1 /*-
2 * Copyright (c) 2003-2008 Tim Kientzle
3 * Copyright (c) 2017 Martin Matuska
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 */
26 #include "test.h"
27
28 #if ARCHIVE_ACL_POSIX1E
29 #include <sys/acl.h>
30 #if HAVE_ACL_GET_PERM
31 #include <acl/libacl.h>
32 #define ACL_GET_PERM acl_get_perm
33 #elif HAVE_ACL_GET_PERM_NP
34 #define ACL_GET_PERM acl_get_perm_np
35 #endif
36
37 static struct archive_test_acl_t acls2[] = {
38 { ARCHIVE_ENTRY_ACL_TYPE_ACCESS, ARCHIVE_ENTRY_ACL_EXECUTE | ARCHIVE_ENTRY_ACL_READ,
39 ARCHIVE_ENTRY_ACL_USER_OBJ, -1, "" },
40 { ARCHIVE_ENTRY_ACL_TYPE_ACCESS, ARCHIVE_ENTRY_ACL_READ,
41 ARCHIVE_ENTRY_ACL_USER, 77, "user77" },
42 { ARCHIVE_ENTRY_ACL_TYPE_ACCESS, 0,
43 ARCHIVE_ENTRY_ACL_USER, 78, "user78" },
44 { ARCHIVE_ENTRY_ACL_TYPE_ACCESS, ARCHIVE_ENTRY_ACL_READ,
45 ARCHIVE_ENTRY_ACL_GROUP_OBJ, -1, "" },
46 { ARCHIVE_ENTRY_ACL_TYPE_ACCESS, 0007,
47 ARCHIVE_ENTRY_ACL_GROUP, 78, "group78" },
48 { ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
49 ARCHIVE_ENTRY_ACL_WRITE | ARCHIVE_ENTRY_ACL_EXECUTE,
50 ARCHIVE_ENTRY_ACL_OTHER, -1, "" },
51 { ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
52 ARCHIVE_ENTRY_ACL_WRITE | ARCHIVE_ENTRY_ACL_READ | ARCHIVE_ENTRY_ACL_EXECUTE,
53 ARCHIVE_ENTRY_ACL_MASK, -1, "" },
54 };
55
56 static int
57 #if ARCHIVE_ACL_SUNOS
acl_entry_get_perm(aclent_t * aclent)58 acl_entry_get_perm(aclent_t *aclent)
59 #else
60 acl_entry_get_perm(acl_entry_t aclent)
61 #endif
62 {
63 int permset = 0;
64 #if ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_LIBACL
65 acl_permset_t opaque_ps;
66 #endif
67
68 #if ARCHIVE_ACL_SUNOS
69 if (aclent->a_perm & 1)
70 permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
71 if (aclent->a_perm & 2)
72 permset |= ARCHIVE_ENTRY_ACL_WRITE;
73 if (aclent->a_perm & 4)
74 permset |= ARCHIVE_ENTRY_ACL_READ;
75 #else
76 /* translate the silly opaque permset to a bitmap */
77 acl_get_permset(aclent, &opaque_ps);
78 if (ACL_GET_PERM(opaque_ps, ACL_EXECUTE))
79 permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
80 if (ACL_GET_PERM(opaque_ps, ACL_WRITE))
81 permset |= ARCHIVE_ENTRY_ACL_WRITE;
82 if (ACL_GET_PERM(opaque_ps, ACL_READ))
83 permset |= ARCHIVE_ENTRY_ACL_READ;
84 #endif
85 return permset;
86 }
87
88 #if 0
89 static int
90 acl_get_specific_entry(acl_t acl, acl_tag_t requested_tag_type, int requested_tag) {
91 int entry_id = ACL_FIRST_ENTRY;
92 acl_entry_t acl_entry;
93 acl_tag_t acl_tag_type;
94
95 while (1 == acl_get_entry(acl, entry_id, &acl_entry)) {
96 /* After the first time... */
