mirror of
https://github.com/cmclark00/retro-imager.git
synced 2025-05-19 16:35:20 +01:00
294 lines
10 KiB
C
294 lines
10 KiB
C
/*-
|
|
* Copyright (c) 2008, 2010 Michihiro NAKAJIMA
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
#include "test.h"
|
|
__FBSDID("$FreeBSD");
|
|
|
|
/*
|
|
Execute the following command to rebuild the data for this program:
|
|
tail -n +32 test_read_format_lha.c | /bin/sh
|
|
|
|
#/bin/sh
|
|
#
|
|
# How to make test data.
|
|
#
|
|
# Temporary directory.
|
|
base=/tmp/lha
|
|
# Owner id
|
|
owner=1001
|
|
# Group id
|
|
group=1001
|
|
#
|
|
# Make contents of a lha archive.
|
|
#
|
|
rm -rf ${base}
|
|
mkdir ${base}
|
|
mkdir ${base}/dir
|
|
cat > ${base}/file1 << END
|
|
file 1 contents
|
|
hello
|
|
hello
|
|
hello
|
|
END
|
|
cat > ${base}/file2 << END
|
|
file 2 contents
|
|
hello
|
|
hello
|
|
hello
|
|
hello
|
|
hello
|
|
hello
|
|
END
|
|
mkdir ${base}/dir2
|
|
#
|
|
# Set up a file mode, owner and group.
|
|
#
|
|
(cd ${base}/dir2; ln -s ../file1 symlink1)
|
|
(cd ${base}/dir2; ln -s ../file2 symlink2)
|
|
(cd ${base}; chown ${owner}:${group} dir file1 file2)
|
|
(cd ${base}; chown -h ${owner}:${group} dir2 dir2/symlink1 dir2/symlink2)
|
|
(cd ${base}; chmod 0750 dir)
|
|
(cd ${base}; chmod 0755 dir2)
|
|
(cd ${base}; chmod 0755 dir2/symlink1 dir2/symlink2)
|
|
(cd ${base}; chmod 0644 file1)
|
|
(cd ${base}; chmod 0666 file2)
|
|
TZ=utc touch -afhm -t 197001030000.02 ${base}/dir2/symlink1 ${base}/dir2/symlink2
|
|
TZ=utc touch -afhm -t 197001020000.01 ${base}/dir ${base}/dir2
|
|
TZ=utc touch -afhm -t 197001020000.01 ${base}/file1 ${base}/file2
|
|
#
|
|
# Make several lha archives.
|
|
#
|
|
# Make a lha archive with header level 0
|
|
lha0=test_read_format_lha_header0.lzh
|
|
(cd ${base}; lha c0q ${lha0} dir file1 file2 dir2)
|
|
# Make a lha archive with header level 1
|
|
lha1=test_read_format_lha_header1.lzh
|
|
(cd ${base}; lha c1q ${lha1} dir file1 file2 dir2)
|
|
# Make a lha archive with header level 2
|
|
lha2=test_read_format_lha_header2.lzh
|
|
(cd ${base}; lha c2q ${lha2} dir file1 file2 dir2)
|
|
# Make a lha archive with -lh6- compression mode
|
|
lha3=test_read_format_lha_lh6.lzh
|
|
(cd ${base}; lha co6q ${lha3} dir file1 file2 dir2)
|
|
# Make a lha archive with -lh7- compression mode
|
|
lha4=test_read_format_lha_lh7.lzh
|
|
(cd ${base}; lha co7q ${lha4} dir file1 file2 dir2)
|
|
# Make a lha archive with -lh0- no compression
|
|
lha5=test_read_format_lha_lh0.lzh
|
|
(cd ${base}; lha czq ${lha5} dir file1 file2 dir2)
|
|
# make a lha archive with junk data
|
|
lha6=test_read_format_lha_withjunk.lzh
|
|
(cd ${base}; cp ${lha2} ${lha6}; echo "junk data!!!!" >> ${lha6})
