]> Dogcows Code - chaz/thecheat/blobdiff - main.m
The Cheat 1.2.4
[chaz/thecheat] / main.m
diff --git a/main.m b/main.m
index 0fcbed4cbc2c6fc5784de57da1aab08ba1261565..444451b79e3400b9a69613a58a81e74759122ff5 100644 (file)
--- a/main.m
+++ b/main.m
 
-// ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-// Project:   «PROJECTNAME»
-//
-// File:      «FILENAME»
-// Created:   «DATE»
-//
-// Copyright: «YEAR» «FULLUSERNAME».  All rights reserved.
-// ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+// **********************************************************************
+// The Cheat - A universal game cheater for Mac OS X
+// (C) 2003-2005 Chaz McGarvey (BrokenZipper)
+// 
+// This program is free software; you can redistribute it and/or modify
+// it under the terms of the GNU General Public License as published by
+// the Free Software Foundation; either version 1, or (at your option)
+// any later version.
+// 
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+// GNU General Public License for more details.
+// 
+// You should have received a copy of the GNU General Public License
+// along with this program; if not, write to the Free Software
+// Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+// 
 
 #import <Cocoa/Cocoa.h>
+#import <Foundation/foundation.h>
+#import <SecurityFoundation/SFAuthorization.h>
+#import <Security/AuthorizationTags.h>
+#include "ChazLog.h"
+#include <sys/types.h>
+#include <sys/uio.h>
+#include <unistd.h>
 
+void authMe(char * FullPathToMe)
+{
+       // get authorization as root
+
+       OSStatus myStatus;
+       
+       // set up Authorization Item
+       AuthorizationItem myItems[1];
+       myItems[0].name = kAuthorizationRightExecute;
+       myItems[0].valueLength = 0;
+       myItems[0].value = NULL;
+       myItems[0].flags = 0;
+       
+       // Set up Authorization Rights
+       AuthorizationRights myRights;
+       myRights.count = sizeof (myItems) / sizeof (myItems[0]);
+       myRights.items = myItems;
+       
+       // set up Authorization Flags
+       AuthorizationFlags myFlags;
+       myFlags =
+               kAuthorizationFlagDefaults |
+               kAuthorizationFlagInteractionAllowed |
+               kAuthorizationFlagExtendRights;
+       
+       // Create an Authorization Ref using Objects above. NOTE: Login bod comes up with this call.
+       AuthorizationRef myAuthorizationRef;
+       myStatus = AuthorizationCreate (&myRights, kAuthorizationEmptyEnvironment, myFlags, &myAuthorizationRef);
+       
+       if (myStatus == errAuthorizationSuccess)
+       {
+               // prepare communication path - used to signal that process is loaded
+               FILE *myCommunicationsPipe = NULL;
+               char myReadBuffer[] = " ";
+
+               // run this app in GOD mode by passing authorization ref and comm pipe (asynchoronous call to external application)
+               myStatus = AuthorizationExecuteWithPrivileges(myAuthorizationRef,FullPathToMe,kAuthorizationFlagDefaults,nil,&myCommunicationsPipe);
+
+               // external app is running asynchronously - it will send to stdout when loaded
+               if (myStatus == errAuthorizationSuccess)
+               {
+                       read (fileno (myCommunicationsPipe), myReadBuffer, sizeof (myReadBuffer));
+                       fclose(myCommunicationsPipe);
+               }
+               
+               // release authorization reference
+               myStatus = AuthorizationFree (myAuthorizationRef, kAuthorizationFlagDestroyRights);
+       }
+}
+
+bool checkExecutablePermissions(void)
+{
+       NSDictionary    *applicationAttributes = [[NSFileManager defaultManager] fileAttributesAtPath:[[NSBundle mainBundle] executablePath] traverseLink: YES];
+       
+       // We expect 2755 as octal (1517 as decimal, -rwxr-sr-x as extended notation)
+       return ([applicationAttributes filePosixPermissions] == 1517 && [[applicationAttributes fileGroupOwnerAccountName] isEqualToString: @"procmod"]);
+}
+
+bool amIWorthy(void)
+{
+       // running as root?
+       AuthorizationRef myAuthRef;
+       OSStatus stat = AuthorizationCopyPrivilegedReference(&myAuthRef,kAuthorizationFlagDefaults);
+       
+       return stat == errAuthorizationSuccess || checkExecutablePermissions();
+}
 
-int main( int argc, const char *argv[] )
+int main( int argc, char *argv[] )
 {
-       return NSApplicationMain(argc, argv);
+       NSAutoreleasePool *pool = [[NSAutoreleasePool alloc] init];
+       
+       ChazLogDisable();
+       
+       ChazDebugSetup();
+       ChazMapLogToDebug();
+       
+#ifdef __ppc__
+       // PPC machines whose operating system is below leopard do not need authorization
+       SInt32 osxMajorVersion;
+       Gestalt(gestaltSystemVersionMinor, &osxMajorVersion);
+       if (osxMajorVersion < 5)
+       {
+               [pool release];
+               return NSApplicationMain(argc,  (const char **) argv);
+       }
+#endif
+       
+       if (amIWorthy())
+       {
+#ifndef _DEBUG
+               printf("Don't forget to flush! ;-) "); // signal back to close caller
+#endif
+               fflush(stdout);
+               
+               [pool release];
+               return NSApplicationMain(argc,  (const char **) argv);
+       }
+       else
+       {
+               authMe(argv[0]);
+               [pool release];
+               return 0;
+       }
+       
+       ChazDebugCleanup();
 }
\ No newline at end of file
This page took 0.022106 seconds and 4 git commands to generate.