97 entry_id = ACL_NEXT_ENTRY;
98
99 /* If this matches, return perm mask */
100 acl_get_tag_type(acl_entry, &acl_tag_type);
101 if (acl_tag_type == requested_tag_type) {
102 switch (acl_tag_type) {
103 case ACL_USER_OBJ:
104 if ((uid_t)requested_tag == *(uid_t *)(acl_get_qualifier(acl_entry))) {
105 return acl_entry_get_perm(acl_entry);
106 }
107 break;
108 case ACL_GROUP_OBJ:
109 if ((gid_t)requested_tag == *(gid_t *)(acl_get_qualifier(acl_entry))) {
110 return acl_entry_get_perm(acl_entry);
111 }
112 break;
113 case ACL_USER:
114 case ACL_GROUP:
115 case ACL_OTHER:
116 return acl_entry_get_perm(acl_entry);
117 default:
118 failure("Unexpected ACL tag type");
119 assert(0);
120 }
121 }
122
123
124 }
125 return -1;
126 }
127 #endif
128
129 #if ARCHIVE_ACL_SUNOS
130 static int
acl_match(aclent_t * aclent,struct archive_test_acl_t * myacl)131 acl_match(aclent_t *aclent, struct archive_test_acl_t *myacl)
132 {
133
134 if (myacl->permset != acl_entry_get_perm(aclent))
135 return (0);
136
137 switch (aclent->a_type) {
138 case DEF_USER_OBJ:
139 case USER_OBJ:
140 if (myacl->tag != ARCHIVE_ENTRY_ACL_USER_OBJ) return (0);
141 break;
142 if (myacl->tag != ARCHIVE_ENTRY_ACL_USER)
143 return (0);
144 if ((uid_t)myacl->qual != aclent->a_id)
145 return (0);
146 break;
147 case DEF_GROUP_OBJ:
148 case GROUP_OBJ:
149 if (myacl->tag != ARCHIVE_ENTRY_ACL_GROUP_OBJ) return (0);
150 break;
151 case DEF_GROUP:
152 case GROUP:
153 if (myacl->tag != ARCHIVE_ENTRY_ACL_GROUP)
154 return (0);
155 if ((gid_t)myacl->qual != aclent->a_id)
156 return (0);
157 break;
158 case DEF_CLASS_OBJ:
159 case CLASS_OBJ:
160 if (myacl->tag != ARCHIVE_ENTRY_ACL_MASK) return (0);
161 break;
162 case DEF_OTHER_OBJ:
163 case OTHER_OBJ:
164 if (myacl->tag != ARCHIVE_ENTRY_ACL_OTHER) return (0);
165 break;
166 }
167 return (1);
168 }
169
170 #else /* ARCHIVE_ACL_FREEBSD || ARCHIVE_ACL_LIBACL */
171 static int
acl_match(acl_entry_t aclent,struct archive_test_acl_t * myacl)172 acl_match(acl_entry_t aclent, struct archive_test_acl_t *myacl)
173 {
174 gid_t g, *gp;
175 uid_t u, *up;
176 acl_tag_t tag_type;
177
178 if (myacl->permset != acl_entry_get_perm(aclent))
179 return (0);
180
181 acl_get_tag_type(aclent, &tag_type);
182 switch (tag_type) {
183 case ACL_USER_OBJ:
184 if (myacl->tag != ARCHIVE_ENTRY_ACL_USER_OBJ) return (0);
185 break;
186 case ACL_USER:
187 if (myacl->tag != ARCHIVE_ENTRY_ACL_USER)
188 return (0);
189 up = acl_get_qualifier(aclent);
190 u = *up;
191 acl_free(up);
192 if ((uid_t)myacl->qual != u)
193 return (0);
