summaryrefslogtreecommitdiffstats
path: root/other-licenses/7zstub/mozilla_customizations.diff
blob: 6680a6f8931196c63f7e072268e1ab54dd59e152 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
diff --git a/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/SFXSetup.dsp b/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/SFXSetup.dsp
--- a/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/SFXSetup.dsp
+++ b/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/SFXSetup.dsp
@@ -54,7 +54,7 @@ BSC32=bscmake.exe
 # ADD BSC32 /nologo
 LINK32=link.exe
 # ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:windows /machine:I386
-# ADD LINK32 comctl32.lib kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:windows /machine:I386 /out:"C:\Util\7zS.sfx" /opt:NOWIN98
+# ADD LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib delayimp.lib /nologo /subsystem:windows /machine:I386 /out:"Release\7zS.sfx" /opt:NOWIN98 /delayload:user32.dll /delayload:shell32.dll /delayload:oleaut32.dll
 # SUBTRACT LINK32 /pdb:none
 
 !ELSEIF  "$(CFG)" == "SFXSetup - Win32 Debug"
@@ -81,7 +81,7 @@ BSC32=bscmake.exe
 # ADD BSC32 /nologo
 LINK32=link.exe
 # ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:windows /debug /machine:I386 /pdbtype:sept
-# ADD LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib comctl32.lib /nologo /subsystem:windows /debug /machine:I386 /out:"C:\UTIL\7zSfxS.exe" /pdbtype:sept
+# ADD LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib delayimp.lib /nologo /subsystem:windows /debug /machine:I386 /out:"Debug\7zSfxS.exe" /pdbtype:sept /delayload:user32.dll /delayload:shell32.dll /delayload:oleaut32.dll
 
 !ELSEIF  "$(CFG)" == "SFXSetup - Win32 ReleaseD"
 
@@ -107,9 +107,9 @@ BSC32=bscmake.exe
 # ADD BASE BSC32 /nologo
 # ADD BSC32 /nologo
 LINK32=link.exe
-# ADD BASE LINK32 comctl32.lib kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:windows /machine:I386 /out:"C:\UTIL\7zWinSR.exe"
+# ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:windows /machine:I386 /out:"C:\UTIL\7zWinSR.exe"
 # SUBTRACT BASE LINK32 /debug /nodefaultlib
-# ADD LINK32 comctl32.lib kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /subsystem:windows /machine:I386 /out:"C:\Util\7zSD.sfx" /opt:NOWIN98
+# ADD LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib delayimp.lib /nologo /subsystem:windows /machine:I386 /out:"ReleaseD\7zSD.sfx" /opt:NOWIN98 /delayload:user32.dll /delayload:shell32.dll /delayload:oleaut32.dll
 # SUBTRACT LINK32 /pdb:none
 
 !ENDIF 
diff --git a/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/SfxSetup.cpp b/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/SfxSetup.cpp
--- a/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/SfxSetup.cpp
+++ b/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/SfxSetup.cpp
@@ -27,6 +27,10 @@
 
 #include "resource.h"
 
+/* BEGIN Mozilla customizations */
+#include "../../../Common/IntToString.h"
+/* END Mozilla customizations */
+
 using namespace NWindows;
 using namespace NFile;
 using namespace NDir;
@@ -125,6 +129,398 @@ static void ShowErrorMessageSpec(const U
   ShowErrorMessage(NULL, message);
 }
 