|
|
#
|
|
uuencode ${base}/${lha0} ${lha0} > ${lha0}.uu
|
|
uuencode ${base}/${lha1} ${lha1} > ${lha1}.uu
|
|
uuencode ${base}/${lha2} ${lha2} > ${lha2}.uu
|
|
uuencode ${base}/${lha3} ${lha3} > ${lha3}.uu
|
|
uuencode ${base}/${lha4} ${lha4} > ${lha4}.uu
|
|
uuencode ${base}/${lha5} ${lha5} > ${lha5}.uu
|
|
uuencode ${base}/${lha6} ${lha5} > ${lha5}.uu
|
|
uuencode ${base}/${lha6} ${lha6} > ${lha6}.uu
|
|
#
|
|
# Finish making test data.
|
|
exit 1
|
|
*/
|
|
|
|
static const char file1[] = {
|
|
" file 1 contents\n"
|
|
"hello\n"
|
|
"hello\n"
|
|
"hello\n"
|
|
};
|
|
#define file1_size (sizeof(file1)-1)
|
|
static const char file2[] = {
|
|
" file 2 contents\n"
|
|
"hello\n"
|
|
"hello\n"
|
|
"hello\n"
|
|
"hello\n"
|
|
"hello\n"
|
|
"hello\n"
|
|
};
|
|
#define file2_size (sizeof(file2)-1)
|
|
|
|
static void
|
|
verify(const char *refname, int posix)
|
|
{
|
|
struct archive_entry *ae;
|
|
struct archive *a;
|
|
char buff[128];
|
|
const void *pv;
|
|
size_t s;
|
|
int64_t o;
|
|
int uid, gid;
|
|
|
|
if (posix)
|
|
uid = gid = 1001;
|
|
else
|
|
uid = gid = 0;
|
|
|
|
extract_reference_file(refname);
|
|
assert((a = archive_read_new()) != NULL);
|
|
assertEqualIntA(a, ARCHIVE_OK, archive_read_support_filter_all(a));
|
|
assertEqualIntA(a, ARCHIVE_OK, archive_read_support_format_all(a));
|
|
assertEqualIntA(a, ARCHIVE_OK,
|
|
archive_read_open_filename(a, refname, 10240));
|
|
|
|
/* Verify directory1. */
|
|
assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae));
|
|
if (posix)
|
|
assertEqualInt((AE_IFDIR | 0750), archive_entry_mode(ae));
|
|
else
|
|
assertEqualInt((AE_IFDIR | 0755), archive_entry_mode(ae));
|
|
assertEqualString("dir/", archive_entry_pathname(ae));
|
|
assertEqualInt(86401, archive_entry_mtime(ae));
|
|
assertEqualInt(uid, archive_entry_uid(ae));
|
|
assertEqualInt(gid, archive_entry_gid(ae));
|
|
assertEqualInt(0, archive_entry_size(ae));
|
|
assertEqualIntA(a, ARCHIVE_EOF,
|
|
archive_read_data_block(a, &pv, &s, &o));
|
|
assertEqualInt(s, 0);
|
|
assertEqualInt(archive_entry_is_encrypted(ae), 0);
|
|
assertEqualIntA(a, archive_read_has_encrypted_entries(a), ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED);
|
|
|
|
/* Verify directory2. */
|
|
assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae));
|
|
assertEqualInt((AE_IFDIR | 0755), archive_entry_mode(ae));
|
|
assertEqualString("dir2/", archive_entry_pathname(ae));
|
|
assertEqualInt(86401, archive_entry_mtime(ae));
|
|
assertEqualInt(uid, archive_entry_uid(ae));
|
|
assertEqualInt(gid, archive_entry_gid(ae));
|
|
assertEqualInt(0, archive_entry_size(ae));
|
|
assertEqualIntA(a, ARCHIVE_EOF,
|
|
archive_read_data_block(a, &pv, &s, &o));
|
|
assertEqualInt(s, 0);
|
|
assertEqualInt(archive_entry_is_encrypted(ae), 0);
|
|
assertEqualIntA(a, archive_read_has_encrypted_entries(a), ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED);
|
|
|
|
if (posix) {
|
|
/* Verify symbolic link file1. */
|
|
assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae));
|
|
assertEqualInt((AE_IFLNK | 0755), archive_entry_mode(ae));
|
|
assertEqualString("dir2/symlink1", archive_entry_pathname(ae));
|
|
assertEqualString("../file1", archive_entry_symlink(ae));
|
|
assertEqualInt(172802, archive_entry_mtime(ae));
|
|
assertEqualInt(uid, archive_entry_uid(ae));
|
|
assertEqualInt(gid, archive_entry_gid(ae));
|
|
assertEqualInt(0, archive_entry_size(ae));
|
|
assertEqualInt(archive_entry_is_encrypted(ae), 0);
|
|
assertEqualIntA(a, archive_read_has_encrypted_entries(a), ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED);
|
|
|
|
/* Verify symbolic link file2. */
|
|
assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae));
|
|
assertEqualInt((AE_IFLNK | 0755), archive_entry_mode(ae));
|
|
