use crate::read::ArchiveOffset;
use crate::read::magic_finder::{Backwards, Forward, MagicFinder, OptimisticMagicFinder};
use crate::result::{ZipError, ZipResult, invalid};
use core::any::type_name;
use core::mem;
use core::slice;
use std::io::{self, Read, Seek, Write};
#[derive(Copy, Clone, Debug, PartialOrd, Ord, PartialEq, Eq, Hash)]
#[repr(transparent)]
pub(crate) struct Magic(u32);
impl Magic {
pub const fn literal(x: u32) -> Self {
Self(x)
}
#[inline(always)]
#[allow(dead_code)]
pub const fn from_le_bytes(bytes: [u8; 4]) -> Self {
Self(u32::from_le_bytes(bytes))
}
#[inline(always)]
pub const fn to_le_bytes(self) -> [u8; 4] {
self.0.to_le_bytes()
}
#[allow(clippy::wrong_self_convention)]
#[allow(unused)]
#[inline(always)]
pub fn from_le(self) -> Self {
Self(u32::from_le(self.0))
}
#[allow(clippy::wrong_self_convention)]
#[inline(always)]
pub fn to_le(self) -> Self {
Self(u32::to_le(self.0))
}
pub const LOCAL_FILE_HEADER_SIGNATURE: Self = Self::literal(0x0403_4b50);
pub const CENTRAL_DIRECTORY_HEADER_SIGNATURE: Self = Self::literal(0x0201_4b50);
pub const CENTRAL_DIRECTORY_END_SIGNATURE: Self = Self::literal(0x0605_4b50);
pub const ZIP64_CENTRAL_DIRECTORY_END_SIGNATURE: Self = Self::literal(0x0606_4b50);
pub const ZIP64_CENTRAL_DIRECTORY_END_LOCATOR_SIGNATURE: Self = Self::literal(0x0706_4b50);
pub const DATA_DESCRIPTOR_SIGNATURE: Self = Self::literal(0x0807_4b50);
}
#[allow(unused)]
#[rustfmt::skip]
#[repr(u16)]
#[derive(Debug, Copy, Clone, PartialEq, Eq)]
pub(crate) enum ZipFlags {
Encrypted = 0b0000_0000_0000_0001,
CompressionSetting = 0b0000_0000_0000_0010,
CompressionSetting2 = 0b0000_0000_0000_0100,
UsingDataDescriptor = 0b0000_0000_0000_1000,
ReservedEnhancedDeflating = 0b0000_0000_0001_0000,
CompressedPatchedData = 0b0000_0000_0010_0000,
StrongEncryption = 0b0000_0000_0100_0000,
LanguageEncoding = 0b0000_1000_0000_0000,
ReservedEnhancedCompression = 0b0001_0000_0000_0000,
Masked = 0b0010_0000_0000_0000,
ReservedAlternateStream = 0b0100_0000_0000_0000,
Reserved = 0b1000_0000_0000_0000,
}
impl ZipFlags {
pub(crate) fn matching(flags: u16, matching_flag: Self) -> bool {
flags & u16::from(matching_flag) != 0
}
pub(crate) const fn as_u16(self) -> u16 {
self as u16
}
}
impl From<ZipFlags> for u16 {
fn from(value: ZipFlags) -> u16 {
value.as_u16()
}
}
pub const ZIP64_BYTES_THR: u64 = u32::MAX as u64;
pub const ZIP64_ENTRY_THR: usize = u16::MAX as usize;
pub(crate) unsafe trait Pod: Copy + 'static {
#[inline]
fn zeroed() -> Self {
unsafe { mem::zeroed() }
}
#[inline]
fn as_bytes(&self) -> &[u8] {
unsafe {
slice::from_raw_parts(
std::ptr::from_ref::<Self>(self).cast::<u8>(),
mem::size_of::<Self>(),
)
}
}
#[inline]
fn as_bytes_mut(&mut self) -> &mut [u8] {
unsafe {
slice::from_raw_parts_mut(
std::ptr::from_mut::<Self>(self).cast::<u8>(),
mem::size_of::<Self>(),
)
}
}
}
#[derive(Copy, Clone)]
#[repr(C, packed)]
struct BlockWithMagic<T: FixedSizeBlock> {
magic: Magic,
inner: T,
}
unsafe impl<T: FixedSizeBlock> Pod for BlockWithMagic<T> {}
impl<T: FixedSizeBlock> BlockWithMagic<T> {
fn to_le(mut self) -> Self {
self.magic = self.magic.to_le();
self.inner = self.inner.to_le();
self
}
}
pub(crate) trait FixedSizeBlock: Pod {
const MAGIC: Magic;
const WRONG_MAGIC_ERROR: ZipError;