+/* BEGIN Mozilla customizations */
+
+static char const *
+FindStrInBuf(char const * buf, size_t bufLen, char const * str)
+{
+  size_t index = 0;
+  while (index < bufLen) {
+    char const * result = strstr(buf + index, str);
+    if (result) {
+      return result;
+    }
+    while ((buf[index] != '\0') && (index < bufLen)) {
+      index++;
+    }
+    index++;
+  }
+  return NULL;
+}
+
+static bool
+ReadPostSigningDataFromView(char const * view, DWORD size, AString& data)
+{
+  // Find the offset and length of the certificate table,
+  // so we know the valid range to look for the token.
+  if (size < (0x3c + sizeof(UInt32))) {
+    return false;
+  }
+  UInt32 PEHeaderOffset = *(UInt32*)(view + 0x3c);
+  UInt32 optionalHeaderOffset = PEHeaderOffset + 24;
+  UInt32 certDirEntryOffset = 0;
+  if (size < (optionalHeaderOffset + sizeof(UInt16))) {
+    return false;
+  }
+  UInt16 magic = *(UInt16*)(view + optionalHeaderOffset);
+  if (magic == 0x010b) {
+    // 32-bit executable
+    certDirEntryOffset = optionalHeaderOffset + 128;
+  } else if (magic == 0x020b) {
+    // 64-bit executable; certain header fields are wider
+    certDirEntryOffset = optionalHeaderOffset + 144;
+  } else {
+    // Unknown executable
+    return false;
+  }
+  if (size < certDirEntryOffset + 8) {
+    return false;
+  }
+  UInt32 certTableOffset = *(UInt32*)(view + certDirEntryOffset);
+  UInt32 certTableLen = *(UInt32*)(view + certDirEntryOffset + sizeof(UInt32));
+  if (certTableOffset == 0 || certTableLen == 0 ||
+      size < (certTableOffset + certTableLen)) {
+    return false;
+  }
+
+  char const token[] = "__MOZCUSTOM__:";
+  // We're searching for a string inside a binary blob,
+  // so a normal strstr that bails on the first NUL won't work.
+  char const * tokenPos = FindStrInBuf(view + certTableOffset,
+                                       certTableLen, token);
+  if (tokenPos) {
+    size_t tokenLen = (sizeof(token) / sizeof(token[0])) - 1;
+    data = AString(tokenPos + tokenLen);
+    return true;
+  }
+  return false;
+}
+
+static bool
+ReadPostSigningData(UString exePath, AString& data)
+{
+  bool retval = false;
+  HANDLE exeFile = CreateFileW(exePath, GENERIC_READ, FILE_SHARE_READ, NULL,
+                               OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
+  if (exeFile != INVALID_HANDLE_VALUE) {
+    HANDLE mapping = CreateFileMapping(exeFile, NULL, PAGE_READONLY, 0, 0, NULL);
+    if (mapping != INVALID_HANDLE_VALUE) {
+      // MSDN claims the return value on failure is NULL,
+      // but I've also seen it returned on success, so double-check.
+      if (mapping || GetLastError() == ERROR_SUCCESS) {
+        char * view = (char*)MapViewOfFile(mapping, FILE_MAP_READ, 0, 0, 0);
+        if (view) {
+          DWORD fileSize = GetFileSize(exeFile, NULL);
+          retval = ReadPostSigningDataFromView(view, fileSize, data);
+        }
+        CloseHandle(mapping);
+      }
+    }
+    CloseHandle(exeFile);
+  }
+  return retval;
+}
+
+// Simple class for allocating a character buffer and automatically freeing it
+// when it goes out of scope.
+class AutoCharBuffer {
+private:
+  char *buffer;
+
+  void Alloc(UInt32 size) {
+    buffer = new char[size];
+    length = 0;
+  }
+public:
+  // Other than being reset when the buffer is deallocated/reallocated, this
+  // isn't updated by this class.
+  UInt32 length;
+
+  AutoCharBuffer()
+  : length(0)
+  , buffer(NULL) {}
+
+  AutoCharBuffer(UInt32 size) {
+    Alloc(size);
+  }
+
+  void Realloc(UInt32 size) {
+    delete [] buffer;
+    Alloc(size);
+  }
+
+  void Dealloc() {
+    delete [] buffer;
+    buffer = NULL;
+    length = 0;
+  }
+