194 break;
195 case ACL_GROUP_OBJ:
196 if (myacl->tag != ARCHIVE_ENTRY_ACL_GROUP_OBJ) return (0);
197 break;
198 case ACL_GROUP:
199 if (myacl->tag != ARCHIVE_ENTRY_ACL_GROUP)
200 return (0);
201 gp = acl_get_qualifier(aclent);
202 g = *gp;
203 acl_free(gp);
204 if ((gid_t)myacl->qual != g)
205 return (0);
206 break;
207 case ACL_MASK:
208 if (myacl->tag != ARCHIVE_ENTRY_ACL_MASK) return (0);
209 break;
210 case ACL_OTHER:
211 if (myacl->tag != ARCHIVE_ENTRY_ACL_OTHER) return (0);
212 break;
213 }
214 return (1);
215 }
216 #endif
217
218 static void
compare_acls(void * aclp,int aclcnt,struct archive_test_acl_t * myacls,int n)219 compare_acls(
220 #if ARCHIVE_ACL_SUNOS
221 void *aclp, int aclcnt,
222 #else
223 acl_t acl,
224 #endif
225 struct archive_test_acl_t *myacls, int n)
226 {
227 int *marker;
228 int matched;
229 int i;
230 #if ARCHIVE_ACL_SUNOS
231 int e;
232 aclent_t *acl_entry;
233 #else
234 int entry_id = ACL_FIRST_ENTRY;
235 acl_entry_t acl_entry;
236 #endif
237
238 /* Count ACL entries in myacls array and allocate an indirect array. */
239 marker = malloc(sizeof(marker[0]) * n);
240 if (marker == NULL)
241 return;
242 for (i = 0; i < n; i++)
243 marker[i] = i;
244
245 /*
246 * Iterate over acls in system acl object, try to match each
247 * one with an item in the myacls array.
248 */
249 #if ARCHIVE_ACL_SUNOS
250 for(e = 0; e < aclcnt; e++) {
251 acl_entry = &((aclent_t *)aclp)[e];
252 #else
253 while (1 == acl_get_entry(acl, entry_id, &acl_entry)) {
254 /* After the first time... */
255 entry_id = ACL_NEXT_ENTRY;
256 #endif
257
258 /* Search for a matching entry (tag and qualifier) */
259 for (i = 0, matched = 0; i < n && !matched; i++) {
260 if (acl_match(acl_entry, &myacls[marker[i]])) {
261 /* We found a match; remove it. */
262 marker[i] = marker[n - 1];
263 n--;
264 matched = 1;
265 }
266 }
267
268 /* TODO: Print out more details in this case. */
269 failure("ACL entry on file that shouldn't be there");
270 assert(matched == 1);
271 }
272
273 /* Dump entries in the myacls array that weren't in the system acl. */
274 for (i = 0; i < n; ++i) {
275 failure(" ACL entry missing from file: "
276 "type=%#010x,permset=%#010x,tag=%d,qual=%d,name=``%s''\n",
277 (unsigned int)myacls[marker[i]].type,
278 (unsigned int)myacls[marker[i]].permset,
279 myacls[marker[i]].tag, myacls[marker[i]].qual,
280 myacls[marker[i]].name);
281 assert(0); /* Record this as a failure. */
282 }
283 free(marker);
284 }
285 #endif
286
287 /*
288 * Verify ACL restore-to-disk. This test is Platform-specific.
