Update vendor/libarchive to git to 30528ed7a9f479f1c363ee8cfa1c5eb4c7d9be10
Vendor bugfixes: PR 826: OpenSSL 1.1 support PR 830, 831, 833: Spelling fixes OSS-Fuzz 227, 230, 239: Fix possible memory leak in archive_read_free() OSS-Fuzz 237: Fix heap buffer overflow when reading invalid ar archives
This commit is contained in:
parent
f428c3b114
commit
8e86d3576b
.travis.ymlMakefile.am
build
cat
configure.accpio
libarchive
CMakeLists.txtarchive.harchive_acl.carchive_cryptor.carchive_cryptor_private.harchive_digest.carchive_digest_private.harchive_entry.carchive_hmac.carchive_hmac_private.harchive_options.carchive_read.carchive_read_append_filter.carchive_read_disk_posix.carchive_read_disk_windows.carchive_read_extract2.carchive_read_open_memory.carchive_read_private.harchive_read_support_filter_uu.carchive_read_support_format_7zip.carchive_read_support_format_ar.carchive_read_support_format_cpio.carchive_read_support_format_mtree.carchive_read_support_format_rar.carchive_read_support_format_tar.carchive_read_support_format_warc.carchive_string.carchive_windows.carchive_write.carchive_write_add_filter_lz4.carchive_write_disk_posix.carchive_write_disk_set_standard_lookup.carchive_write_disk_windows.carchive_write_open_memory.carchive_write_set_format_ar.carchive_write_set_format_cpio_newc.carchive_write_set_format_iso9660.carchive_write_set_format_pax.carchive_write_set_format_shar.carchive_write_set_format_ustar.carchive_write_set_format_v7tar.carchive_write_set_format_xar.c
test
tar/test
12
.travis.yml
12
.travis.yml
@ -1,13 +1,23 @@
|
||||
language: C
|
||||
sudo: required
|
||||
dist: trusty
|
||||
os:
|
||||
- linux
|
||||
- osx
|
||||
compiler:
|
||||
- gcc
|
||||
- clang
|
||||
env:
|
||||
- BUILD_SYSTEM=cmake
|
||||
- BUILD_SYSTEM=autotools
|
||||
matrix:
|
||||
exclude:
|
||||
- os: osx
|
||||
compiler: gcc
|
||||
before_install:
|
||||
- if [ `uname` = "Darwin" ]; then brew update; fi
|
||||
- if [ `uname` = "Linux" ]; then sudo apt-get install -y libbz2-dev libzip-dev liblzma-dev liblzo2-dev; fi
|
||||
install:
|
||||
- sudo apt-get install -y libbz2-dev libzip-dev liblzma-dev liblzo2-dev
|
||||
- if [ `uname` = "Darwin" ]; then brew install xz lzo lz4; fi
|
||||
script:
|
||||
- build/ci_build.sh
|
||||
|
@ -118,6 +118,8 @@ libarchive_la_SOURCES= \
|
||||
libarchive/archive_hmac.c \
|
||||
libarchive/archive_hmac_private.h \
|
||||
libarchive/archive_match.c \
|
||||
libarchive/archive_openssl_evp_private.h \
|
||||
libarchive/archive_openssl_hmac_private.h \
|
||||
libarchive/archive_options.c \
|
||||
libarchive/archive_options_private.h \
|
||||
libarchive/archive_pack_dev.h \
|
||||
|
@ -63,7 +63,7 @@ else
|
||||
aix*)
|
||||
wl='-Wl,'
|
||||
;;
|
||||
mingw* | cygwin* | pw32* | os2* | cegcc*)
|
||||
mingw* | cygwin* | msys* | pw32* | os2* | cegcc*)
|
||||
;;
|
||||
hpux9* | hpux10* | hpux11*)
|
||||
wl='-Wl,'
|
||||
@ -155,7 +155,7 @@ hardcode_direct=no
|
||||
hardcode_minus_L=no
|
||||
|
||||
case "$host_os" in
|
||||
cygwin* | mingw* | pw32* | cegcc*)
|
||||
cygwin* | msys* | mingw* | pw32* | cegcc*)
|
||||
# FIXME: the MSVC++ port hasn't been tested in a loooong time
|
||||
# When not using gcc, we currently assume that we are using
|
||||
# Microsoft Visual C++.
|
||||
@ -204,7 +204,7 @@ if test "$with_gnu_ld" = yes; then
|
||||
ld_shlibs=no
|
||||
fi
|
||||
;;
|
||||
cygwin* | mingw* | pw32* | cegcc*)
|
||||
cygwin* | msys* | mingw* | pw32* | cegcc*)
|
||||
# hardcode_libdir_flag_spec is actually meaningless, as there is
|
||||
# no search path for DLLs.
|
||||
hardcode_libdir_flag_spec='-L$libdir'
|
||||
@ -354,7 +354,7 @@ else
|
||||
;;
|
||||
bsdi[45]*)
|
||||
;;
|
||||
cygwin* | mingw* | pw32* | cegcc*)
|
||||
cygwin* | msys* | mingw* | pw32* | cegcc*)
|
||||
# When not using gcc, we currently assume that we are using
|
||||
# Microsoft Visual C++.
|
||||
# hardcode_libdir_flag_spec is actually meaningless, as there is
|
||||
@ -543,7 +543,7 @@ case "$host_os" in
|
||||
bsdi[45]*)
|
||||
library_names_spec='$libname$shrext'
|
||||
;;
|
||||
cygwin* | mingw* | pw32* | cegcc*)
|
||||
cygwin* | msys* | mingw* | pw32* | cegcc*)
|
||||
shrext=.dll
|
||||
library_names_spec='$libname.dll.a $libname.lib'
|
||||
;;
|
||||
|
@ -61,7 +61,7 @@ if [ -z "${BUILD_SYSTEM}" ]; then
|
||||
inputerror "Missing type (-t) parameter"
|
||||
fi
|
||||
if [ -z "${BUILDDIR}" ]; then
|
||||
BUILDDIR="${CURDIR}/BUILD/${BUILD_SYSTEM}"
|
||||
BUILDDIR="${CURDIR}/build_ci/${BUILD_SYSTEM}"
|
||||
fi
|
||||
mkdir -p "${BUILDDIR}"
|
||||
for action in ${ACTIONS}; do
|
||||
@ -90,10 +90,7 @@ for action in ${ACTIONS}; do
|
||||
test)
|
||||
case "${BUILD_SYSTEM}" in
|
||||
autotools)
|
||||
if ! make ${MAKE_ARGS} check; then
|
||||
cat test-suite.log
|
||||
exit 1
|
||||
fi
|
||||
make ${MAKE_ARGS} check LOG_DRIVER="${SRCDIR}/build/ci_test_driver"
|
||||
;;
|
||||
cmake)
|
||||
make ${MAKE_ARGS} test
|
||||
|
@ -142,5 +142,8 @@ main(int argc, char **argv)
|
||||
bsdcat_next();
|
||||
}
|
||||
|
||||
if (a != NULL)
|
||||
archive_read_free(a);
|
||||
|
||||
exit(exit_status);
|
||||
}
|
||||
|
12
configure.ac
12
configure.ac
@ -89,7 +89,7 @@ inc_windows_files=no
|
||||
inc_cygwin_files=no
|
||||
case "$host_os" in
|
||||
*mingw* ) inc_windows_files=yes ;;
|
||||
*cygwin*) inc_cygwin_files=yes ;;
|
||||
*cygwin* | *msys*) inc_cygwin_files=yes ;;
|
||||
esac
|
||||
AM_CONDITIONAL([INC_WINDOWS_FILES], [test $inc_windows_files = yes])
|
||||
AM_CONDITIONAL([INC_CYGWIN_FILES], [test $inc_cygwin_files = yes])
|
||||
@ -243,7 +243,7 @@ AM_CONDITIONAL([STATIC_BSDCPIO], [ test "$static_bsdcpio" = yes ])
|
||||
|
||||
# Set up defines needed before including any headers
|
||||
case $host in
|
||||
*mingw* | *cygwin* )
|
||||
*mingw* | *cygwin* | *msys* )
|
||||
AC_DEFINE([_WIN32_WINNT], 0x0502, [Define to '0x0502' for Windows Server 2003 APIs.])
|
||||
AC_DEFINE([WINVER], 0x0502, [Define to '0x0502' for Windows Server 2003 APIs.])
|
||||
AC_DEFINE([NTDDI_VERSION], 0x05020000, [Define to '0x05020000' for Windows Server 2003 APIs.])
|
||||
@ -302,7 +302,7 @@ AC_ARG_WITH([bz2lib],
|
||||
if test "x$with_bz2lib" != "xno"; then
|
||||
AC_CHECK_HEADERS([bzlib.h])
|
||||
case "$host_os" in
|
||||
*mingw* | *cygwin*)
|
||||
*mingw* | *cygwin* | *msys*)
|
||||
dnl AC_CHECK_LIB cannot be used on the Windows port of libbz2, therefore
|
||||
dnl use AC_LINK_IFELSE.