+  virtual ~AutoCharBuffer() {
+    Dealloc();
+  }
+
+  char *Buffer() {
+    return buffer;
+  }
+};
+
+static void
+AppendStringValueToIni(AString& iniData, const char* key, const char* value) {
+  iniData += key;
+  iniData += '=';
+  iniData += value;
+  iniData += '\n';
+}
+
+static void
+AppendDwordValueToIni(AString& iniData, const char* key, DWORD intValue) {
+  AString stringValue;
+  stringValue.Add_UInt32(intValue);
+  AppendStringValueToIni(iniData, key, stringValue.Ptr());
+}
+
+static void
+AppendQwordValueToIni(AString& iniData, const char* key, LONGLONG intValue) {
+  // The implementations for `Convert<int_type>ToString` are a little wonky and
+  // expect the output buffer to just be the correct size. To make sure we are
+  // using it right here, this int conversion implementation was copied from
+  // `CStdOutStream::operator<<(Int64 number)` in `StdOutStream.cpp`.
+  char stringValue[32];
+  ConvertInt64ToString(intValue, stringValue);
+  AppendStringValueToIni(iniData, key, stringValue);
+}
+
+static void
+ReadExeFileSystemIntoIniData(const UString &exePath, AString& iniData) {
+  const char* fsKey = "fileSystem";
+  const char* readFsErrorTypeKey = "readFsError";
+  const char* readFsErrorCodeKey = "readFsErrorCode";
+
+  HANDLE exeFile = CreateFileW(exePath, GENERIC_READ, FILE_SHARE_READ, NULL,
+                               OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
+  if (exeFile == INVALID_HANDLE_VALUE) {
+    DWORD errorCode = GetLastError();
+    AppendStringValueToIni(iniData, readFsErrorTypeKey, "openFile");
+    AppendDwordValueToIni(iniData, readFsErrorCodeKey, errorCode);
+    return;
+  }
+
+  const size_t bufferSize = MAX_PATH + 1;
+  wchar_t buffer[bufferSize];
+  BOOL success = GetVolumeInformationByHandleW(exeFile, NULL, 0, NULL, NULL,
+                                               NULL, buffer, bufferSize);
+  if (!success) {
+    DWORD errorCode = GetLastError();
+    AppendStringValueToIni(iniData, readFsErrorTypeKey, "getVolInfo");
+    AppendDwordValueToIni(iniData, readFsErrorCodeKey, errorCode);
+    CloseHandle(exeFile);
+    return;
+  }
+  CloseHandle(exeFile);
+
+  size_t fsLen = wcsnlen(buffer, bufferSize);
+  if (fsLen == bufferSize) {
+    AppendStringValueToIni(iniData, readFsErrorTypeKey, "fsUnterminated");
+    return;
+  }
+
+  const int narrowBufferSize = WideCharToMultiByte(CP_UTF8, 0, buffer, -1, NULL,
+                                                   0, NULL, NULL);
+  if (narrowBufferSize <= 0) {
+    DWORD errorCode = GetLastError();
+    AppendStringValueToIni(iniData, readFsErrorTypeKey, "getBufferSize");
+    AppendDwordValueToIni(iniData, readFsErrorCodeKey, errorCode);
+    return;
+  }
+  AutoCharBuffer fs(narrowBufferSize);
+  int written = WideCharToMultiByte(CP_UTF8, 0, buffer, -1, fs.Buffer(),
+                                    narrowBufferSize, NULL, NULL);
+  if (written <= 0) {
+    DWORD errorCode = GetLastError();
+    AppendStringValueToIni(iniData, readFsErrorTypeKey, "convertString");
+    AppendDwordValueToIni(iniData, readFsErrorCodeKey, errorCode);
+    return;
+  }
+
+  // Like "fileSystem=FAT32" or "fileSystem=NTFS".
+  AppendStringValueToIni(iniData, fsKey, fs.Buffer());
+}
+
+// Read Zone Identifier information from alternate data stream.
+// Always either returns the data that was read, or data indicating what sort of
+// error was encountered when obtaining the data.
+// When this function returns, `metadata` is guaranteed to contain relevant
+// metadata that should be written out. But `data.Buffer()` may be null
+// depending on whether we successfully read data.
+static void
+ReadZoneIdentifierData(const UString &exePath, AString& metadata,