289 */
290
291 DEFINE_TEST(test_acl_platform_posix1e_restore)
292 {
293 #if !ARCHIVE_ACL_POSIX1E
294 skipping("POSIX.1e ACLs are not supported on this platform");
295 #else /* ARCHIVE_ACL_POSIX1E */
296 struct stat st;
297 struct archive *a;
298 struct archive_entry *ae;
299 #if ARCHIVE_ACL_SUNOS
300 void *aclp;
301 int aclcnt;
302 #else
303 acl_t acl;
304 #endif
305
306 assertMakeFile("pretest", 0644, "a");
307
308 if (setTestAcl("pretest") != ARCHIVE_TEST_ACL_TYPE_POSIX1E) {
309 skipping("POSIX.1e ACLs are not writable on this filesystem");
310 return;
311 }
312
313 /* Create a write-to-disk object. */
314 assert(NULL != (a = archive_write_disk_new()));
315 archive_write_disk_set_options(a,
316 ARCHIVE_EXTRACT_TIME | ARCHIVE_EXTRACT_PERM | ARCHIVE_EXTRACT_ACL);
317
318 /* Populate an archive entry with some metadata, including ACL info */
319 ae = archive_entry_new();
320 assert(ae != NULL);
321 archive_entry_set_pathname(ae, "test0");
322 archive_entry_set_mtime(ae, 123456, 7890);
323 archive_entry_set_size(ae, 0);
324 assertEntrySetAcls(ae, acls2, sizeof(acls2)/sizeof(acls2[0]));
325 assertEqualIntA(a, ARCHIVE_OK, archive_write_header(a, ae));
326 archive_entry_free(ae);
327
328 /* Close the archive. */
329 assertEqualIntA(a, ARCHIVE_OK, archive_write_close(a));
330 assertEqualInt(ARCHIVE_OK, archive_write_free(a));
331
332 /* Verify the data on disk. */
333 assertEqualInt(0, stat("test0", &st));
334 assertEqualInt(st.st_mtime, 123456);
335 #if ARCHIVE_ACL_SUNOS
336 aclp = sunacl_get(GETACL, &aclcnt, 0, "test0");
337 failure("acl(): errno = %d (%s)", errno, strerror(errno));
338 assert(aclp != NULL);
339 #else
340 acl = acl_get_file("test0", ACL_TYPE_ACCESS);
341 failure("acl_get_file(): errno = %d (%s)", errno, strerror(errno));
342 assert(acl != (acl_t)NULL);
343 #endif
344 #if ARCHIVE_ACL_SUNOS
345 compare_acls(aclp, aclcnt, acls2, sizeof(acls2)/sizeof(acls2[0]));
346 free(aclp);
347 aclp = NULL;
348 #else
349 compare_acls(acl, acls2, sizeof(acls2)/sizeof(acls2[0]));
350 acl_free(acl);
351 #endif
352
353 #endif /* ARCHIVE_ACL_POSIX1E */
354 }
355
356 /*
357 * Verify ACL read-from-disk. This test is Platform-specific.
358 */
359 DEFINE_TEST(test_acl_platform_posix1e_read)
360 {
361 #if !ARCHIVE_ACL_POSIX1E
362 skipping("POSIX.1e ACLs are not supported on this platform");
363 #else /* ARCHIVE_ACL_POSIX1E */
364 struct archive *a;
365 struct archive_entry *ae;
366 int n, fd, flags, dflags;
367 char *acl_text;
368 const char *func, *acl1_text, *acl2_text, *acl3_text;
369 #if ARCHIVE_ACL_SUNOS
370 void *aclp;
371 int aclcnt;
372 #else
373 acl_t acl1, acl2, acl3;
374 #endif
375
376 /*
377 * Manually construct a directory and two files with
378 * different ACLs. This also serves to verify that ACLs
379 * are supported on the local filesystem.
380 */
381
382 /* Create a test file f1 with acl1 */
383 #if ARCHIVE_ACL_SUNOS
384 acl1_text = "user::rwx,"
385 "group::rwx,"
386 "other:rwx,"
387 "user:1:rw-,"
388 "group:15:r-x,"
389 "mask:rwx";
390 aclent_t aclp1[] = {
391 { USER_OBJ, -1, 4 | 2 | 1 },
392 { USER, 1, 4 | 2 },
393 { GROUP_OBJ, -1, 4 | 2 | 1 },