assertEqualString("dir2/symlink2", archive_entry_pathname(ae));
|
|
assertEqualString("../file2", archive_entry_symlink(ae));
|
|
assertEqualInt(172802, archive_entry_mtime(ae));
|
|
assertEqualInt(uid, archive_entry_uid(ae));
|
|
assertEqualInt(gid, archive_entry_gid(ae));
|
|
assertEqualInt(0, archive_entry_size(ae));
|
|
assertEqualInt(archive_entry_is_encrypted(ae), 0);
|
|
assertEqualIntA(a, archive_read_has_encrypted_entries(a), ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED);
|
|
}
|
|
|
|
/* Verify regular file1. */
|
|
assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae));
|
|
assertEqualInt((AE_IFREG | 0644), archive_entry_mode(ae));
|
|
assertEqualString("file1", archive_entry_pathname(ae));
|
|
assertEqualInt(86401, archive_entry_mtime(ae));
|
|
assertEqualInt(uid, archive_entry_uid(ae));
|
|
assertEqualInt(gid, archive_entry_gid(ae));
|
|
assertEqualInt(file1_size, archive_entry_size(ae));
|
|
assertEqualInt(file1_size, archive_read_data(a, buff, file1_size));
|
|
assertEqualMem(buff, file1, file1_size);
|
|
assertEqualInt(archive_entry_is_encrypted(ae), 0);
|
|
assertEqualIntA(a, archive_read_has_encrypted_entries(a), ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED);
|
|
|
|
/* Verify regular file2. */
|
|
assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae));
|
|
if (posix)
|
|
assertEqualInt((AE_IFREG | 0666), archive_entry_mode(ae));
|
|
else
|
|
assertEqualInt((AE_IFREG | 0644), archive_entry_mode(ae));
|
|
assertEqualString("file2", archive_entry_pathname(ae));
|
|
assertEqualInt(86401, archive_entry_mtime(ae));
|
|
assertEqualInt(uid, archive_entry_uid(ae));
|
|
assertEqualInt(gid, archive_entry_gid(ae));
|
|
assertEqualInt(file2_size, archive_entry_size(ae));
|
|
assertEqualInt(file2_size, archive_read_data(a, buff, file2_size));
|
|
assertEqualMem(buff, file2, file2_size);
|
|
assertEqualInt(archive_entry_is_encrypted(ae), 0);
|
|
assertEqualIntA(a, archive_read_has_encrypted_entries(a), ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED);
|
|
|
|
/* Verify the number of files read. */
|
|
if (posix) {
|
|
assertEqualInt(6, archive_file_count(a));
|
|
} else {
|
|
assertEqualInt(4, archive_file_count(a));
|
|
}
|
|
|
|
/* End of archive. */
|
|
assertEqualIntA(a, ARCHIVE_EOF, archive_read_next_header(a, &ae));
|
|
|
|
/* Verify the number of files read. */
|
|
if (posix) {
|
|
assertEqualInt(6, archive_file_count(a));
|
|
} else {
|
|
assertEqualInt(4, archive_file_count(a));
|
|
}
|
|
|
|
/* Verify encryption status */
|
|
assertEqualInt(archive_entry_is_encrypted(ae), 0);
|
|
assertEqualIntA(a, archive_read_has_encrypted_entries(a), ARCHIVE_READ_FORMAT_ENCRYPTION_UNSUPPORTED);
|
|
|
|
/* Verify archive format. */
|
|
assertEqualIntA(a, ARCHIVE_FILTER_NONE, archive_filter_code(a, 0));
|
|
assertEqualIntA(a, ARCHIVE_FORMAT_LHA, archive_format(a));
|
|
|
|
/* Close the archive. */
|
|
assertEqualInt(ARCHIVE_OK, archive_read_close(a));
|
|
assertEqualInt(ARCHIVE_OK, archive_read_free(a));
|
|
}
|
|
|
|
DEFINE_TEST(test_read_format_lha)
|
|
{
|
|
/* Verify Header level 0 */
|
|
verify("test_read_format_lha_header0.lzh", 1);
|
|
/* Verify Header level 1 */
|
|
verify("test_read_format_lha_header1.lzh", 1);
|
|
/* Verify Header level 2 */
|
|
verify("test_read_format_lha_header2.lzh", 1);
|
|
/* Verify Header level 3
|
|
* This test data can be made in Windows only. */
|
|
verify("test_read_format_lha_header3.lzh", 0);
|
|
/* Verify compression mode -lh6- */
|
|
verify("test_read_format_lha_lh6.lzh", 1);
|
|
/* Verify compression mode -lh7- */
|
|
verify("test_read_format_lha_lh7.lzh", 1);
|
|
/* Verify no compression -lh0- */
|
|
verify("test_read_format_lha_lh0.lzh", 1);
|
|
/* Verify an lha file with junk data. */
|
|
verify("test_read_format_lha_withjunk.lzh", 1);
|
|
}
|
|
|