+                       AutoCharBuffer& data)
+{
+  metadata.Empty();
+  data.Dealloc();
+
+  // We don't want to allow this function to just read an unlimited amount into
+  // `data`, so this value will control at what point we consider the file too
+  // big to be valid.
+  // 1 MB should be way more than enough. The Zone Identifier file generally
+  // consists of no more than 4 short lines of text.
+  const size_t maxReadSize = 1 * 1000 * 1000;
+  const char* readZoneIdErrorTypeKey = "readZoneIdError";
+  const char* readZoneIdErrorCodeKey = "readZoneIdErrorCode";
+  // It looks like the Zone Identifier will be INI data. But since there is no
+  // real guarantee of this, we are going to put an INI-compatible sentinel
+  // before we start appending the Zone Identifier file. This should help us
+  // better parse the file contents if we discover, say, that there is another
+  // possible format for Zone Identifier data.
+  const char* zoneIdStartSentinel = "\n[MozillaZoneIdentifierStartSentinel]\n";
+
+  metadata += "[Mozilla]\n";
+  ReadExeFileSystemIntoIniData(exePath, metadata);
+
+  UString adsPath(exePath);
+  // A colon (`:`) is not a valid path constituent (see
+  // https://learn.microsoft.com/en-ca/windows/win32/fileio/naming-a-file), so
+  // file systems that don't support ADS will fail to open rather than open an
+  // unrelated file.
+  adsPath += L":Zone.Identifier";
+  HANDLE adsFile = CreateFileW(adsPath, GENERIC_READ, FILE_SHARE_READ, NULL,
+                               OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
+  if (adsFile == INVALID_HANDLE_VALUE) {
+    DWORD errorCode = GetLastError();
+    AppendStringValueToIni(metadata, readZoneIdErrorTypeKey, "openFile");
+    AppendDwordValueToIni(metadata, readZoneIdErrorCodeKey, errorCode);
+    return;
+  }
+
+  LARGE_INTEGER fileSize;
+  BOOL success = GetFileSizeEx(adsFile, &fileSize);
+  UInt32 bufferSize = maxReadSize;
+  if (!success) {
+    AppendStringValueToIni(metadata, "zoneIdFileSize", "unknown");
+    AppendStringValueToIni(metadata, "zoneIdBufferLargeEnough", "unknown");
+  } else {
+    AppendQwordValueToIni(metadata, "zoneIdFileSize", fileSize.QuadPart);
+    if (fileSize.QuadPart < (LONGLONG)bufferSize) {
+      AppendStringValueToIni(metadata, "zoneIdBufferLargeEnough", "true");
+      bufferSize = (UInt32)fileSize.QuadPart;
+    } else {
+      AppendStringValueToIni(metadata, "zoneIdBufferLargeEnough", "false");
+    }
+  }
+  data.Realloc(bufferSize);
+
+  DWORD readCount;
+  success = ReadFile(adsFile, data.Buffer(), bufferSize, &readCount, NULL);
+  if (!success) {
+    DWORD errorCode = GetLastError();
+    AppendStringValueToIni(metadata, readZoneIdErrorTypeKey, "readFile");
+    AppendDwordValueToIni(metadata, readZoneIdErrorCodeKey, errorCode);
+
+    data.Dealloc();
+    CloseHandle(adsFile);
+    return;
+  }
+  data.length = readCount;
+
+  char dummyBuffer;
+
+  success = ReadFile(adsFile, &dummyBuffer, 1, &readCount, NULL);
+  CloseHandle(adsFile);
+  if (success) {
+    if (readCount == 0) {
+      // We are at the end of the file
+      AppendStringValueToIni(metadata, "zoneIdTruncated", "false");
+    } else {
+      AppendStringValueToIni(metadata, "zoneIdTruncated", "true");
+    }
+  } else {
+    AppendStringValueToIni(metadata, "zoneIdTruncated", "unknown");
+  }
+
+  metadata += zoneIdStartSentinel;
+}
+
+// Delayed load libraries are loaded when the first symbol is used.
+// The following ensures that we load the delayed loaded libraries from the
+// system directory.
+struct AutoLoadSystemDependencies
+{
+  AutoLoadSystemDependencies()
+  {
+    HMODULE module = ::GetModuleHandleW(L"kernel32.dll");