#[allow(clippy::wrong_self_convention)]
fn from_le(self) -> Self;
fn parse<R: Read + ?Sized>(reader: &mut R) -> ZipResult<Self> {
let mut block_with_magic = BlockWithMagic::zeroed();
if let Err(e) = reader.read_exact(block_with_magic.as_bytes_mut()) {
if e.kind() == io::ErrorKind::UnexpectedEof {
return Err(invalid!("Unexpected end of {}", type_name::<Self>()));
}
return Err(e.into());
}
let BlockWithMagic {
magic,
inner: block,
} = block_with_magic;
let magic = Magic::from_le(magic);
if magic != Self::MAGIC {
return Err(Self::WRONG_MAGIC_ERROR);
}
let block = Self::from_le(block);
Ok(block)
}
fn to_le(self) -> Self;
fn write<T: Write + ?Sized>(self, writer: &mut T) -> ZipResult<()> {
let block = BlockWithMagic {
magic: Self::MAGIC,
inner: self,
};
let block = block.to_le();
writer.write_all(block.as_bytes())?;
Ok(())
}
}
macro_rules! from_le {
($obj:ident, $field:ident, $type:ty) => {
$obj.$field = <$type>::from_le($obj.$field);
};
($obj:ident, [($field:ident, $type:ty) $(,)?]) => {
from_le![$obj, $field, $type];
};
($obj:ident, [($field:ident, $type:ty), $($rest:tt),+ $(,)?]) => {
from_le![$obj, $field, $type];
from_le!($obj, [$($rest),+]);
};
}
macro_rules! to_le {
($obj:ident, $field:ident, $type:ty) => {
$obj.$field = <$type>::to_le($obj.$field);
};
($obj:ident, [($field:ident, $type:ty) $(,)?]) => {
to_le![$obj, $field, $type];
};
($obj:ident, [($field:ident, $type:ty), $($rest:tt),+ $(,)?]) => {
to_le![$obj, $field, $type];
to_le!($obj, [$($rest),+]);
};
}
#[macro_export]
macro_rules! to_and_from_le {
($($args:tt),+ $(,)?) => {
#[inline(always)]
fn from_le(mut self) -> Self {
from_le![self, [$($args),+]];
self
}
#[inline(always)]
fn to_le(mut self) -> Self {
to_le![self, [$($args),+]];
self
}
};
}
#[derive(Copy, Clone, Debug)]
#[repr(packed, C)]
pub(crate) struct ZipCentralEntryBlock {
pub version_made_by: u16,
pub version_to_extract: u16,
pub flags: u16,
pub compression_method: u16,
pub last_mod_time: u16,
pub last_mod_date: u16,
pub crc32: u32,
pub compressed_size: u32,
pub uncompressed_size: u32,
pub file_name_length: u16,
pub extra_field_length: u16,
pub file_comment_length: u16,
pub disk_number: u16,
pub internal_file_attributes: u16,
pub external_file_attributes: u32,
pub offset: u32,
}
unsafe impl Pod for ZipCentralEntryBlock {}
impl FixedSizeBlock for ZipCentralEntryBlock {
const MAGIC: Magic = Magic::CENTRAL_DIRECTORY_HEADER_SIGNATURE;
const WRONG_MAGIC_ERROR: ZipError = invalid!("Invalid Central Directory header");
to_and_from_le![
(version_made_by, u16),
(version_to_extract, u16),
(flags, u16),
(compression_method, u16),
(last_mod_time, u16),
(last_mod_date, u16),
(crc32, u32),
(compressed_size, u32),
(uncompressed_size, u32),
(file_name_length, u16),
(extra_field_length, u16),
(file_comment_length, u16),
(disk_number, u16),
(internal_file_attributes, u16),
(external_file_attributes, u32),
(offset, u32),
];
}
#[derive(Copy, Clone, Debug)]
#[repr(packed, C)]
pub(crate) struct ZipLocalEntryBlock {
pub version_made_by: u16,
pub flags: u16,
pub compression_method: u16,
pub last_mod_time: u16,
pub last_mod_date: u16,
pub crc32: u32,
pub compressed_size: u32,
pub uncompressed_size: u32,
pub file_name_length: u16,
pub extra_field_length: u16,
}
unsafe impl Pod for ZipLocalEntryBlock {}