|
||||
AC_MSG_CHECKING([for BZ2_bzDecompressInit in -lbz2])
|
||||
@ -797,7 +797,7 @@ main(int argc, char **argv)
|
||||
])
|
||||
|
||||
case "$host_os" in
|
||||
*mingw* | *cygwin*)
|
||||
*mingw* | *cygwin* | *msys*)
|
||||
;;
|
||||
*)
|
||||
CRYPTO_CHECK(MD5, LIBC, md5)
|
||||
@ -840,7 +840,7 @@ if test "x$with_openssl" != "xno"; then
|
||||
AC_CHECK_HEADERS([openssl/evp.h])
|
||||
saved_LIBS=$LIBS
|
||||
case "$host_os" in
|
||||
*mingw* | *cygwin*)
|
||||
*mingw* | *cygwin* | *msys*)
|
||||
case "$host_cpu" in
|
||||
x86_64)
|
||||
AC_CHECK_LIB(eay64,OPENSSL_config)
|
||||
@ -886,7 +886,7 @@ if test "x$found_LIBMD" != "xyes"; then
|
||||
fi
|
||||
|
||||
case "$host_os" in
|
||||
*mingw* | *cygwin*)
|
||||
*mingw* | *cygwin* | *msys*)
|
||||
CRYPTO_CHECK_WIN(MD5, CALG_MD5)
|
||||
CRYPTO_CHECK_WIN(SHA1, CALG_SHA1)
|
||||
CRYPTO_CHECK_WIN(SHA256, CALG_SHA_256)
|
||||
|
@ -1324,10 +1324,9 @@ lookup_name(struct cpio *cpio, struct name_cache **name_cache_variable,
|
||||
|
||||
|
||||
if (*name_cache_variable == NULL) {
|
||||
*name_cache_variable = malloc(sizeof(struct name_cache));
|
||||
*name_cache_variable = calloc(1, sizeof(struct name_cache));
|
||||
if (*name_cache_variable == NULL)
|
||||
lafe_errc(1, ENOMEM, "No more memory");
|
||||
memset(*name_cache_variable, 0, sizeof(struct name_cache));
|
||||
(*name_cache_variable)->size = name_cache_size;
|
||||
}
|
||||
|
||||
|
@ -63,6 +63,13 @@ DEFINE_TEST(test_option_lz4)
|
||||
"but no such program is available on this system.");
|
||||
return;
|
||||
}
|
||||
/* On some systems the error won't be detected until closing
|
||||
time, by a 127 exit error returned by waitpid. */
|
||||
if (strstr(p, "Error closing") != NULL && !canLz4()) {
|
||||
skipping("This version of bsdcpio uses an external lz4 program "
|
||||
"but no such program is available on this system.");
|
||||
return;
|
||||
}
|
||||
failure("--lz4 option is broken: %s", p);
|
||||
assertEqualInt(r, 0);
|
||||
return;
|
||||
|
@ -38,6 +38,8 @@ SET(libarchive_SOURCES
|
||||
archive_hmac.c
|
||||
archive_hmac_private.h
|
||||
archive_match.c
|
||||
archive_openssl_evp_private.h
|
||||
archive_openssl_hmac_private.h
|
||||
archive_options.c
|
||||
archive_options_private.h
|
||||
archive_pack_dev.h
|
||||
|
@ -373,7 +373,7 @@ typedef const char *archive_passphrase_callback(struct archive *,
|
||||
* 4) Repeatedly call archive_read_next_header to get information about
|
||||
* successive archive entries. Call archive_read_data to extract
|
||||
* data for entries of interest.
|
||||
* 5) Call archive_read_finish to end processing.
|
||||
* 5) Call archive_read_free to end processing.
|
||||
*/
|
||||
__LA_DECL struct archive *archive_read_new(void);
|
||||
|
||||
|
@ -280,11 +280,17 @@ acl_new_entry(struct archive_acl *acl,
|
||||
acl->acl_text = NULL;
|
||||
}
|
||||
|
||||
/* If there's a matching entry already in the list, overwrite it. */
|
||||
/*
|
||||
* If there's a matching entry already in the list, overwrite it.
|
||||
* NFSv4 entries may be repeated and are not overwritten.
|
||||
*
|
||||
* TODO: compare names of no id is provided (needs more rework)
|
||||
*/
|
||||
ap = acl->acl_head;
|
||||
aq = NULL;
|
||||
while (ap != NULL) {
|
||||
if (ap->type == type && ap->tag == tag && ap->id == id) {
|
||||
if (((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) == 0) &&
|
||||
ap->type == type && ap->tag == tag && ap->id == id) {
|
||||
if (id != -1 || (tag != ARCHIVE_ENTRY_ACL_USER &&
|
||||
tag != ARCHIVE_ENTRY_ACL_GROUP)) {
|
||||
ap->permset = permset;
|
||||
@ -296,10 +302,9 @@ acl_new_entry(struct archive_acl *acl,
|
||||
}
|
||||
|
||||
/* Add a new entry to the end of the list. */
|
||||
ap = (struct archive_acl_entry *)malloc(sizeof(*ap));
|
||||
ap = (struct archive_acl_entry *)calloc(1, sizeof(*ap));
|
||||
if (ap == NULL)
|
||||
return (NULL);
|
||||
memset(ap, 0, sizeof(*ap));
|
||||
if (aq == NULL)
|
||||
acl->acl_head = ap;
|
||||
else
|
||||
|
@ -302,6 +302,8 @@ aes_ctr_release(archive_crypto_ctx *ctx)
|
||||
static int
|
||||
aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len)
|
||||
{
|
||||
if ((ctx->ctx = EVP_CIPHER_CTX_new()) == NULL)
|
||||
return -1;
|
||||
|
||||
switch (key_len) {
|
||||
case 16: ctx->type = EVP_aes_128_ecb(); break;
|
||||
@ -314,7 +316,7 @@ aes_ctr_init(archive_crypto_ctx *ctx, const uint8_t *key, size_t key_len)
|
||||
memcpy(ctx->key, key, key_len);
|
||||
memset(ctx->nonce, 0, sizeof(ctx->nonce));
|
||||
ctx->encr_pos = AES_BLOCK_SIZE;
|
||||
EVP_CIPHER_CTX_init(&ctx->ctx);
|
||||
EVP_CIPHER_CTX_init(ctx->ctx);
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -324,10 +326,10 @@ aes_ctr_encrypt_counter(archive_crypto_ctx *ctx)
|
||||
int outl = 0;
|
||||
int r;
|
||||
|
||||
r = EVP_EncryptInit_ex(&ctx->ctx, ctx->type, NULL, ctx->key, NULL);
|
||||
r = EVP_EncryptInit_ex(ctx->ctx, ctx->type, NULL, ctx->key, NULL);
|
||||
if (r == 0)
|
||||
return -1;
|
||||
r = EVP_EncryptUpdate(&ctx->ctx, ctx->encr_buf, &outl, ctx->nonce,
|
||||
r = EVP_EncryptUpdate(ctx->ctx, ctx->encr_buf, &outl, ctx->nonce,
|
||||
AES_BLOCK_SIZE);
|
||||
if (r == 0 || outl != AES_BLOCK_SIZE)
|
||||
return -1;
|
||||
@ -337,7 +339,7 @@ aes_ctr_encrypt_counter(archive_crypto_ctx *ctx)
|
||||
static int
|
||||
aes_ctr_release(archive_crypto_ctx *ctx)
|
||||
{
|
||||
EVP_CIPHER_CTX_cleanup(&ctx->ctx);
|
||||
EVP_CIPHER_CTX_free(ctx->ctx);
|
||||
memset(ctx->key, 0, ctx->key_len);
|
||||
memset(ctx->nonce, 0, sizeof(ctx->nonce));
|
||||
return 0;
|
||||
|
@ -99,12 +99,12 @@ typedef struct {
|
||||
} archive_crypto_ctx;
|
||||
|
||||
#elif defined(HAVE_LIBCRYPTO)
|
||||
#include <openssl/evp.h>
|
||||
#include "archive_openssl_evp_private.h"
|
||||
#define AES_BLOCK_SIZE 16
|
||||
#define AES_MAX_KEY_SIZE 32
|
||||
|
||||
typedef struct {
|
||||
EVP_CIPHER_CTX ctx;
|
||||
EVP_CIPHER_CTX *ctx;
|
||||
const EVP_CIPHER *type;
|
||||
uint8_t key[AES_MAX_KEY_SIZE];
|
||||
unsigned key_len;
|
||||
|
@ -207,7 +207,9 @@ __archive_nettle_md5final(archive_md5_ctx *ctx, void *md)
|
||||
static int
|
||||
__archive_openssl_md5init(archive_md5_ctx *ctx)
|
||||
{
|
||||
EVP_DigestInit(ctx, EVP_md5());
|
||||
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
||||
return (ARCHIVE_FAILED);
|
||||
EVP_DigestInit(*ctx, EVP_md5());
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -215,7 +217,7 @@ static int
|
||||
__archive_openssl_md5update(archive_md5_ctx *ctx, const void *indata,
|
||||
size_t insize)
|
||||
{
|
||||
EVP_DigestUpdate(ctx, indata, insize);
|
||||
EVP_DigestUpdate(*ctx, indata, insize);
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -226,8 +228,11 @@ __archive_openssl_md5final(archive_md5_ctx *ctx, void *md)
|
||||
* this is meant to cope with that. Real fix is probably to fix
|
||||
* archive_write_set_format_xar.c
|
||||
*/
|
||||
if (ctx->digest)
|
||||
EVP_DigestFinal(ctx, md, NULL);
|
||||
if (*ctx) {
|
||||
EVP_DigestFinal(*ctx, md, NULL);
|
||||
EVP_MD_CTX_free(*ctx);
|
||||
*ctx = NULL;
|
||||
}
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -359,7 +364,9 @@ __archive_nettle_ripemd160final(archive_rmd160_ctx *ctx, void *md)
|
||||
static int
|
||||
__archive_openssl_ripemd160init(archive_rmd160_ctx *ctx)
|
||||
{
|
||||
