|
Packit Service |
1d0348 |
/*-
|
|
Packit Service |
1d0348 |
* Copyright (c) 2013 Konrad Kleine
|
|
Packit Service |
1d0348 |
* Copyright (c) 2014 Michihiro NAKAJIMA
|
|
Packit Service |
1d0348 |
* All rights reserved.
|
|
Packit Service |
1d0348 |
*
|
|
Packit Service |
1d0348 |
* Redistribution and use in source and binary forms, with or without
|
|
Packit Service |
1d0348 |
* modification, are permitted provided that the following conditions
|
|
Packit Service |
1d0348 |
* are met:
|
|
Packit Service |
1d0348 |
* 1. Redistributions of source code must retain the above copyright
|
|
Packit Service |
1d0348 |
* notice, this list of conditions and the following disclaimer.
|
|
Packit Service |
1d0348 |
* 2. Redistributions in binary form must reproduce the above copyright
|
|
Packit Service |
1d0348 |
* notice, this list of conditions and the following disclaimer in the
|
|
Packit Service |
1d0348 |
* documentation and/or other materials provided with the distribution.
|
|
Packit Service |
1d0348 |
*
|
|
Packit Service |
1d0348 |
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
|
|
Packit Service |
1d0348 |
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
Packit Service |
1d0348 |
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
Packit Service |
1d0348 |
* IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
Packit Service |
1d0348 |
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
Packit Service |
1d0348 |
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
Packit Service |
1d0348 |
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
Packit Service |
1d0348 |
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
Packit Service |
1d0348 |
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
Packit Service |
1d0348 |
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
#include "test.h"
|
|
Packit Service |
1d0348 |
__FBSDID("$FreeBSD$");
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
static void
|
|
Packit Service |
1d0348 |
test_winzip_aes(const char *refname, int need_libz)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
struct archive_entry *ae;
|
|
Packit Service |
1d0348 |
struct archive *a;
|
|
Packit Service |
1d0348 |
char buff[512];
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Check if running system has cryptographic functionality. */
|
|
Packit Service |
1d0348 |
assert((a = archive_write_new()) != NULL);
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_write_set_format_zip(a));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_write_add_filter_none(a));
|
|
Packit Service |
1d0348 |
if (ARCHIVE_OK != archive_write_set_options(a,
|
|
Packit Service |
1d0348 |
"zip:encryption=aes256")) {
|
|
Packit Service |
1d0348 |
skipping("This system does not have cryptographic liberary");
|
|
Packit Service |
1d0348 |
archive_write_free(a);
|
|
Packit Service |
1d0348 |
return;
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
archive_write_free(a);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
extract_reference_file(refname);
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/*
|
|
Packit Service |
1d0348 |
* Extract a zip file without password.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
assert((a = archive_read_new()) != NULL);
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_read_support_filter_all(a));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_read_support_format_all(a));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK,
|
|
Packit Service |
1d0348 |
archive_read_open_filename(a, refname, 10240));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW,
|
|
Packit Service |
1d0348 |
archive_read_has_encrypted_entries(a));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Verify encrypted file "README" */
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae);;
|
|
Packit Service |
1d0348 |
assertEqualInt((AE_IFREG | 0644), archive_entry_mode(ae));
|
|
Packit Service |
1d0348 |
assertEqualString("README", archive_entry_pathname(ae));
|
|
Packit Service |
1d0348 |
assertEqualInt(6818, archive_entry_size(ae));
|
|
Packit Service |
1d0348 |
assertEqualInt(1, archive_entry_is_data_encrypted(ae));
|
|
Packit Service |
1d0348 |
assertEqualInt(0, archive_entry_is_metadata_encrypted(ae));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, 1, archive_read_has_encrypted_entries(a));
|
|
Packit Service |
1d0348 |
assertEqualInt(ARCHIVE_FAILED, archive_read_data(a, buff, sizeof(buff)));
|
|
Packit Service |
1d0348 |
assertEqualInt(1, archive_file_count(a));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* End of archive. */
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_EOF, archive_read_next_header(a, &ae);;
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Verify archive format. */
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_FILTER_NONE, archive_filter_code(a, 0));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_FORMAT_ZIP, archive_format(a));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Close the archive. */
|
|
Packit Service |
1d0348 |
assertEqualInt(ARCHIVE_OK, archive_read_close(a));
|
|
Packit Service |
1d0348 |
assertEqualInt(ARCHIVE_OK, archive_read_free(a));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/*
|
|
Packit Service |
1d0348 |
* Extract a zip file with password.