impl FixedSizeBlock for ZipLocalEntryBlock {
const MAGIC: Magic = Magic::LOCAL_FILE_HEADER_SIGNATURE;
const WRONG_MAGIC_ERROR: ZipError = invalid!("Invalid local file header");
to_and_from_le![
(version_made_by, u16),
(flags, u16),
(compression_method, u16),
(last_mod_time, u16),
(last_mod_date, u16),
(crc32, u32),
(compressed_size, u32),
(uncompressed_size, u32),
(file_name_length, u16),
(extra_field_length, u16),
];
}
#[derive(Copy, Clone, Debug)]
#[repr(packed, C)]
pub(crate) struct ZipDataDescriptorBlock {
pub crc32: u32,
pub compressed_size: u32,
pub uncompressed_size: u32,
}
unsafe impl Pod for ZipDataDescriptorBlock {}
impl FixedSizeBlock for ZipDataDescriptorBlock {
const MAGIC: Magic = Magic::DATA_DESCRIPTOR_SIGNATURE;
const WRONG_MAGIC_ERROR: ZipError = invalid!("Invalid data descriptor header");
to_and_from_le![
(crc32, u32),
(compressed_size, u32),
(uncompressed_size, u32),
];
}
#[derive(Copy, Clone, Debug)]
#[repr(packed, C)]
pub(crate) struct Zip64DataDescriptorBlock {
pub crc32: u32,
pub compressed_size: u64,
pub uncompressed_size: u64,
}
unsafe impl Pod for Zip64DataDescriptorBlock {}
impl FixedSizeBlock for Zip64DataDescriptorBlock {
const MAGIC: Magic = Magic::DATA_DESCRIPTOR_SIGNATURE;
const WRONG_MAGIC_ERROR: ZipError = invalid!("Invalid zip64 data descriptor header");
to_and_from_le![
(crc32, u32),
(compressed_size, u64),
(uncompressed_size, u64),
];
}
#[derive(Copy, Clone, Debug)]
#[repr(packed, C)]
pub(crate) struct Zip32CDEBlock {
pub disk_number: u16,
pub disk_with_central_directory: u16,
pub number_of_files_on_this_disk: u16,
pub number_of_files: u16,
pub central_directory_size: u32,
pub central_directory_offset: u32,
pub zip_file_comment_length: u16,
}
unsafe impl Pod for Zip32CDEBlock {}
impl FixedSizeBlock for Zip32CDEBlock {
const MAGIC: Magic = Magic::CENTRAL_DIRECTORY_END_SIGNATURE;
const WRONG_MAGIC_ERROR: ZipError = invalid!("Invalid digital signature header");
to_and_from_le![
(disk_number, u16),
(disk_with_central_directory, u16),
(number_of_files_on_this_disk, u16),
(number_of_files, u16),
(central_directory_size, u32),
(central_directory_offset, u32),
(zip_file_comment_length, u16)
];
}
#[derive(Debug)]
pub(crate) struct Zip32CentralDirectoryEnd {
pub disk_number: u16,
pub disk_with_central_directory: u16,
pub number_of_files_on_this_disk: u16,
pub number_of_files: u16,
pub central_directory_size: u32,
pub central_directory_offset: u32,
pub zip_file_comment: Box<[u8]>,
}
impl Zip32CentralDirectoryEnd {
fn into_block_and_comment(self) -> (Zip32CDEBlock, Box<[u8]>) {
let Self {
disk_number,
disk_with_central_directory,
number_of_files_on_this_disk,
number_of_files,
central_directory_size,
central_directory_offset,
zip_file_comment,
} = self;
let block = Zip32CDEBlock {
disk_number,
disk_with_central_directory,
number_of_files_on_this_disk,
number_of_files,
central_directory_size,
central_directory_offset,
zip_file_comment_length: zip_file_comment.len() as u16,
};
(block, zip_file_comment)
}
pub fn parse<T: Read + ?Sized>(reader: &mut T) -> ZipResult<Zip32CentralDirectoryEnd> {
let Zip32CDEBlock {
disk_number,
disk_with_central_directory,
number_of_files_on_this_disk,
number_of_files,
central_directory_size,
central_directory_offset,
zip_file_comment_length,
..