+    if (module) {
+      // SetDefaultDllDirectories is always available on Windows 8 and above. It
+      // is also available on Windows Vista, Windows Server 2008, and
+      // Windows 7 when MS KB2533623 has been applied.
+      typedef BOOL (WINAPI *SetDefaultDllDirectoriesType)(DWORD);
+      SetDefaultDllDirectoriesType setDefaultDllDirectories =
+        (SetDefaultDllDirectoriesType) GetProcAddress(module, "SetDefaultDllDirectories");
+      if (setDefaultDllDirectories) {
+        setDefaultDllDirectories(0x0800 /* LOAD_LIBRARY_SEARCH_SYSTEM32 */ );
+        return;
+      }
+    }
+
+    static LPCWSTR delayDLLs[] = { L"uxtheme.dll", L"userenv.dll",
+                                   L"setupapi.dll", L"apphelp.dll",
+                                   L"propsys.dll", L"dwmapi.dll",
+                                   L"cryptbase.dll", L"oleacc.dll",
+                                   L"clbcatq.dll" };
+    WCHAR systemDirectory[MAX_PATH + 1] = { L'\0' };
+    // If GetSystemDirectory fails we accept that we'll load the DLLs from the
+    // normal search path.
+    GetSystemDirectoryW(systemDirectory, MAX_PATH + 1);
+    size_t systemDirLen = wcslen(systemDirectory);
+
+    // Make the system directory path terminate with a slash
+    if (systemDirectory[systemDirLen - 1] != L'\\' && systemDirLen) {
+      systemDirectory[systemDirLen] = L'\\';
+      ++systemDirLen;
+      // No need to re-NULL terminate
+    }
+
+    // For each known DLL ensure it is loaded from the system32 directory
+    for (size_t i = 0; i < sizeof(delayDLLs) / sizeof(delayDLLs[0]); ++i) {
+      size_t fileLen = wcslen(delayDLLs[i]);
+      wcsncpy(systemDirectory + systemDirLen, delayDLLs[i],
+      MAX_PATH - systemDirLen);
+      if (systemDirLen + fileLen <= MAX_PATH) {
+        systemDirectory[systemDirLen + fileLen] = L'\0';
+      } else {
+        systemDirectory[MAX_PATH] = L'\0';
+      }
+      LPCWSTR fullModulePath = systemDirectory; // just for code readability
+      LoadLibraryW(fullModulePath);
+    }
+  }
+} loadDLLs;
+
+BOOL
+RemoveCurrentDirFromSearchPath()
+{
+  // kernel32.dll is in the knownDLL list so it is safe to load without a full path
+  HMODULE kernel32 = LoadLibraryW(L"kernel32.dll");
+  if (!kernel32) {
+    return FALSE;
+  }
+
+  typedef BOOL (WINAPI *SetDllDirectoryType)(LPCWSTR);
+  SetDllDirectoryType SetDllDirectoryFn =
+    (SetDllDirectoryType)GetProcAddress(kernel32, "SetDllDirectoryW");
+  if (!SetDllDirectoryFn) {
+    FreeLibrary(kernel32);
+    return FALSE;
+  }
+
+  // If this call fails we can't do much about it, so ignore it.
+  // It is unlikely to fail and this is just a precaution anyway.
+  SetDllDirectoryFn(L"");
+  FreeLibrary(kernel32);
+  return TRUE;
+}
+
+/* END Mozilla customizations */
+
 int APIENTRY WinMain(HINSTANCE hInstance, HINSTANCE /* hPrevInstance */,
     #ifdef UNDER_CE
     LPWSTR
@@ -133,13 +529,35 @@ int APIENTRY WinMain(HINSTANCE hInstance
     #endif
     /* lpCmdLine */,int /* nCmdShow */)
 {
+  /* BEGIN Mozilla customizations */
+  // Disable current directory from being in the search path.
+  // This call does not help with implicitly loaded DLLs.
+  if (!RemoveCurrentDirFromSearchPath()) {
+    WCHAR minOSTitle[512] = { '\0' };
+    WCHAR minOSText[512] = { '\0' };
+    LoadStringW(NULL, IDS_MIN_OS_TITLE, minOSTitle,
+                sizeof(minOSTitle) / sizeof(minOSTitle[0]));
+    LoadStringW(NULL, IDS_MIN_OS_TEXT, minOSText,
+                sizeof(minOSText) / sizeof(minOSText[0]));
+    MessageBoxW(NULL, minOSText, minOSTitle, MB_OK | MB_ICONERROR);
+    return 1;
+  }
+  /* END Mozilla customizations */
+
   g_hInstance = (HINSTANCE)hInstance;
 