EVP_DigestInit(ctx, EVP_ripemd160());
|
||||
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
||||
return (ARCHIVE_FAILED);
|
||||
EVP_DigestInit(*ctx, EVP_ripemd160());
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -367,14 +374,18 @@ static int
|
||||
__archive_openssl_ripemd160update(archive_rmd160_ctx *ctx, const void *indata,
|
||||
size_t insize)
|
||||
{
|
||||
EVP_DigestUpdate(ctx, indata, insize);
|
||||
EVP_DigestUpdate(*ctx, indata, insize);
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
static int
|
||||
__archive_openssl_ripemd160final(archive_rmd160_ctx *ctx, void *md)
|
||||
{
|
||||
EVP_DigestFinal(ctx, md, NULL);
|
||||
if (*ctx) {
|
||||
EVP_DigestFinal(*ctx, md, NULL);
|
||||
EVP_MD_CTX_free(*ctx);
|
||||
*ctx = NULL;
|
||||
}
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -509,7 +520,9 @@ __archive_nettle_sha1final(archive_sha1_ctx *ctx, void *md)
|
||||
static int
|
||||
__archive_openssl_sha1init(archive_sha1_ctx *ctx)
|
||||
{
|
||||
EVP_DigestInit(ctx, EVP_sha1());
|
||||
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
||||
return (ARCHIVE_FAILED);
|
||||
EVP_DigestInit(*ctx, EVP_sha1());
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -517,7 +530,7 @@ static int
|
||||
__archive_openssl_sha1update(archive_sha1_ctx *ctx, const void *indata,
|
||||
size_t insize)
|
||||
{
|
||||
EVP_DigestUpdate(ctx, indata, insize);
|
||||
EVP_DigestUpdate(*ctx, indata, insize);
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -528,8 +541,11 @@ __archive_openssl_sha1final(archive_sha1_ctx *ctx, void *md)
|
||||
* this is meant to cope with that. Real fix is probably to fix
|
||||
* archive_write_set_format_xar.c
|
||||
*/
|
||||
if (ctx->digest)
|
||||
EVP_DigestFinal(ctx, md, NULL);
|
||||
if (*ctx) {
|
||||
EVP_DigestFinal(*ctx, md, NULL);
|
||||
EVP_MD_CTX_free(*ctx);
|
||||
*ctx = NULL;
|
||||
}
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -733,7 +749,9 @@ __archive_nettle_sha256final(archive_sha256_ctx *ctx, void *md)
|
||||
static int
|
||||
__archive_openssl_sha256init(archive_sha256_ctx *ctx)
|
||||
{
|
||||
EVP_DigestInit(ctx, EVP_sha256());
|
||||
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
||||
return (ARCHIVE_FAILED);
|
||||
EVP_DigestInit(*ctx, EVP_sha256());
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -741,14 +759,18 @@ static int
|
||||
__archive_openssl_sha256update(archive_sha256_ctx *ctx, const void *indata,
|
||||
size_t insize)
|
||||
{
|
||||
EVP_DigestUpdate(ctx, indata, insize);
|
||||
EVP_DigestUpdate(*ctx, indata, insize);
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
static int
|
||||
__archive_openssl_sha256final(archive_sha256_ctx *ctx, void *md)
|
||||
{
|
||||
EVP_DigestFinal(ctx, md, NULL);
|
||||
if (*ctx) {
|
||||
EVP_DigestFinal(*ctx, md, NULL);
|
||||
EVP_MD_CTX_free(*ctx);
|
||||
*ctx = NULL;
|
||||
}
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -928,7 +950,9 @@ __archive_nettle_sha384final(archive_sha384_ctx *ctx, void *md)
|
||||
static int
|
||||
__archive_openssl_sha384init(archive_sha384_ctx *ctx)
|
||||
{
|
||||
EVP_DigestInit(ctx, EVP_sha384());
|
||||
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
||||
return (ARCHIVE_FAILED);
|
||||
EVP_DigestInit(*ctx, EVP_sha384());
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -936,14 +960,18 @@ static int
|
||||
__archive_openssl_sha384update(archive_sha384_ctx *ctx, const void *indata,
|
||||
size_t insize)
|
||||
{
|
||||
EVP_DigestUpdate(ctx, indata, insize);
|
||||
EVP_DigestUpdate(*ctx, indata, insize);
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
static int
|
||||
__archive_openssl_sha384final(archive_sha384_ctx *ctx, void *md)
|
||||
{
|
||||
EVP_DigestFinal(ctx, md, NULL);
|
||||
if (*ctx) {
|
||||
EVP_DigestFinal(*ctx, md, NULL);
|
||||
EVP_MD_CTX_free(*ctx);
|
||||
*ctx = NULL;
|
||||
}
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -1147,7 +1175,9 @@ __archive_nettle_sha512final(archive_sha512_ctx *ctx, void *md)
|
||||
static int
|
||||
__archive_openssl_sha512init(archive_sha512_ctx *ctx)
|
||||
{
|
||||
EVP_DigestInit(ctx, EVP_sha512());
|
||||
if ((*ctx = EVP_MD_CTX_new()) == NULL)
|
||||
return (ARCHIVE_FAILED);
|
||||
EVP_DigestInit(*ctx, EVP_sha512());
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
@ -1155,14 +1185,18 @@ static int
|
||||
__archive_openssl_sha512update(archive_sha512_ctx *ctx, const void *indata,
|
||||
size_t insize)
|
||||
{
|
||||
EVP_DigestUpdate(ctx, indata, insize);
|
||||
EVP_DigestUpdate(*ctx, indata, insize);
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
static int
|
||||
__archive_openssl_sha512final(archive_sha512_ctx *ctx, void *md)
|
||||
{
|
||||
EVP_DigestFinal(ctx, md, NULL);
|
||||
if (*ctx) {
|
||||
EVP_DigestFinal(*ctx, md, NULL);
|
||||
EVP_MD_CTX_free(*ctx);
|
||||
*ctx = NULL;
|
||||
}
|
||||
return (ARCHIVE_OK);
|
||||
}
|
||||
|
||||
|
@ -134,7 +134,7 @@
|
||||
defined(ARCHIVE_CRYPTO_SHA384_OPENSSL) ||\
|
||||
defined(ARCHIVE_CRYPTO_SHA512_OPENSSL)
|
||||
#define ARCHIVE_CRYPTO_OPENSSL 1
|
||||
#include <openssl/evp.h>
|
||||
#include "archive_openssl_evp_private.h"
|
||||
#endif
|
||||
|
||||
/* Windows crypto headers */
|
||||
@ -161,7 +161,7 @@ typedef CC_MD5_CTX archive_md5_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_MD5_NETTLE)
|
||||
typedef struct md5_ctx archive_md5_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_MD5_OPENSSL)
|
||||
typedef EVP_MD_CTX archive_md5_ctx;
|
||||
typedef EVP_MD_CTX *archive_md5_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_MD5_WIN)
|
||||
typedef Digest_CTX archive_md5_ctx;
|
||||
#else
|
||||
@ -175,7 +175,7 @@ typedef RIPEMD160_CTX archive_rmd160_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_RMD160_NETTLE)
|
||||
typedef struct ripemd160_ctx archive_rmd160_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_RMD160_OPENSSL)
|
||||
typedef EVP_MD_CTX archive_rmd160_ctx;
|
||||
typedef EVP_MD_CTX *archive_rmd160_ctx;
|
||||
#else
|
||||
typedef unsigned char archive_rmd160_ctx;
|
||||
#endif
|
||||
@ -189,7 +189,7 @@ typedef CC_SHA1_CTX archive_sha1_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA1_NETTLE)
|
||||
typedef struct sha1_ctx archive_sha1_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA1_OPENSSL)
|
||||
typedef EVP_MD_CTX archive_sha1_ctx;
|
||||
typedef EVP_MD_CTX *archive_sha1_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA1_WIN)
|
||||
typedef Digest_CTX archive_sha1_ctx;
|
||||
#else
|
||||
@ -209,7 +209,7 @@ typedef CC_SHA256_CTX archive_sha256_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA256_NETTLE)
|
||||
typedef struct sha256_ctx archive_sha256_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA256_OPENSSL)
|
||||
typedef EVP_MD_CTX archive_sha256_ctx;
|
||||
typedef EVP_MD_CTX *archive_sha256_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA256_WIN)
|
||||
typedef Digest_CTX archive_sha256_ctx;
|
||||
#else
|
||||
@ -227,7 +227,7 @@ typedef CC_SHA512_CTX archive_sha384_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA384_NETTLE)
|
||||
typedef struct sha384_ctx archive_sha384_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA384_OPENSSL)
|
||||
typedef EVP_MD_CTX archive_sha384_ctx;
|
||||
