchar_t *filename); \ No newline at end of file diff --git a/platform/meson.build b/platform/meson.build index aa0d362..a00df6b 100644 --- a/platform/meson.build +++ b/platform/meson.build @@ -36,5 +36,7 @@ platform_lib = static_library( 'vfs.h', 'system.c', 'system.h', + 'opensslpatch.c', + 'opensslpatch.h', ], ) diff --git a/platform/opensslpatch.c b/platform/opensslpatch.c new file mode 100644 index 0000000..bebbaf9 --- /dev/null +++ b/platform/opensslpatch.c @@ -0,0 +1,103 @@ +#include +#include +#include +#include "util/dprintf.h" +#include "platform/opensslpatch.h" + +static char* get_cpu_name() { + FILE* fp; + char buffer[128]; + char* cpu_info = NULL; + + fp = _popen("wmic cpu get Name", "r"); + + if (fp == NULL) { + return NULL; + } + + fgets(buffer, sizeof(buffer), fp); + + if (fgets(buffer, sizeof(buffer), fp) != NULL) { + cpu_info = (char*)malloc(strlen(buffer) + 1); + strcpy(cpu_info, buffer); + } + _pclose(fp); + + if (cpu_info != NULL) { + cpu_info[strcspn(cpu_info, "\r\n")] = 0; + } + + return cpu_info; +} + +static int check_cpu(char* cpuname) { + if (strstr(cpuname, "Core 2 Duo") || strstr(cpuname, "Core 2 Quad") || + (strstr(cpuname, "Pentium") && !strstr(cpuname, "G")) || strstr(cpuname, "Celeron")) { + return 0; + } + + if (strstr(cpuname, "Intel")) { + char* part = strtok(cpuname, " "); + while (part != NULL) { + if (part[0] == 'i' && strlen(part) >= 4) { + int gen = atoi(part + 1); + if (gen >= 10) { + dprintf("OpenSSL Patch: Intel Gen 10+ CPU Detected: %s\n", cpuname); + return 1; + } + } else if (part[0] == 'G' && strlen(part) >= 4) { + int pentium = atoi(part + 1); + if (pentium / 1000 >= 6) { + dprintf("OpenSSL Patch: Intel Gen 10+ CPU Detected: %s\n", cpuname); + return 1; + } + } + part = strtok(NULL, " "); + } + } + + return 0; +} + +static void openssl_patch(void) { + const char* variablename = "OPENSSL_ia32cap"; + const char* variablevalue = "~0x20000000"; + + HKEY hKey; + if (RegOpenKeyExA(HKEY_CURRENT_USER, "Environment", 0, KEY_SET_VALUE, &hKey) == ERROR_SUCCESS) { + if (RegSetValueExA(hKey, variablename, 0, REG_SZ, (const BYTE*)variablevalue, strlen(variablevalue) + 1) == ERROR_SUCCESS) { + dprintf("OpenSSL Patch: Applied successfully, set the user environment variable %s to %s\n", variablename, variablevalue); + } else { + dprintf("OpenSSL Patch: Error: Failed to set the user environment variable.\n"); + } + + RegCloseKey(hKey); + + SendMessageTimeoutA(HWND_BROADCAST, WM_SETTINGCHANGE, 0, (LPARAM)"Environment", SMTO_ABORTIFHUNG, 5000, NULL); + } else { + dprintf("OpenSSL Patch: Error: Failed to open the user environment registry key.\n"); + } +} + +HRESULT openssl_patch_apply(const struct openssl_patch_config *cfg) { + HRESULT hr; + + assert(cfg != NULL); + + if (!cfg->enable) { + return S_FALSE; + } + + char* cpuname = get_cpu_name(); + if (cpuname == NULL) { + dprintf("OpenSSL Patch: Error: Unable to detect CPU.\n"); + return S_FALSE; + } + + if (check_cpu(cpuname)) { + openssl_patch(); + } + + free(cpuname); + return S_OK; +} \ No newline at end of file diff --git a/platform/opensslpatch.h b/platform/opensslpatch.h new file mode 100644 index 0000000..f97d9b7 --- /dev/null +++ b/platform/opensslpatch.h @@ -0,0 +1,7 @@ +#pragma once + +struct openssl_patch_config { + int enable; +}; + +HRESULT openssl_patch_apply(const struct openssl_patch_config *cfg); diff --git a/platform/platform.c b/platform/platform.c index a769c97..c61c031 100644 --- a/platform/platform.c +++ b/platform/platform.c @@ -14,6 +14,7 @@ #include "platform/platform.h" #include "platform/vfs.h" #include "platform/system.h" +#include "platform/opensslpatch.h" HRESULT platform_hook_init( const struct platform_config *cfg, @@ -28,6 +29,12 @@ HRESULT platform_hook_init( assert(platform_id != NULL); assert(redir_mod != NULL); + hr = openssl_patch_apply(&cfg->openssl); + + if (FAILED(hr)) { + return hr; + } + hr = amvideo_hook_init(&cfg->amvideo, redir_mod); if (FAILED(hr)) { diff --git a/platform/platform.h b/platform/platform.h index 0b69f12..4972bfe 100644 --- a/platform/platform.h +++ b/platform/platform.h @@ -14,6 +14,7 @@ #include "platform/pcbid.h" #include "platform/vfs.h" #include "platform/system.h" +#include "platform/opensslpatch.h" struct platform_config { struct amvideo_config amvideo; @@ -28,6 +29,7 @@ struct platform_config { struct nusec_config nusec; struct vfs_config vfs; struct system_config system; + struct openssl_patch_config openssl; }; HRESULT platform_hook_init(