   NT_CHECK
 
-  #ifdef _WIN32
-  LoadSecurityDlls();
-  #endif
+  // BEGIN Mozilla customizations
+  // Our AutoLoadSystemDependencies (see above) does the same job as the
+  // LoadSecurityDlls function, but slightly better because it runs as a static
+  // initializer, and it doesn't include LOAD_LIBRARY_SEARCH_USER_DIRS in
+  // the search path, which partially defeats the purpose of calling
+  // SetDefaultDllDirectories at all.
+  //#ifdef _WIN32
+  //LoadSecurityDlls();
+  //#endif
+  // END Mozilla customizations
 
   // InitCommonControls();
 
@@ -172,6 +590,18 @@ int APIENTRY WinMain(HINSTANCE hInstance
   UString dirPrefix ("." STRING_PATH_SEPARATOR);
   UString appLaunched;
   bool showProgress = true;
+
+  /* BEGIN Mozilla customizations */
+  bool extractOnly = false;
+  if (switches.IsPrefixedBy_NoCase(L"/extractdir=")) {
+    assumeYes = true;
+    showProgress = false;
+    extractOnly = true;
+  } else if (!switches.IsEmpty()) {
+    showProgress = false;
+  }
+  /* END Mozilla customizations */
+
   if (!config.IsEmpty())
   {
     CObjectVector<CTextConfigPair> pairs;
@@ -204,7 +634,8 @@ int APIENTRY WinMain(HINSTANCE hInstance
   }
 
   CTempDir tempDir;
-  if (!tempDir.Create(kTempDirPrefix))
+  /* Mozilla customizations - Added !extractOnly */
+  if (!extractOnly && !tempDir.Create(kTempDirPrefix))
   {
     if (!assumeYes)
       ShowErrorMessage(L"Can not create temp folder archive");
@@ -222,7 +653,9 @@ int APIENTRY WinMain(HINSTANCE hInstance
     }
   }
 
-  const FString tempDirPath = tempDir.GetPath();
+  /* BEGIN Mozilla customizations - added extractOnly  parameter support */
+  const FString tempDirPath = extractOnly ? switches.Ptr(12) : GetUnicodeString(tempDir.GetPath());
+  /* END Mozilla customizations */
   // tempDirPath = L"M:\\1\\"; // to test low disk space
   {
     bool isCorrupt = false;
@@ -250,6 +683,84 @@ int APIENTRY WinMain(HINSTANCE hInstance
     }
   }
 