} = Zip32CDEBlock::parse(reader)?;
let mut zip_file_comment = vec![0u8; zip_file_comment_length as usize].into_boxed_slice();
if let Err(e) = reader.read_exact(&mut zip_file_comment) {
if e.kind() == io::ErrorKind::UnexpectedEof {
return Err(invalid!("EOCD comment exceeds file boundary"));
}
return Err(e.into());
}
Ok(Zip32CentralDirectoryEnd {
disk_number,
disk_with_central_directory,
number_of_files_on_this_disk,
number_of_files,
central_directory_size,
central_directory_offset,
zip_file_comment,
})
}
pub fn write<T: Write>(self, writer: &mut T) -> ZipResult<()> {
let (block, comment) = self.into_block_and_comment();
if comment.len() > u16::MAX as usize {
return Err(invalid!("EOCD comment length exceeds u16::MAX"));
}
block.write(writer)?;
writer.write_all(&comment)?;
Ok(())
}
pub fn may_be_zip64(&self) -> bool {
self.number_of_files == u16::MAX
|| self.central_directory_size == u32::MAX
|| self.central_directory_offset == u32::MAX
}
}
#[derive(Copy, Clone)]
#[repr(packed, C)]
pub(crate) struct Zip64CDELocatorBlock {
pub disk_with_central_directory: u32,
pub end_of_central_directory_offset: u64,
pub number_of_disks: u32,
}
unsafe impl Pod for Zip64CDELocatorBlock {}
impl FixedSizeBlock for Zip64CDELocatorBlock {
const MAGIC: Magic = Magic::ZIP64_CENTRAL_DIRECTORY_END_LOCATOR_SIGNATURE;
const WRONG_MAGIC_ERROR: ZipError = invalid!("Invalid zip64 locator digital signature header");
to_and_from_le![
(disk_with_central_directory, u32),
(end_of_central_directory_offset, u64),
(number_of_disks, u32),
];
}
pub(crate) struct Zip64CentralDirectoryEndLocator {
pub disk_with_central_directory: u32,
pub end_of_central_directory_offset: u64,
pub number_of_disks: u32,
}
impl Zip64CentralDirectoryEndLocator {
pub fn parse<T: Read + ?Sized>(reader: &mut T) -> ZipResult<Zip64CentralDirectoryEndLocator> {
let Zip64CDELocatorBlock {
disk_with_central_directory,
end_of_central_directory_offset,
number_of_disks,
..