typedef EVP_MD_CTX *archive_sha384_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA384_WIN)
|
||||
typedef Digest_CTX archive_sha384_ctx;
|
||||
#else
|
||||
@ -247,7 +247,7 @@ typedef CC_SHA512_CTX archive_sha512_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA512_NETTLE)
|
||||
typedef struct sha512_ctx archive_sha512_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA512_OPENSSL)
|
||||
typedef EVP_MD_CTX archive_sha512_ctx;
|
||||
typedef EVP_MD_CTX *archive_sha512_ctx;
|
||||
#elif defined(ARCHIVE_CRYPTO_SHA512_WIN)
|
||||
typedef Digest_CTX archive_sha512_ctx;
|
||||
#else
|
||||
|
@ -248,10 +248,9 @@ archive_entry_new2(struct archive *a)
|
||||
{
|
||||
struct archive_entry *entry;
|
||||
|
||||
entry = (struct archive_entry *)malloc(sizeof(*entry));
|
||||
entry = (struct archive_entry *)calloc(1, sizeof(*entry));
|
||||
if (entry == NULL)
|
||||
return (NULL);
|
||||
memset(entry, 0, sizeof(*entry));
|
||||
entry->archive = a;
|
||||
return (entry);
|
||||
}
|
||||
|
@ -176,8 +176,10 @@ __hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx)
|
||||
static int
|
||||
__hmac_sha1_init(archive_hmac_sha1_ctx *ctx, const uint8_t *key, size_t key_len)
|
||||
{
|
||||
HMAC_CTX_init(ctx);
|
||||
HMAC_Init(ctx, key, key_len, EVP_sha1());
|
||||
*ctx = HMAC_CTX_new();
|
||||
if (*ctx == NULL)
|
||||
return -1;
|
||||
HMAC_Init_ex(*ctx, key, key_len, EVP_sha1(), NULL);
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -185,22 +187,22 @@ static void
|
||||
__hmac_sha1_update(archive_hmac_sha1_ctx *ctx, const uint8_t *data,
|
||||
size_t data_len)
|
||||
{
|
||||
HMAC_Update(ctx, data, data_len);
|
||||
HMAC_Update(*ctx, data, data_len);
|
||||
}
|
||||
|
||||
static void
|
||||
__hmac_sha1_final(archive_hmac_sha1_ctx *ctx, uint8_t *out, size_t *out_len)
|
||||
{
|
||||
unsigned int len = (unsigned int)*out_len;
|
||||
HMAC_Final(ctx, out, &len);
|
||||
HMAC_Final(*ctx, out, &len);
|
||||
*out_len = len;
|
||||
}
|
||||
|
||||
static void
|
||||
__hmac_sha1_cleanup(archive_hmac_sha1_ctx *ctx)
|
||||
{
|
||||
HMAC_CTX_cleanup(ctx);
|
||||
memset(ctx, 0, sizeof(*ctx));
|
||||
HMAC_CTX_free(*ctx);
|
||||
*ctx = NULL;
|
||||
}
|
||||
|
||||
#else
|
||||
|
@ -70,9 +70,9 @@ typedef struct {
|
||||
typedef struct hmac_sha1_ctx archive_hmac_sha1_ctx;
|
||||
|
||||
#elif defined(HAVE_LIBCRYPTO)
|
||||
#include <openssl/hmac.h>
|
||||
#include "archive_openssl_hmac_private.h"
|
||||
|
||||
typedef HMAC_CTX archive_hmac_sha1_ctx;
|
||||
typedef HMAC_CTX* archive_hmac_sha1_ctx;
|
||||
|
||||
#else
|
||||
|
||||
|
@ -26,6 +26,10 @@
|
||||
#include "archive_platform.h"
|
||||
__FBSDID("$FreeBSD$");
|
||||
|
||||
#ifdef HAVE_ERRNO_H
|
||||
#include <errno.h>
|
||||
#endif
|
||||
|
||||
#include "archive_options_private.h"
|
||||
|
||||
static const char *
|
||||
@ -105,8 +109,11 @@ _archive_set_options(struct archive *a, const char *options,
|
||||
if (options == NULL || options[0] == '\0')
|
||||
return ARCHIVE_OK;
|
||||
|
||||
data = (char *)malloc(strlen(options) + 1);
|
||||
strcpy(data, options);
|
||||
if ((data = strdup(options)) == NULL) {
|
||||
archive_set_error(a,
|
||||
ENOMEM, "Out of memory adding file to list");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
s = (const char *)data;
|
||||
|
||||
do {
|
||||
|
@ -57,6 +57,7 @@ __FBSDID("$FreeBSD: head/lib/libarchive/archive_read.c 201157 2009-12-29 05:30:2
|
||||
|
||||
static int choose_filters(struct archive_read *);
|
||||
static int choose_format(struct archive_read *);
|
||||
static int close_filters(struct archive_read *);
|
||||
static struct archive_vtable *archive_read_vtable(void);
|
||||
static int64_t _archive_filter_bytes(struct archive *, int);
|
||||
static int _archive_filter_code(struct archive *, int);
|
||||
@ -528,7 +529,7 @@ archive_read_open1(struct archive *_a)
|
||||
{
|
||||
slot = choose_format(a);
|
||||
if (slot < 0) {
|
||||
__archive_read_close_filters(a);
|
||||
close_filters(a);
|
||||
a->archive.state = ARCHIVE_STATE_FATAL;
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
@ -582,7 +583,6 @@ choose_filters(struct archive_read *a)
|
||||
/* Verify the filter by asking it for some data. */
|
||||
__archive_read_filter_ahead(a->filter, 1, &avail);
|
||||
if (avail < 0) {
|
||||
__archive_read_close_filters(a);
|
||||
__archive_read_free_filters(a);
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
@ -601,7 +601,6 @@ choose_filters(struct archive_read *a)
|
||||
a->filter = filter;
|
||||
r = (best_bidder->init)(a->filter);
|
||||
if (r != ARCHIVE_OK) {
|
||||
__archive_read_close_filters(a);
|
||||
__archive_read_free_filters(a);
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
@ -986,8 +985,8 @@ _archive_read_data_block(struct archive *_a,
|
||||
return (a->format->read_data)(a, buff, size, offset);
|
||||
}
|
||||
|
||||
int
|
||||
__archive_read_close_filters(struct archive_read *a)
|
||||
static int
|
||||
close_filters(struct archive_read *a)
|
||||
{
|
||||
struct archive_read_filter *f = a->filter;
|
||||
int r = ARCHIVE_OK;
|
||||
@ -1010,6 +1009,9 @@ __archive_read_close_filters(struct archive_read *a)
|
||||
void
|
||||
__archive_read_free_filters(struct archive_read *a)
|
||||
{
|
||||
/* Make sure filters are closed and their buffers are freed */
|
||||
close_filters(a);
|
||||
|
||||
while (a->filter != NULL) {
|
||||
struct archive_read_filter *t = a->filter->upstream;
|
||||
free(a->filter);
|
||||
@ -1052,7 +1054,7 @@ _archive_read_close(struct archive *_a)
|
||||
/* TODO: Clean up the formatters. */
|
||||
|
||||
/* Release the filter objects. */
|
||||
r1 = __archive_read_close_filters(a);
|
||||
r1 = close_filters(a);
|
||||
if (r1 < r)
|
||||
r = r1;
|
||||
|
||||
|
@ -133,7 +133,6 @@ archive_read_append_filter(struct archive *_a, int code)
|
||||
a->filter = filter;
|
||||
r2 = (bidder->init)(a->filter);
|
||||
if (r2 != ARCHIVE_OK) {
|
||||
__archive_read_close_filters(a);
|
||||
__archive_read_free_filters(a);
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
@ -191,7 +190,6 @@ archive_read_append_filter_program_signature(struct archive *_a,
|
||||
a->filter = filter;
|
||||
r = (bidder->init)(a->filter);
|
||||
if (r != ARCHIVE_OK) {
|
||||
__archive_read_close_filters(a);
|
||||
__archive_read_free_filters(a);
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
|
@ -244,7 +244,7 @@ struct tree {
|
||||
int initial_filesystem_id;
|
||||
int current_filesystem_id;
|
||||
int max_filesystem_id;
|
||||
int allocated_filesytem;
|
||||
int allocated_filesystem;
|
||||
|
||||
int entry_fd;
|
||||
int entry_eof;
|
||||
@ -1382,7 +1382,7 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
|
||||
|
||||
for (i = 0; i < t->max_filesystem_id; i++) {
|
||||
if (t->filesystem_table[i].dev == dev) {
|
||||
/* There is the filesytem ID we've already generated. */
|
||||
/* There is the filesystem ID we've already generated. */
|
||||
t->current_filesystem_id = i;
|
||||
t->current_filesystem = &(t->filesystem_table[i]);
|
||||
return (ARCHIVE_OK);
|
||||
@ -1390,10 +1390,10 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
|
||||
}
|
||||
|
||||
/*
|
||||
* This is the new filesytem which we have to generate a new ID for.
|
||||
* This is the new filesystem which we have to generate a new ID for.