+  /* BEGIN Mozilla customizations */
+  // Retrieve and store any data added to this file after signing.
+  {
+    AString postSigningData;
+    if (ReadPostSigningData(fullPath, postSigningData)) {
+      FString postSigningDataFilePath(tempDirPath);
+      NFile::NName::NormalizeDirPathPrefix(postSigningDataFilePath);
+      postSigningDataFilePath += L"postSigningData";
+
+      NFile::NIO::COutFile postSigningDataFile;
+      postSigningDataFile.Create(postSigningDataFilePath, true);
+
+      UInt32 written = 0;
+      postSigningDataFile.Write(postSigningData, postSigningData.Len(), written);
+    }
+  }
+
+  // Read Zone Identifier information
+  // This will consist of two types of data that we will write to the same file.
+  // First we have the metadata, which will be INI data with these possible
+  // keys:
+  //  - `fileSystem`: What file system the executable is on
+  //  - `readFsError`: A string describing why we couldn't get the file system.
+  //                   Either this key will be present or the `fileSystem` key
+  //                   will be.
+  //  - `readFsErrorCode`: An integer returned by `GetLastError()` indicating,
+  //                       in more detail, why we failed to obtain the file
+  //                       system. This key may exist if `readFsError` exists.
+  //  - `readZoneIdError`: A string describing why we couldn't get the
+  //                       provenance data.
+  //  - `readZoneIdErrorCode`: An integer returned by `GetLastError()`
+  //                       indicating, in more detail, why we failed to get the
+  //                       provenance data. This key may exist if
+  //                       `readZoneIdError` exists.
+  //  - `zoneIdFileSize`: Either `"unknown"`, or an integer indicating the
+  //                      number of bytes in the zone identifier ADS.
+  //  - `zoneIdBufferLargeEnough`: Either `"unknown"`, `"true"`, or `"false"`,
+  //                               indicating whether the file size was bigger
+  //                               than the maximum size that we will read from
+  //                               that file.
+  //  - `zoneIdTruncated`: Either `"unknown"`, `"true"`, or `"false"`. Indicates
+  //                       whether or not we saw the end of the ADS file when we
+  //                       read from it.
+  // The above keys will be in the `"[Mozilla]"` section of the metadata.
+  // The other type of data that will go into the file is the directly copied
+  // data from the Zone Identifier ADS. This _should_ also be INI data, making
+  // the entirety of the file valid INI data.
+  // In the "good" case, this makes things very easy for us since INI reading
+  // functionality is already available. If we see an unexpected amount of
+  // telemetry data reporting that the INI is invalid, we will probably need to
+  // determine what other data formats are possible in that ADS.
+  // To make it easier to separate out the Zone Identifier data from the
+  // metadata, in that case, the metadata will always end with this sentinel,
+  // as long as `zoneIdData` contains valid data:
+  // `"\n[MozillaZoneIdentifierStartSentinel]\n"`
+  {
+    AString metadata;
+    AutoCharBuffer zoneIdData;
+    ReadZoneIdentifierData(fullPath, metadata, zoneIdData);
+    FString zoneIdDataFilePath(tempDirPath);
+    NFile::NName::NormalizeDirPathPrefix(zoneIdDataFilePath);
+    zoneIdDataFilePath += L"zoneIdProvenanceData";
+
+    NFile::NIO::COutFile zoneIdDataFile;
+    zoneIdDataFile.Create(zoneIdDataFilePath, true);
+
+    UInt32 written = 0;
+    zoneIdDataFile.Write(metadata, metadata.Len(), written);
+    if (zoneIdData.length > 0 && zoneIdData.Buffer()) {
+      zoneIdDataFile.Write(zoneIdData.Buffer(), zoneIdData.length, written);
+    }
+  }
+
+  if (extractOnly) {
+    return 0;
+  }
+  /* END Mozilla customizations */
+
   #ifndef UNDER_CE
   CCurrentDirRestorer currentDirRestorer;
   if (!SetCurrentDir(tempDirPath))
diff --git a/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/resource.h b/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/resource.h
--- a/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/resource.h
+++ b/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/resource.h
@@ -4,3 +4,5 @@
 #define IDS_EXTRACTION_ERROR_MESSAGE     8
 #define IDS_CANNOT_CREATE_FOLDER      3003
 #define IDS_PROGRESS_EXTRACTING       3300
+#define IDS_MIN_OS_TITLE                70
+#define IDS_MIN_OS_TEXT                 71
diff --git a/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/resource.rc b/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/resource.rc
--- a/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/resource.rc
+++ b/other-licenses/7zstub/src/CPP/7zip/Bundles/SFXSetup/resource.rc
@@ -11,6 +11,8 @@ BEGIN
   IDS_EXTRACTION_ERROR_MESSAGE  "File is corrupt"
   IDS_CANNOT_CREATE_FOLDER  "Cannot create folder '{0}'"
   IDS_PROGRESS_EXTRACTING  "Extracting"
+  IDS_MIN_OS_TITLE  "Setup Error"
+  IDS_MIN_OS_TEXT  "Microsoft Windows 7 or newer is required."
 END
 
 #include "../../UI/FileManager/ProgressDialog.rc"
diff --git a/other-licenses/7zstub/src/CPP/7zip/UI/FileManager/ProgressDialog.cpp b/other-licenses/7zstub/src/CPP/7zip/UI/FileManager/ProgressDialog.cpp
--- a/other-licenses/7zstub/src/CPP/7zip/UI/FileManager/ProgressDialog.cpp
+++ b/other-licenses/7zstub/src/CPP/7zip/UI/FileManager/ProgressDialog.cpp
@@ -165,7 +165,8 @@ bool CProgressDialog::OnButtonClicked(in
       bool paused = Sync.GetPaused();
       Sync.SetPaused(true);
       _inCancelMessageBox = true;
-      int res = ::MessageBoxW(*this, L"Are you sure you want to cancel?", _title, MB_YESNOCANCEL);
+      // Mozilla Customization - Removed redundant cancel button from dialog.
+      int res = ::MessageBoxW(*this, L"Are you sure you want to cancel?", _title, MB_YESNO);
       _inCancelMessageBox = false;
       Sync.SetPaused(paused);
       if (res == IDCANCEL || res == IDNO)