} = Zip64CDELocatorBlock::parse(reader)?;
Ok(Zip64CentralDirectoryEndLocator {
disk_with_central_directory,
end_of_central_directory_offset,
number_of_disks,
})
}
pub fn block(self) -> Zip64CDELocatorBlock {
let Self {
disk_with_central_directory,
end_of_central_directory_offset,
number_of_disks,
} = self;
Zip64CDELocatorBlock {
disk_with_central_directory,
end_of_central_directory_offset,
number_of_disks,
}
}
pub fn write<T: Write>(self, writer: &mut T) -> ZipResult<()> {
self.block().write(writer)
}
}
#[derive(Copy, Clone)]
#[repr(packed, C)]
pub(crate) struct Zip64CDEBlock {
pub record_size: u64,
pub version_made_by: u16,
pub version_needed_to_extract: u16,
pub disk_number: u32,
pub disk_with_central_directory: u32,
pub number_of_files_on_this_disk: u64,
pub number_of_files: u64,
pub central_directory_size: u64,
pub central_directory_offset: u64,
}
unsafe impl Pod for Zip64CDEBlock {}
impl FixedSizeBlock for Zip64CDEBlock {
const MAGIC: Magic = Magic::ZIP64_CENTRAL_DIRECTORY_END_SIGNATURE;
const WRONG_MAGIC_ERROR: ZipError = invalid!("Invalid digital signature header");
to_and_from_le![
(record_size, u64),
(version_made_by, u16),
(version_needed_to_extract, u16),
(disk_number, u32),
(disk_with_central_directory, u32),
(number_of_files_on_this_disk, u64),
(number_of_files, u64),
(central_directory_size, u64),
(central_directory_offset, u64),
];
}
pub(crate) struct Zip64CentralDirectoryEnd {
pub record_size: u64,
pub version_made_by: u16,
pub version_needed_to_extract: u16,
pub disk_number: u32,
pub disk_with_central_directory: u32,
pub number_of_files_on_this_disk: u64,
pub number_of_files: u64,
pub central_directory_size: u64,
pub central_directory_offset: u64,
pub(crate) zip64_extensible_data_sector: Option<Box<[u8]>>,
}
impl Zip64CentralDirectoryEnd {
const MIN_SIZE: usize = 2 * size_of::<u16>() + 2 * size_of::<u32>() + 4 * size_of::<u64>();
pub(crate) fn parse<T: Read + ?Sized>(
reader: &mut T,
max_size: u64,
) -> ZipResult<Zip64CentralDirectoryEnd> {
let Zip64CDEBlock {
record_size,
version_made_by,
version_needed_to_extract,
disk_number,
disk_with_central_directory,
number_of_files_on_this_disk,
number_of_files,
central_directory_size,
central_directory_offset,
..
} = Zip64CDEBlock::parse(reader)?;
if record_size < 40 {
return Err(invalid!("Low EOCD64 record size"));
} else if record_size.saturating_add(12) > max_size {
return Err(invalid!("EOCD64 extends beyond EOCD64 locator"));
}
let zip64_extensible_data_sector = if record_size > (Self::MIN_SIZE as u64) {
let mut extensible_data_sector =
vec![0u8; record_size as usize - Self::MIN_SIZE].into_boxed_slice();
if let Err(e) = reader.read_exact(&mut extensible_data_sector) {
if e.kind() == io::ErrorKind::UnexpectedEof {
return Err(invalid!(
"EOCD64 extensible data sector exceeds file boundary"
));
}
return Err(e.into());
}
Some(extensible_data_sector)
} else {
None
};
Ok(Self {
record_size,
version_made_by,
version_needed_to_extract,
disk_number,
disk_with_central_directory,
number_of_files_on_this_disk,
number_of_files,