|
||||
*/
|
||||
fid = t->max_filesystem_id++;
|
||||
if (t->max_filesystem_id > t->allocated_filesytem) {
|
||||
if (t->max_filesystem_id > t->allocated_filesystem) {
|
||||
size_t s;
|
||||
void *p;
|
||||
|
||||
@ -1406,7 +1406,7 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
t->filesystem_table = (struct filesystem *)p;
|
||||
t->allocated_filesytem = s;
|
||||
t->allocated_filesystem = s;
|
||||
}
|
||||
t->current_filesystem_id = fid;
|
||||
t->current_filesystem = &(t->filesystem_table[fid]);
|
||||
@ -2063,8 +2063,7 @@ tree_push(struct tree *t, const char *path, int filesystem_id,
|
||||
{
|
||||
struct tree_entry *te;
|
||||
|
||||
te = malloc(sizeof(*te));
|
||||
memset(te, 0, sizeof(*te));
|
||||
te = calloc(1, sizeof(*te));
|
||||
te->next = t->stack;
|
||||
te->parent = t->current;
|
||||
if (te->parent)
|
||||
@ -2122,9 +2121,8 @@ tree_open(const char *path, int symlink_mode, int restore_time)
|
||||
{
|
||||
struct tree *t;
|
||||
|
||||
if ((t = malloc(sizeof(*t))) == NULL)
|
||||
if ((t = calloc(1, sizeof(*t))) == NULL)
|
||||
return (NULL);
|
||||
memset(t, 0, sizeof(*t));
|
||||
archive_string_init(&t->path);
|
||||
archive_string_ensure(&t->path, 31);
|
||||
t->initial_symlink_mode = symlink_mode;
|
||||
|
@ -168,7 +168,7 @@ struct tree {
|
||||
int initial_filesystem_id;
|
||||
int current_filesystem_id;
|
||||
int max_filesystem_id;
|
||||
int allocated_filesytem;
|
||||
int allocated_filesystem;
|
||||
|
||||
HANDLE entry_fh;
|
||||
int entry_eof;
|
||||
@ -389,10 +389,9 @@ archive_read_disk_new(void)
|
||||
{
|
||||
struct archive_read_disk *a;
|
||||
|
||||
a = (struct archive_read_disk *)malloc(sizeof(*a));
|
||||
a = (struct archive_read_disk *)calloc(1, sizeof(*a));
|
||||
if (a == NULL)
|
||||
return (NULL);
|
||||
memset(a, 0, sizeof(*a));
|
||||
a->archive.magic = ARCHIVE_READ_DISK_MAGIC;
|
||||
a->archive.state = ARCHIVE_STATE_NEW;
|
||||
a->archive.vtable = archive_read_disk_vtable();
|
||||
@ -1261,7 +1260,7 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
|
||||
|
||||
for (i = 0; i < t->max_filesystem_id; i++) {
|
||||
if (t->filesystem_table[i].dev == dev) {
|
||||
/* There is the filesytem ID we've already generated. */
|
||||
/* There is the filesystem ID we've already generated. */
|
||||
t->current_filesystem_id = i;
|
||||
t->current_filesystem = &(t->filesystem_table[i]);
|
||||
return (ARCHIVE_OK);
|
||||
@ -1269,10 +1268,10 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
|
||||
}
|
||||
|
||||
/*
|
||||
* There is a new filesytem, we generate a new ID for.
|
||||
* There is a new filesystem, we generate a new ID for.
|
||||
*/
|
||||
fid = t->max_filesystem_id++;
|
||||
if (t->max_filesystem_id > t->allocated_filesytem) {
|
||||
if (t->max_filesystem_id > t->allocated_filesystem) {
|
||||
size_t s;
|
||||
void *p;
|
||||
|
||||
@ -1285,7 +1284,7 @@ update_current_filesystem(struct archive_read_disk *a, int64_t dev)
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
t->filesystem_table = (struct filesystem *)p;
|
||||
t->allocated_filesytem = (int)s;
|
||||
t->allocated_filesystem = (int)s;
|
||||
}
|
||||
t->current_filesystem_id = fid;
|
||||
t->current_filesystem = &(t->filesystem_table[fid]);
|
||||
@ -1437,8 +1436,7 @@ tree_push(struct tree *t, const wchar_t *path, const wchar_t *full_path,
|
||||
{
|
||||
struct tree_entry *te;
|
||||
|
||||
te = malloc(sizeof(*te));
|
||||
memset(te, 0, sizeof(*te));
|
||||
te = calloc(1, sizeof(*te));
|
||||
te->next = t->stack;
|
||||
te->parent = t->current;
|
||||
if (te->parent)
|
||||
@ -1507,8 +1505,7 @@ tree_open(const wchar_t *path, int symlink_mode, int restore_time)
|
||||
{
|
||||
struct tree *t;
|
||||
|
||||
t = malloc(sizeof(*t));
|
||||
memset(t, 0, sizeof(*t));
|
||||
t = calloc(1, sizeof(*t));
|
||||
archive_string_init(&(t->full_path));
|
||||
archive_string_init(&t->path);
|
||||
archive_wstring_ensure(&t->path, 15);
|
||||
|
@ -52,12 +52,11 @@ struct archive_read_extract *
|
||||
__archive_read_get_extract(struct archive_read *a)
|
||||
{
|
||||
if (a->extract == NULL) {
|
||||
a->extract = (struct archive_read_extract *)malloc(sizeof(*a->extract));
|
||||
a->extract = (struct archive_read_extract *)calloc(1, sizeof(*a->extract));
|
||||
if (a->extract == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM, "Can't extract");
|
||||
return (NULL);
|
||||
}
|
||||
memset(a->extract, 0, sizeof(*a->extract));
|
||||
a->cleanup_archive_extract = archive_read_extract_cleanup;
|
||||
}
|
||||
return (a->extract);
|
||||
|
@ -70,12 +70,11 @@ archive_read_open_memory2(struct archive *a, const void *buff,
|
||||
{
|
||||
struct read_memory_data *mine;
|
||||
|
||||
mine = (struct read_memory_data *)malloc(sizeof(*mine));
|
||||
mine = (struct read_memory_data *)calloc(1, sizeof(*mine));
|
||||
if (mine == NULL) {
|
||||
archive_set_error(a, ENOMEM, "No memory");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(mine, 0, sizeof(*mine));
|
||||
mine->start = mine->p = (const unsigned char *)buff;
|
||||
mine->end = mine->start + size;
|
||||
mine->read_size = read_size;
|
||||
|
@ -252,7 +252,6 @@ int64_t __archive_read_consume(struct archive_read *, int64_t);
|
||||
int64_t __archive_read_filter_consume(struct archive_read_filter *, int64_t);
|
||||
int __archive_read_program(struct archive_read_filter *, const char *);
|
||||
void __archive_read_free_filters(struct archive_read *);
|
||||
int __archive_read_close_filters(struct archive_read *);
|
||||
struct archive_read_extract *__archive_read_get_extract(struct archive_read *);
|
||||
|
||||
|
||||
|
@ -320,30 +320,14 @@ uudecode_bidder_bid(struct archive_read_filter_bidder *self,
|
||||
if (l > 45)
|
||||
/* Normally, maximum length is 45(character 'M'). */
|
||||
return (0);
|
||||
while (l && len-nl > 0) {
|
||||
if (l > 0) {
|
||||
if (!uuchar[*b++])
|
||||
return (0);
|
||||
if (!uuchar[*b++])
|
||||
return (0);
|
||||
len -= 2;
|
||||
--l;
|
||||
}
|
||||
if (l > 0) {
|
||||
if (!uuchar[*b++])
|
||||
return (0);
|
||||
--len;
|
||||
--l;
|
||||
}
|
||||
if (l > 0) {
|
||||
if (!uuchar[*b++])
|
||||
return (0);
|
||||
--len;
|
||||
--l;
|
||||
}
|
||||
if (l > len - nl)
|
||||
return (0); /* Line too short. */
|
||||
while (l) {
|
||||
if (!uuchar[*b++])
|
||||
return (0);
|
||||
--len;
|
||||
--l;
|
||||
}
|
||||
if (len-nl < 0)
|
||||
return (0);
|
||||
if (len-nl == 1 &&
|
||||
(uuchar[*b] || /* Check sum. */
|
||||
(*b >= 'a' && *b <= 'z'))) {/* Padding data(MINIX). */
|
||||
|
@ -213,7 +213,7 @@ struct _7zip {
|
||||
int header_is_encoded;
|
||||
uint64_t header_bytes_remaining;
|
||||
unsigned long header_crc32;
|
||||
/* Header offset to check that reading pointes of the file contens
|
||||
/* Header offset to check that reading points of the file contents
|
||||
* will not exceed the header. */
|
||||
uint64_t header_offset;
|
||||
/* Base offset of the archive file for a seek in case reading SFX. */
|
||||
|
@ -104,13 +104,12 @@ archive_read_support_format_ar(struct archive *_a)
|
||||
archive_check_magic(_a, ARCHIVE_READ_MAGIC,
|
||||
ARCHIVE_STATE_NEW, "archive_read_support_format_ar");
|
||||
|
||||
ar = (struct ar *)malloc(sizeof(*ar));
|
||||
ar = (struct ar *)calloc(1, sizeof(*ar));
|
||||
if (ar == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM,
|
||||
"Can't allocate ar data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(ar, 0, sizeof(*ar));
|
||||
ar->strtab = NULL;
|
||||
|
||||
r = __archive_read_register_format(a,
|
||||
@ -316,7 +315,7 @@ _ar_read_header(struct archive_read *a, struct archive_entry *entry,
|
||||
* If we can't look up the real name, warn and return
|
||||
* the entry with the wrong name.