|
|
Packit Service |
1d0348 |
*/
|
|
Packit Service |
1d0348 |
assert((a = archive_read_new()) != NULL);
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_read_support_filter_all(a));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_read_support_format_all(a));
|
|
Packit Service |
1d0348 |
/* Pass three passphrases to decrypt a file content. */
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK,
|
|
Packit Service |
1d0348 |
archive_read_add_passphrase(a, "invalid_pass"));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK,
|
|
Packit Service |
1d0348 |
archive_read_add_passphrase(a, "invalid_phrase"));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK,
|
|
Packit Service |
1d0348 |
archive_read_add_passphrase(a, "password"));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK,
|
|
Packit Service |
1d0348 |
archive_read_open_filename(a, refname, 10240));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_READ_FORMAT_ENCRYPTION_DONT_KNOW,
|
|
Packit Service |
1d0348 |
archive_read_has_encrypted_entries(a));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Verify encrypted file "README" */
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae);;
|
|
Packit Service |
1d0348 |
assertEqualInt((AE_IFREG | 0644), archive_entry_mode(ae));
|
|
Packit Service |
1d0348 |
assertEqualString("README", archive_entry_pathname(ae));
|
|
Packit Service |
1d0348 |
assertEqualInt(6818, archive_entry_size(ae));
|
|
Packit Service |
1d0348 |
assertEqualInt(1, archive_entry_is_data_encrypted(ae));
|
|
Packit Service |
1d0348 |
assertEqualInt(0, archive_entry_is_metadata_encrypted(ae));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, 1, archive_read_has_encrypted_entries(a));
|
|
Packit Service |
1d0348 |
if (!need_libz || archive_zlib_version() != NULL) {
|
|
Packit Service |
1d0348 |
assertEqualInt(512, archive_read_data(a, buff, sizeof(buff)));
|
|
Packit Service |
1d0348 |
} else {
|
|
Packit Service |
1d0348 |
assertEqualInt(ARCHIVE_FAILED, archive_read_data(a, buff, 19));
|
|
Packit Service |
1d0348 |
assertEqualString(archive_error_string(a),
|
|
Packit Service |
1d0348 |
"Unsupported ZIP compression method (deflation)");
|
|
Packit Service |
1d0348 |
assert(archive_errno(a) != 0);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
assertEqualInt(1, archive_file_count(a));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* End of archive. */
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_EOF, archive_read_next_header(a, &ae);;
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Verify archive format. */
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_FILTER_NONE, archive_filter_code(a, 0));
|
|
Packit Service |
1d0348 |
assertEqualIntA(a, ARCHIVE_FORMAT_ZIP, archive_format(a));
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
/* Close the archive. */
|
|
Packit Service |
1d0348 |
assertEqualInt(ARCHIVE_OK, archive_read_close(a));
|
|
Packit Service |
1d0348 |
assertEqualInt(ARCHIVE_OK, archive_read_free(a));
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
DEFINE_TEST(test_read_format_zip_winzip_aes128)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
/* WinZip AES-128 encryption. */
|
|
Packit Service |
1d0348 |
test_winzip_aes("test_read_format_zip_winzip_aes128.zip", 1);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
DEFINE_TEST(test_read_format_zip_winzip_aes256)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
/* WinZip AES-256 encryption. */
|
|
Packit Service |
1d0348 |
test_winzip_aes("test_read_format_zip_winzip_aes256.zip", 1);
|
|
Packit Service |
1d0348 |
}
|
|
Packit Service |
1d0348 |
|
|
Packit Service |
1d0348 |
DEFINE_TEST(test_read_format_zip_winzip_aes256_stored)
|
|
Packit Service |
1d0348 |
{
|
|
Packit Service |
1d0348 |
/* WinZip AES-256 encryption with stored data. */
|
|
Packit Service |
1d0348 |
test_winzip_aes("test_read_format_zip_winzip_aes256_stored.zip", 0);
|
|
Packit Service |
1d0348 |
}
|