central_directory_size,
central_directory_offset,
zip64_extensible_data_sector,
})
}
pub(crate) fn into_block_and_extensible_data(self) -> (Zip64CDEBlock, Option<Box<[u8]>>) {
let Self {
record_size,
version_made_by,
version_needed_to_extract,
disk_number,
disk_with_central_directory,
number_of_files_on_this_disk,
number_of_files,
central_directory_size,
central_directory_offset,
zip64_extensible_data_sector,
} = self;
(
Zip64CDEBlock {
record_size,
version_made_by,
version_needed_to_extract,
disk_number,
disk_with_central_directory,
number_of_files_on_this_disk,
number_of_files,
central_directory_size,
central_directory_offset,
},
zip64_extensible_data_sector,
)
}
pub(crate) fn write<T: Write>(self, writer: &mut T) -> ZipResult<()> {
let (block, zip64_extensible_data) = self.into_block_and_extensible_data();
block.write(writer)?;
if let Some(extensible_data) = zip64_extensible_data {
writer.write_all(&extensible_data)?;
}
Ok(())
}
}
pub(crate) struct DataAndPosition<T> {
pub data: T,
#[allow(dead_code)]
pub position: u64,
}
impl<T> From<(T, u64)> for DataAndPosition<T> {
fn from(value: (T, u64)) -> Self {
Self {
data: value.0,
position: value.1,
}
}
}
pub(crate) struct CentralDirectoryEndInfo {
pub eocd: DataAndPosition<Zip32CentralDirectoryEnd>,
pub eocd64: Option<DataAndPosition<Zip64CentralDirectoryEnd>>,
pub archive_offset: u64,
}
pub(crate) fn find_central_directory<R: Read + Seek + ?Sized>(
reader: &mut R,
archive_offset: ArchiveOffset,
end_exclusive: u64,
file_len: u64,
) -> ZipResult<CentralDirectoryEndInfo> {
const EOCD_SIG_BYTES: [u8; mem::size_of::<Magic>()] =
Magic::CENTRAL_DIRECTORY_END_SIGNATURE.to_le_bytes();
const EOCD64_SIG_BYTES: [u8; mem::size_of::<Magic>()] =
Magic::ZIP64_CENTRAL_DIRECTORY_END_SIGNATURE.to_le_bytes();
const CDFH_SIG_BYTES: [u8; mem::size_of::<Magic>()] =
Magic::CENTRAL_DIRECTORY_HEADER_SIGNATURE.to_le_bytes();
let mut eocd_finder = MagicFinder::<Backwards<'static>>::new(&EOCD_SIG_BYTES, 0, end_exclusive);
let mut subfinder: Option<OptimisticMagicFinder<Forward<'static>>> = None;
let mut parsing_error = None;
while let Some(eocd_offset) = eocd_finder.next(reader)? {
let eocd = match Zip32CentralDirectoryEnd::parse(reader) {
Ok(eocd) => eocd,
Err(e) => {
if parsing_error.is_none() {
parsing_error = Some(e);
}
continue;
}
};
if eocd.zip_file_comment.len() as u64 + eocd_offset + 22 > file_len {
parsing_error = Some(invalid!("Invalid EOCD comment length"));
continue;
}
let zip64_metadata = if eocd.may_be_zip64() {
fn try_read_eocd64_locator(
reader: &mut (impl Read + Seek + ?Sized),
eocd_offset: u64,
) -> ZipResult<(u64, Zip64CentralDirectoryEndLocator)> {
if eocd_offset
< (mem::size_of::<Magic>() + mem::size_of::<Zip64CDELocatorBlock>()) as u64
{
return Err(invalid!("EOCD64 Locator does not fit in file"));
}
let locator64_offset = eocd_offset
- (mem::size_of::<Magic>() + mem::size_of::<Zip64CDELocatorBlock>()) as u64;
reader.seek(io::SeekFrom::Start(locator64_offset))?;
let locator64 = Zip64CentralDirectoryEndLocator::parse(reader);
Ok((locator64_offset, locator64?))