|
||||
*/
|
||||
if (ar->strtab == NULL || number > ar->strtab_size) {
|
||||
if (ar->strtab == NULL || number >= ar->strtab_size) {
|
||||
archive_set_error(&a->archive, EINVAL,
|
||||
"Can't find long filename for GNU/SVR4 archive entry");
|
||||
archive_entry_copy_pathname(entry, filename);
|
||||
|
@ -814,8 +814,8 @@ header_odc(struct archive_read *a, struct cpio *cpio,
|
||||
* NOTE: if a filename suffix is ".z", it is the file gziped by afio.
|
||||
* it would be nice that we can show uncompressed file size and we can
|
||||
* uncompressed file contents automatically, unfortunately we have nothing
|
||||
* to get a uncompressed file size while reading each header. it means
|
||||
* we also cannot uncompressed file contens under the our framework.
|
||||
* to get a uncompressed file size while reading each header. It means
|
||||
* we also cannot uncompress file contents under our framework.
|
||||
*/
|
||||
static int
|
||||
header_afiol(struct archive_read *a, struct cpio *cpio,
|
||||
|
@ -229,13 +229,12 @@ archive_read_support_format_mtree(struct archive *_a)
|
||||
archive_check_magic(_a, ARCHIVE_READ_MAGIC,
|
||||
ARCHIVE_STATE_NEW, "archive_read_support_format_mtree");
|
||||
|
||||
mtree = (struct mtree *)malloc(sizeof(*mtree));
|
||||
mtree = (struct mtree *)calloc(1, sizeof(*mtree));
|
||||
if (mtree == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM,
|
||||
"Can't allocate mtree data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(mtree, 0, sizeof(*mtree));
|
||||
mtree->fd = -1;
|
||||
|
||||
r = __archive_read_register_format(a, mtree, "mtree",
|
||||
|
@ -647,13 +647,12 @@ archive_read_support_format_rar(struct archive *_a)
|
||||
archive_check_magic(_a, ARCHIVE_READ_MAGIC, ARCHIVE_STATE_NEW,
|
||||
"archive_read_support_format_rar");
|
||||
|
||||
rar = (struct rar *)malloc(sizeof(*rar));
|
||||
rar = (struct rar *)calloc(sizeof(*rar), 1);
|
||||
if (rar == NULL)
|
||||
{
|
||||
archive_set_error(&a->archive, ENOMEM, "Can't allocate rar data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(rar, 0, sizeof(*rar));
|
||||
|
||||
/*
|
||||
* Until enough data has been read, we cannot tell about
|
||||
|
@ -297,7 +297,7 @@ archive_read_format_tar_cleanup(struct archive_read *a)
|
||||
/*
|
||||
* Validate number field
|
||||
*
|
||||
* This has to be pretty lenient in order to accomodate the enormous
|
||||
* This has to be pretty lenient in order to accommodate the enormous
|
||||
* variety of tar writers in the world:
|
||||
* = POSIX (IEEE Std 1003.1-1988) ustar requires octal values with leading
|
||||
* zeros and allows fields to be terminated with space or null characters
|
||||
@ -423,7 +423,7 @@ archive_read_format_tar_options(struct archive_read *a,
|
||||
|
||||
tar = (struct tar *)(a->format->data);
|
||||
if (strcmp(key, "compat-2x") == 0) {
|
||||
/* Handle UTF-8 filnames as libarchive 2.x */
|
||||
/* Handle UTF-8 filenames as libarchive 2.x */
|
||||
tar->compat_2x = (val != NULL && val[0] != 0);
|
||||
tar->init_default_conversion = tar->compat_2x;
|
||||
return (ARCHIVE_OK);
|
||||
@ -2187,12 +2187,11 @@ gnu_add_sparse_entry(struct archive_read *a, struct tar *tar,
|
||||
{
|
||||
struct sparse_block *p;
|
||||
|
||||
p = (struct sparse_block *)malloc(sizeof(*p));
|
||||
p = (struct sparse_block *)calloc(1, sizeof(*p));
|
||||
if (p == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM, "Out of memory");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(p, 0, sizeof(*p));
|
||||
if (tar->sparse_last != NULL)
|
||||
tar->sparse_last->next = p;
|
||||
else
|
||||
@ -2543,7 +2542,7 @@ tar_atol_base_n(const char *p, size_t char_cnt, int base)
|
||||
last_digit_limit = INT64_MAX % base;
|
||||
|
||||
/* the pointer will not be dereferenced if char_cnt is zero
|
||||
* due to the way the && operator is evaulated.
|
||||
* due to the way the && operator is evaluated.
|
||||
*/
|
||||
while (char_cnt != 0 && (*p == ' ' || *p == '\t')) {
|
||||
p++;
|
||||
|
@ -146,12 +146,11 @@ archive_read_support_format_warc(struct archive *_a)
|
||||
archive_check_magic(_a, ARCHIVE_READ_MAGIC,
|
||||
ARCHIVE_STATE_NEW, "archive_read_support_format_warc");
|
||||
|
||||
if ((w = malloc(sizeof(*w))) == NULL) {
|
||||
if ((w = calloc(1, sizeof(*w))) == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM,
|
||||
"Can't allocate warc data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(w, 0, sizeof(*w));
|
||||
|
||||
r = __archive_read_register_format(
|
||||
a, w, "warc",
|
||||
|
@ -1992,7 +1992,7 @@ archive_strncat_l(struct archive_string *as, const void *_p, size_t n,
|
||||
#if HAVE_ICONV
|
||||
|
||||
/*
|
||||
* Return -1 if conversion failes.
|
||||
* Return -1 if conversion fails.
|
||||
*/
|
||||
static int
|
||||
iconv_strncat_in_locale(struct archive_string *as, const void *_p,
|
||||
@ -2094,7 +2094,7 @@ iconv_strncat_in_locale(struct archive_string *as, const void *_p,
|
||||
|
||||
/*
|
||||
* Translate a string from a some CodePage to an another CodePage by
|
||||
* Windows APIs, and copy the result. Return -1 if conversion failes.
|
||||
* Windows APIs, and copy the result. Return -1 if conversion fails.
|
||||
*/
|
||||
static int
|
||||
strncat_in_codepage(struct archive_string *as,
|
||||
@ -3474,7 +3474,7 @@ strncat_from_utf8_libarchive2(struct archive_string *as,
|
||||
|
||||
/*
|
||||
* Convert a UTF-16BE/LE string to current locale and copy the result.
|
||||
* Return -1 if conversion failes.
|
||||
* Return -1 if conversion fails.
|
||||
*/
|
||||
static int
|
||||
win_strncat_from_utf16(struct archive_string *as, const void *_p, size_t bytes,
|
||||
@ -3598,7 +3598,7 @@ is_big_endian(void)
|
||||
|
||||
/*
|
||||
* Convert a current locale string to UTF-16BE/LE and copy the result.
|
||||
* Return -1 if conversion failes.
|
||||
* Return -1 if conversion fails.
|
||||
*/
|
||||
static int
|
||||
win_strncat_to_utf16(struct archive_string *as16, const void *_p,
|
||||
@ -3703,7 +3703,7 @@ win_strncat_to_utf16le(struct archive_string *as16, const void *_p,
|
||||
|
||||
/*
|
||||
* Convert a UTF-16BE string to current locale and copy the result.
|
||||
* Return -1 if conversion failes.
|
||||
* Return -1 if conversion fails.
|
||||
*/
|
||||
static int
|
||||
best_effort_strncat_from_utf16(struct archive_string *as, const void *_p,
|
||||
@ -3761,7 +3761,7 @@ best_effort_strncat_from_utf16le(struct archive_string *as, const void *_p,
|
||||
|
||||
/*
|
||||
* Convert a current locale string to UTF-16BE/LE and copy the result.
|
||||
* Return -1 if conversion failes.
|
||||
* Return -1 if conversion fails.