394 { GROUP, 15, 4 | 1 },
395 { CLASS_OBJ, -1, 4 | 2 | 1 },
396 { OTHER_OBJ, -1, 4 | 2 | 1 }
397 };
398 #else
399 acl1_text = "user::rwx\n"
400 "group::rwx\n"
401 "other::rwx\n"
402 "user:1:rw-\n"
403 "group:15:r-x\n"
404 "mask::rwx";
405 acl1 = acl_from_text(acl1_text);
406 failure("acl_from_text(): errno = %d (%s)", errno, strerror(errno));
407 assert((void *)acl1 != NULL);
408 #endif
409 fd = open("f1", O_WRONLY | O_CREAT | O_EXCL, 0777);
410 failure("Could not create test file?!");
411 if (!assert(fd >= 0)) {
412 #if !ARCHIVE_ACL_SUNOS
413 acl_free(acl1);
414 #endif
415 return;
416 }
417 #if ARCHIVE_ACL_SUNOS
418 /* Check if Solaris filesystem supports POSIX.1e ACLs */
419 aclp = sunacl_get(GETACL, &aclcnt, fd, NULL);
420 if (aclp == 0)
421 close(fd);
422 if (errno == ENOSYS || errno == ENOTSUP) {
423 skipping("POSIX.1e ACLs are not supported on this filesystem");
424 return;
425 }
426 failure("facl(): errno = %d (%s)", errno, strerror(errno));
427 assert(aclp != NULL);
428
429 func = "facl()";
430 n = facl(fd, SETACL, (int)(sizeof(aclp1)/sizeof(aclp1[0])), aclp1);
431 #else
432 func = "acl_set_fd()";
433 n = acl_set_fd(fd, acl1);
434 #endif
435 #if !ARCHIVE_ACL_SUNOS
436 acl_free(acl1);
437 #endif
438
439 if (n != 0) {
440 #if ARCHIVE_ACL_SUNOS
441 if (errno == ENOSYS || errno == ENOTSUP)
442 #else
443 if (errno == EOPNOTSUPP || errno == EINVAL)
444 #endif
445 {
446 close(fd);
447 skipping("POSIX.1e ACLs are not supported on this filesystem");
448 return;
449 }
450 }
451 failure("%s: errno = %d (%s)", func, errno, strerror(errno));
452 assertEqualInt(0, n);
453
454 close(fd);
455
456 assertMakeDir("d", 0700);
457
458 /*
459 * Create file d/f1 with acl2
460 *
461 * This differs from acl1 in the u:1: and g:15: permissions.
462 *
463 * This file deliberately has the same name but a different ACL.
464 * Github Issue #777 explains how libarchive's directory traversal
465 * did not always correctly enter directories before attempting
466 * to read ACLs, resulting in reading the ACL from a like-named
467 * file in the wrong directory.
468 */
469 #if ARCHIVE_ACL_SUNOS
470 acl2_text = "user::rwx,"
471 "group::rwx,"
472 "other:---,"
473 "user:1:r--,"
474 "group:15:r--,"
475 "mask:rwx";
476 aclent_t aclp2[] = {
477 { USER_OBJ, -1, 4 | 2 | 1 },
478 { USER, 1, 4 },
479 { GROUP_OBJ, -1, 4 | 2 | 1},
480 { GROUP, 15, 4 },
481 { CLASS_OBJ, -1, 4 | 2 | 1},
482 { OTHER_OBJ, -1, 0 }
483 };
484 #else
485 acl2_text = "user::rwx\n"
486 "group::rwx\n"
487 "other::---\n"
488 "user:1:r--\n"
489 "group:15:r--\n"
490 "mask::rwx";
491 acl2 = acl_from_text(acl2_text);
492 failure("acl_from_text(): errno = %d (%s)", errno, strerror(errno));
493 assert((void *)acl2 != NULL);
494 #endif
495 fd = open("d/f1", O_WRONLY | O_CREAT | O_EXCL, 0777);
496 failure("Could not create test file?!");
497 if (!assert(fd >= 0)) {
498 #if !ARCHIVE_ACL_SUNOS
499 acl_free(acl2);
500 #endif
501 return;
502 }
503 #if ARCHIVE_ACL_SUNOS
504 func = "facl()";
505 n = facl(fd, SETACL, (int)(sizeof(aclp2) / sizeof(aclp2[0])), aclp2);
506 #else
507 func = "acl_set_fd()";