|
||||
*/
|
||||
static int
|
||||
best_effort_strncat_to_utf16(struct archive_string *as16, const void *_p,
|
||||
|
@ -891,7 +891,7 @@ __la_dosmaperr(unsigned long e)
|
||||
return;
|
||||
}
|
||||
|
||||
for (i = 0; i < (int)sizeof(doserrors); i++)
|
||||
for (i = 0; i < (int)sizeof(doserrors)/sizeof(doserrors[0]); i++)
|
||||
{
|
||||
if (doserrors[i].winerr == e)
|
||||
{
|
||||
|
@ -109,10 +109,9 @@ archive_write_new(void)
|
||||
struct archive_write *a;
|
||||
unsigned char *nulls;
|
||||
|
||||
a = (struct archive_write *)malloc(sizeof(*a));
|
||||
a = (struct archive_write *)calloc(1, sizeof(*a));
|
||||
if (a == NULL)
|
||||
return (NULL);
|
||||
memset(a, 0, sizeof(*a));
|
||||
a->archive.magic = ARCHIVE_WRITE_MAGIC;
|
||||
a->archive.state = ARCHIVE_STATE_NEW;
|
||||
a->archive.vtable = archive_write_vtable();
|
||||
@ -126,12 +125,11 @@ archive_write_new(void)
|
||||
|
||||
/* Initialize a block of nulls for padding purposes. */
|
||||
a->null_length = 1024;
|
||||
nulls = (unsigned char *)malloc(a->null_length);
|
||||
nulls = (unsigned char *)calloc(1, a->null_length);
|
||||
if (nulls == NULL) {
|
||||
free(a);
|
||||
return (NULL);
|
||||
}
|
||||
memset(nulls, 0, a->null_length);
|
||||
a->nulls = nulls;
|
||||
return (&a->archive);
|
||||
}
|
||||
|
@ -523,7 +523,7 @@ drive_compressor_independence(struct archive_write_filter *f, const char *p,
|
||||
archive_le32enc(data->out, outsize);
|
||||
data->out += 4;
|
||||
} else {
|
||||
/* The buffer is not compressed. The commpressed size was
|
||||
/* The buffer is not compressed. The compressed size was
|
||||
* bigger than its uncompressed size. */
|
||||
archive_le32enc(data->out, length | 0x80000000);
|
||||
data->out += 4;
|
||||
@ -608,7 +608,7 @@ drive_compressor_dependence(struct archive_write_filter *f, const char *p,
|
||||
archive_le32enc(data->out, outsize);
|
||||
data->out += 4;
|
||||
} else {
|
||||
/* The buffer is not compressed. The commpressed size was
|
||||
/* The buffer is not compressed. The compressed size was
|
||||
* bigger than its uncompressed size. */
|
||||
archive_le32enc(data->out, length | 0x80000000);
|
||||
data->out += 4;
|
||||
|
@ -1779,10 +1779,9 @@ archive_write_disk_new(void)
|
||||
{
|
||||
struct archive_write_disk *a;
|
||||
|
||||
a = (struct archive_write_disk *)malloc(sizeof(*a));
|
||||
a = (struct archive_write_disk *)calloc(1, sizeof(*a));
|
||||
if (a == NULL)
|
||||
return (NULL);
|
||||
memset(a, 0, sizeof(*a));
|
||||
a->archive.magic = ARCHIVE_WRITE_DISK_MAGIC;
|
||||
/* We're ready to write a header immediately. */
|
||||
a->archive.state = ARCHIVE_STATE_HEADER;
|
||||
@ -2701,7 +2700,7 @@ check_symlinks(struct archive_write_disk *a)
|
||||
* See also : http://msdn.microsoft.com/en-us/library/aa365247.aspx
|
||||
*/
|
||||
static void
|
||||
cleanup_pathname_win(struct archive_write_disk *a)
|
||||
cleanup_pathname_win(char *path)
|
||||
{
|
||||
wchar_t wc;
|
||||
char *p;
|
||||
@ -2712,7 +2711,7 @@ cleanup_pathname_win(struct archive_write_disk *a)
|
||||
mb = 0;
|
||||
complete = 1;
|
||||
utf8 = (strcmp(nl_langinfo(CODESET), "UTF-8") == 0)? 1: 0;
|
||||
for (p = a->name; *p != '\0'; p++) {
|
||||
for (p = path; *p != '\0'; p++) {
|
||||
++alen;
|
||||
if (*p == '\\') {
|
||||
/* If previous byte is smaller than 128,
|
||||
@ -2737,7 +2736,7 @@ cleanup_pathname_win(struct archive_write_disk *a)
|
||||
/*
|
||||
* Convert path separator in wide-character.
|
||||
*/
|
||||
p = a->name;
|
||||
p = path;
|
||||
while (*p != '\0' && alen) {
|
||||
l = mbtowc(&wc, p, alen);
|
||||
if (l == (size_t)-1) {
|
||||
@ -2778,7 +2777,7 @@ cleanup_pathname_fsobj(char *path, int *a_eno, struct archive_string *a_estr,
|
||||
}
|
||||
|
||||
#if defined(__CYGWIN__)
|
||||
cleanup_pathname_win(a);
|
||||
cleanup_pathname_win(path);
|
||||
#endif
|
||||
/* Skip leading '/'. */
|
||||
if (*src == '/') {
|
||||
|
@ -84,15 +84,13 @@ static void cleanup(void *);
|
||||
int
|
||||
archive_write_disk_set_standard_lookup(struct archive *a)
|
||||
{
|
||||
struct bucket *ucache = malloc(cache_size * sizeof(struct bucket));
|
||||
struct bucket *gcache = malloc(cache_size * sizeof(struct bucket));
|
||||
struct bucket *ucache = calloc(cache_size, sizeof(struct bucket));
|
||||
struct bucket *gcache = calloc(cache_size, sizeof(struct bucket));
|
||||
if (ucache == NULL || gcache == NULL) {
|
||||
free(ucache);
|
||||
free(gcache);
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(ucache, 0, cache_size * sizeof(struct bucket));
|
||||
memset(gcache, 0, cache_size * sizeof(struct bucket));
|
||||
archive_write_disk_set_group_lookup(a, gcache, lookup_gid, cleanup);
|
||||
archive_write_disk_set_user_lookup(a, ucache, lookup_uid, cleanup);
|
||||
return (ARCHIVE_OK);
|
||||
|
@ -1221,10 +1221,9 @@ archive_write_disk_new(void)
|
||||
{
|
||||
struct archive_write_disk *a;
|
||||
|
||||
a = (struct archive_write_disk *)malloc(sizeof(*a));
|
||||
a = (struct archive_write_disk *)calloc(1, sizeof(*a));
|
||||
if (a == NULL)
|
||||
return (NULL);
|
||||
memset(a, 0, sizeof(*a));
|
||||
a->archive.magic = ARCHIVE_WRITE_DISK_MAGIC;
|
||||
/* We're ready to write a header immediately. */
|
||||
a->archive.state = ARCHIVE_STATE_HEADER;
|
||||
|
@ -53,12 +53,11 @@ archive_write_open_memory(struct archive *a, void *buff, size_t buffSize, size_t
|
||||
{
|
||||
struct write_memory_data *mine;
|
||||
|
||||
mine = (struct write_memory_data *)malloc(sizeof(*mine));
|
||||
mine = (struct write_memory_data *)calloc(1, sizeof(*mine));
|
||||
if (mine == NULL) {
|
||||
archive_set_error(a, ENOMEM, "No memory");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(mine, 0, sizeof(*mine));
|
||||
mine->buff = buff;
|
||||
mine->size = buffSize;
|
||||
mine->client_size = used;
|
||||
|
@ -126,12 +126,11 @@ archive_write_set_format_ar(struct archive_write *a)
|
||||
if (a->format_free != NULL)
|
||||
(a->format_free)(a);
|
||||
|
||||
ar = (struct ar_w *)malloc(sizeof(*ar));
|
||||
ar = (struct ar_w *)calloc(1, sizeof(*ar));
|
||||
if (ar == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM, "Can't allocate ar data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(ar, 0, sizeof(*ar));
|
||||
a->format_data = ar;
|
||||
|
||||
a->format_name = "ar";
|
||||
|
@ -116,12 +116,11 @@ archive_write_set_format_cpio_newc(struct archive *_a)
|
||||
if (a->format_free != NULL)
|
||||
(a->format_free)(a);
|
||||
|
||||
cpio = (struct cpio *)malloc(sizeof(*cpio));
|
||||
cpio = (struct cpio *)calloc(1, sizeof(*cpio));
|
||||
if (cpio == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM, "Can't allocate cpio data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(cpio, 0, sizeof(*cpio));
|
||||
a->format_data = cpio;
|
||||
a->format_name = "cpio";
|
||||
a->format_options = archive_write_newc_options;
|
||||
|
@ -3024,8 +3024,8 @@ set_directory_record_rr(unsigned char *bp, int dr_len,
|
||||
* +----+----+----+----+----+
|
||||
* 10 11 12 13 14 15
|
||||
*
|
||||
* - cflg : flag of componet
|
||||
* - clen : length of componet
|
||||
* - cflg : flag of component
|
||||
* - clen : length of component
|
||||
*/
|
||||
const char *sl;
|
||||
char sl_last;
|
||||
|
@ -127,13 +127,12 @@ archive_write_set_format_pax(struct archive *_a)
|
||||
if (a->format_free != NULL)
|
||||
(a->format_free)(a);
|
||||
|
||||
pax = (struct pax *)malloc(sizeof(*pax));
|
||||
pax = (struct pax *)calloc(1, sizeof(*pax));
|
||||
if (pax == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM,
|
||||
"Can't allocate pax data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(pax, 0, sizeof(*pax));
|
||||
a->format_data = pax;
|
||||
a->format_name = "pax";
|
||||
a->format_options = archive_write_pax_options;
|
||||
|
@ -113,12 +113,11 @@ archive_write_set_format_shar(struct archive *_a)
|
||||
if (a->format_free != NULL)
|
||||
(a->format_free)(a);
|
||||
|
||||
shar = (struct shar *)malloc(sizeof(*shar));
|
||||
shar = (struct shar *)calloc(1, sizeof(*shar));
|
||||
if (shar == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM, "Can't allocate shar data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(shar, 0, sizeof(*shar));
|
||||
archive_string_init(&shar->work);
|
||||
archive_string_init(&shar->quoted_name);
|
||||
a->format_data = shar;
|
||||
|
@ -184,13 +184,12 @@ archive_write_set_format_ustar(struct archive *_a)
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
|
||||
ustar = (struct ustar *)malloc(sizeof(*ustar));
|
||||
ustar = (struct ustar *)calloc(1, sizeof(*ustar));
|
||||
if (ustar == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM,
|
||||
"Can't allocate ustar data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(ustar, 0, sizeof(*ustar));
|
||||
a->format_data = ustar;
|
||||
a->format_name = "ustar";
|
||||
a->format_options = archive_write_ustar_options;
|
||||
|
@ -161,13 +161,12 @@ archive_write_set_format_v7tar(struct archive *_a)
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
|
||||
v7tar = (struct v7tar *)malloc(sizeof(*v7tar));
|
||||
v7tar = (struct v7tar *)calloc(1, sizeof(*v7tar));
|
||||
if (v7tar == NULL) {
|
||||
archive_set_error(&a->archive, ENOMEM,
|
||||
"Can't allocate v7tar data");
|
||||
return (ARCHIVE_FATAL);
|
||||
}
|
||||
memset(v7tar, 0, sizeof(*v7tar));
|
||||
a->format_data = v7tar;
|
||||
a->format_name = "tar (non-POSIX)";
|
||||
a->format_options = archive_write_v7tar_options;
|
||||
|
@ -192,7 +192,7 @@ struct file {
|
||||
struct file *parent; /* parent directory entry */
|
||||
/*
|
||||
* To manage sub directory files.
|
||||
* We use 'chnext' a menber of struct file to chain.
|
||||
* We use 'chnext' (a member of struct file) to chain.
|
||||
*/
|
||||
struct {
|
||||
struct file *first;
|
||||
@ -258,7 +258,7 @@ struct xar {
|
||||
/*
|
||||
* The list of all file entries is used to manage struct file
|
||||
* objects.
|
||||
* We use 'next' a menber of struct file to chain.
|
||||
* We use 'next' (a member of struct file) to chain.
|
||||
*/
|
||||
struct {
|
||||
struct file *first;
|
||||
@ -266,7 +266,7 @@ struct xar {
|
||||
} file_list;
|
||||
/*
|
||||
* The list of hard-linked file entries.
|
||||
* We use 'hlnext' a menber of struct file to chain.
|
||||
* We use 'hlnext' (a member of struct file) to chain.
|
||||
*/
|
||||
struct archive_rb_tree hardlink_rbtree;
|
||||
};
|
||||
|
@ -80,7 +80,7 @@ DEFINE_TEST(test_archive_read_add_passphrase_single)
|
||||
__archive_read_reset_passphrase(ar);
|
||||
/* Fist call, we should get "pass1" as a passphrase. */
|
||||
assertEqualString("pass1", __archive_read_next_passphrase(ar));
|
||||
/* Second call, we should get NULL which means all the pssphrases
|
||||
/* Second call, we should get NULL which means all the passphrases
|
||||
* are passed already. */
|
||||
assertEqualString(NULL, __archive_read_next_passphrase(ar));
|
||||
|
||||
@ -100,7 +100,7 @@ DEFINE_TEST(test_archive_read_add_passphrase_multiple)
|
||||
assertEqualString("pass1", __archive_read_next_passphrase(ar));
|
||||
/* Second call, we should get "pass2" as a passphrase. */
|
||||
assertEqualString("pass2", __archive_read_next_passphrase(ar));
|
||||
/* Third call, we should get NULL which means all the pssphrases
|
||||
/* Third call, we should get NULL which means all the passphrases
|
||||
* are passed already. */
|
||||
assertEqualString(NULL, __archive_read_next_passphrase(ar));
|
||||
|
||||
@ -171,7 +171,7 @@ DEFINE_TEST(test_archive_read_add_passphrase_set_callback2)
|
||||
__archive_read_reset_passphrase(ar);
|
||||
/* Fist call, we should get "passCallBack" as a passphrase. */
|
||||
assertEqualString("passCallBack", __archive_read_next_passphrase(ar));
|
||||
/* Second call, we should get NULL which means all the pssphrases
|
||||
/* Second call, we should get NULL which means all the passphrases
|
||||
* are passed already. */
|
||||
assertEqualString(NULL, __archive_read_next_passphrase(ar));
|
||||
|
||||
@ -193,7 +193,7 @@ DEFINE_TEST(test_archive_read_add_passphrase_set_callback3)
|
||||
__archive_read_reset_passphrase(ar);
|
||||
/* After reset passphrase, we should get "passCallBack"passphrase. */
|
||||
assertEqualString("passCallBack", __archive_read_next_passphrase(ar));
|
||||
/* Second call, we should get NULL which means all the pssphrases
|
||||
/* Second call, we should get NULL which means all the passphrases
|
||||
* are passed already. */
|
||||
assertEqualString(NULL, __archive_read_next_passphrase(ar));
|
||||
|
||||
@ -218,7 +218,7 @@ DEFINE_TEST(test_archive_read_add_passphrase_multiple_with_callback)
|
||||
assertEqualString("pass2", __archive_read_next_passphrase(ar));
|
||||
/* Third call, we should get "passCallBack" as a passphrase. */
|
||||
assertEqualString("passCallBack", __archive_read_next_passphrase(ar));
|
||||
/* Fourth call, we should get NULL which means all the pssphrases
|
||||
/* Fourth call, we should get NULL which means all the passphrases
|
||||
* are passed already. */
|
||||
assertEqualString(NULL, __archive_read_next_passphrase(ar));
|
||||
|
||||
@ -251,7 +251,7 @@ DEFINE_TEST(test_archive_read_add_passphrase_multiple_with_callback2)
|
||||
assertEqualString("pass1", __archive_read_next_passphrase(ar));
|
||||
/* Third call, we should get "passCallBack" as a passphrase. */
|
||||
assertEqualString("pass2", __archive_read_next_passphrase(ar));
|
||||
/* Fourth call, we should get NULL which means all the pssphrases
|
||||
/* Fourth call, we should get NULL which means all the passphrases
|
||||
* are passed already. */
|
||||
assertEqualString(NULL, __archive_read_next_passphrase(ar));
|
||||
|
||||
|
@ -347,7 +347,7 @@ DEFINE_TEST(test_pax_filename_encoding_KOI8R)
|
||||
return;
|
||||
}
|
||||
|
||||
/* Check if the paltform completely supports the string conversion. */
|
||||
/* Check if the platform completely supports the string conversion. */
|
||||
a = archive_write_new();
|
||||
assertEqualInt(ARCHIVE_OK, archive_write_set_format_pax(a));
|
||||
if (archive_write_set_options(a, "hdrcharset=UTF-8") != ARCHIVE_OK) {
|
||||
@ -394,7 +394,7 @@ DEFINE_TEST(test_pax_filename_encoding_CP1251)
|
||||
return;
|
||||
}
|
||||
|
||||
/* Check if the paltform completely supports the string conversion. */
|
||||
/* Check if the platform completely supports the string conversion. */
|
||||
a = archive_write_new();
|
||||
assertEqualInt(ARCHIVE_OK, archive_write_set_format_pax(a));
|
||||
if (archive_write_set_options(a, "hdrcharset=UTF-8") != ARCHIVE_OK) {
|
||||
@ -440,7 +440,7 @@ DEFINE_TEST(test_pax_filename_encoding_EUCJP)
|
||||
return;
|
||||
}
|
||||
|
||||
/* Check if the paltform completely supports the string conversion. */
|
||||
/* Check if the platform completely supports the string conversion. */
|
||||
a = archive_write_new();
|
||||
assertEqualInt(ARCHIVE_OK, archive_write_set_format_pax(a));
|
||||
if (archive_write_set_options(a, "hdrcharset=UTF-8") != ARCHIVE_OK) {
|
||||
@ -488,7 +488,7 @@ DEFINE_TEST(test_pax_filename_encoding_CP932)
|
||||
return;
|
||||
}
|
||||
|
||||
/* Check if the paltform completely supports the string conversion. */
|
||||
/* Check if the platform completely supports the string conversion. */
|
||||
a = archive_write_new();
|
||||
assertEqualInt(ARCHIVE_OK, archive_write_set_format_pax(a));
|
||||
if (archive_write_set_options(a, "hdrcharset=UTF-8") != ARCHIVE_OK) {
|
||||
|
@ -33,7 +33,7 @@ __FBSDID("$FreeBSD$");
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Test if the current filesytem is mounted with noatime option.
|
||||
* Test if the current filesystem is mounted with noatime option.
|
||||
*/
|
||||
static int
|
||||
atimeIsUpdated(void)
|
||||
|
@ -63,6 +63,13 @@ DEFINE_TEST(test_option_lz4)
|
||||
"but no such program is available on this system.");
|
||||
goto done;
|
||||
}
|
||||
/* On some systems the error won't be detected until closing
|
||||
time, by a 127 exit error returned by waitpid. */
|
||||
if (strstr(p, "Error closing") != NULL && !canLz4()) {
|
||||
skipping("This version of bsdcpio uses an external lz4 program "
|
||||
"but no such program is available on this system.");
|
||||
return;
|
||||
}
|
||||
failure("--lz4 option is broken: %s", p);
|
||||
assertEqualInt(r, 0);
|
||||
goto done;
|
||||
|
Loading…
x
Reference in New Issue
Block a user