508 n = acl_set_fd(fd, acl2);
509 acl_free(acl2);
510 #endif
511 if (n != 0)
512 close(fd);
513 failure("%s: errno = %d (%s)", func, errno, strerror(errno));
514 assertEqualInt(0, n);
515 close(fd);
516
517 /* Create nested directory d2 with default ACLs */
518 assertMakeDir("d/d2", 0755);
519
520 #if ARCHIVE_ACL_SUNOS
521 acl3_text = "user::rwx,"
522 "group::r-x,"
523 "other:r-x,"
524 "user:2:r--,"
525 "group:16:-w-,"
526 "mask:rwx,"
527 "default:user::rwx,"
528 "default:user:1:r--,"
529 "default:group::r-x,"
530 "default:group:15:r--,"
531 "default:mask:rwx,"
532 "default:other:r-x";
533 aclent_t aclp3[] = {
534 { USER_OBJ, -1, 4 | 2 | 1 },
535 { USER, 2, 4 },
536 { GROUP_OBJ, -1, 4 | 1 },
537 { GROUP, 16, 2 },
538 { CLASS_OBJ, -1, 4 | 2 | 1 },
539 { OTHER_OBJ, -1, 4 | 1 },
540 { USER_OBJ | ACL_DEFAULT, -1, 4 | 2 | 1 },
541 { USER | ACL_DEFAULT, 1, 4 },
542 { GROUP_OBJ | ACL_DEFAULT, -1, 4 | 1 },
543 { GROUP | ACL_DEFAULT, 15, 4 },
544 { CLASS_OBJ | ACL_DEFAULT, -1, 4 | 2 | 1},
545 { OTHER_OBJ | ACL_DEFAULT, -1, 4 | 1 }
546 };
547 #else
548 acl3_text = "user::rwx\n"
549 "user:1:r--\n"
550 "group::r-x\n"
551 "group:15:r--\n"
552 "mask::rwx\n"
553 "other::r-x";
554 acl3 = acl_from_text(acl3_text);
555 failure("acl_from_text(): errno = %d (%s)", errno, strerror(errno));
556 assert((void *)acl3 != NULL);
557 #endif
558
559 #if ARCHIVE_ACL_SUNOS
560 func = "acl()";
561 n = acl("d/d2", SETACL, (int)(sizeof(aclp3) / sizeof(aclp3[0])), aclp3);
562 #else
563 func = "acl_set_file()";
564 n = acl_set_file("d/d2", ACL_TYPE_DEFAULT, acl3);
565 acl_free(acl3);
566 #endif
567 failure("%s: errno = %d (%s)", func, errno, strerror(errno));
568 assertEqualInt(0, n);
569
570 /* Create a read-from-disk object. */
571 assert(NULL != (a = archive_read_disk_new()));
572 assertEqualIntA(a, ARCHIVE_OK, archive_read_disk_open(a, "."));
573 assert(NULL != (ae = archive_entry_new()));
574
575 #if ARCHIVE_ACL_SUNOS
576 flags = ARCHIVE_ENTRY_ACL_TYPE_POSIX1E
577 | ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA
578 | ARCHIVE_ENTRY_ACL_STYLE_SOLARIS;
579 dflags = flags;
580 #else
581 flags = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
582 dflags = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
583 #endif
584
585 /* Walk the dir until we see both of the files */
586 while (ARCHIVE_OK == archive_read_next_header2(a, ae)) {
587 archive_read_disk_descend(a);
588 if (strcmp(archive_entry_pathname(ae), "./f1") == 0) {
589 acl_text = archive_entry_acl_to_text(ae, NULL, flags);
590 assertEqualString(acl_text, acl1_text);
591 free(acl_text);
592 } else if (strcmp(archive_entry_pathname(ae), "./d/f1") == 0) {
593 acl_text = archive_entry_acl_to_text(ae, NULL, flags);
594 assertEqualString(acl_text, acl2_text);
595 free(acl_text);
596 } else if (strcmp(archive_entry_pathname(ae), "./d/d2") == 0) {
597 acl_text = archive_entry_acl_to_text(ae, NULL, dflags);
598 assertEqualString(acl_text, acl3_text);
599 free(acl_text);
600 }
601 }
602
603 archive_entry_free(ae);
604 assertEqualInt(ARCHIVE_OK, archive_free(a));
605 #endif /* ARCHIVE_ACL_POSIX1E */
606 }
607