}
try_read_eocd64_locator(reader, eocd_offset).ok()
} else {
None
};
let Some((locator64_offset, locator64)) = zip64_metadata else {
let relative_cd_offset = u64::from(eocd.central_directory_offset);
if eocd.number_of_files == 0 {
return Ok(CentralDirectoryEndInfo {
eocd: (eocd, eocd_offset).into(),
eocd64: None,
archive_offset: eocd_offset.saturating_sub(relative_cd_offset),
});
}
if relative_cd_offset >= eocd_offset {
parsing_error = Some(invalid!("Invalid CDFH offset in EOCD"));
continue;
}
let subfinder = subfinder
.get_or_insert_with(OptimisticMagicFinder::new_empty)
.repurpose(
&CDFH_SIG_BYTES,
(relative_cd_offset, eocd_offset),
match archive_offset {
ArchiveOffset::Known(n) => {
Some((relative_cd_offset.saturating_add(n).min(eocd_offset), true))
}
_ => Some((relative_cd_offset, false)),
},
);
if let Some(cd_offset) = subfinder.next(reader)? {
let archive_offset = cd_offset - relative_cd_offset;
return Ok(CentralDirectoryEndInfo {
eocd: (eocd, eocd_offset).into(),
eocd64: None,
archive_offset,
});
}
parsing_error = Some(invalid!("No CDFH found"));
continue;
};
if locator64.end_of_central_directory_offset >= locator64_offset {
parsing_error = Some(invalid!("Invalid EOCD64 Locator CD offset"));
continue;
}
if locator64.number_of_disks > 1 {
parsing_error = Some(invalid!("Multi-disk ZIP files are not supported"));
continue;
}
fn try_read_eocd64<R: Read + Seek + ?Sized>(
reader: &mut R,
locator64: &Zip64CentralDirectoryEndLocator,
expected_length: u64,
) -> ZipResult<Zip64CentralDirectoryEnd> {
let z64 = Zip64CentralDirectoryEnd::parse(reader, expected_length)?;
if z64.disk_with_central_directory != locator64.disk_with_central_directory {
return Err(invalid!("Invalid EOCD64: inconsistency with Locator data"));
}
if z64.record_size + 12 != expected_length {
return Err(invalid!("Invalid EOCD64: inconsistent length"));
}
Ok(z64)
}
let subfinder = subfinder
.get_or_insert_with(OptimisticMagicFinder::new_empty)
.repurpose(
&EOCD64_SIG_BYTES,
(locator64.end_of_central_directory_offset, locator64_offset),
match archive_offset {
ArchiveOffset::Known(n) => Some((
locator64
.end_of_central_directory_offset
.saturating_add(n)
.min(locator64_offset),
true,
)),
_ => Some((locator64.end_of_central_directory_offset, false)),
},
);
let mut local_error = None;
while let Some(eocd64_offset) = subfinder.next(reader)? {
let archive_offset = eocd64_offset - locator64.end_of_central_directory_offset;
match try_read_eocd64(
reader,
&locator64,
locator64_offset.saturating_sub(eocd64_offset),
) {
Ok(eocd64) => {
if eocd64_offset
< eocd64
.number_of_files
.saturating_mul(
(mem::size_of::<Magic>() + mem::size_of::<ZipCentralEntryBlock>())
as u64,
)
.saturating_add(eocd64.central_directory_offset)
{
local_error =
Some(invalid!("Invalid EOCD64: inconsistent number of files"));
continue;
}
return Ok(CentralDirectoryEndInfo {
eocd: (eocd, eocd_offset).into(),
eocd64: Some((eocd64, eocd64_offset).into()),
archive_offset,
});
}
Err(e) => {
local_error = Some(e);
}
}
}
parsing_error = local_error.or(Some(invalid!("Could not find EOCD64")));
}
Err(parsing_error.unwrap_or(invalid!("Could not find EOCD")))
}
pub(crate) fn is_dir(filename: &str) -> bool {
filename
.chars()
.next_back()
.is_some_and(|c| c == '/' || c == '\\')
}
#[cfg(test)]
mod tests {
use std::io::Cursor;
use crate::{
result::{ZipError, invalid},
spec::{FixedSizeBlock, Magic, Pod},
};
#[derive(Copy, Clone, Debug, PartialEq, Eq, Hash)]
#[repr(packed, C)]
pub struct TestBlock {
pub file_name_length: u16,
}
unsafe impl Pod for TestBlock {}
impl FixedSizeBlock for TestBlock {
const MAGIC: Magic = Magic::literal(0x01111);
const WRONG_MAGIC_ERROR: ZipError = invalid!("unreachable");
to_and_from_le![(file_name_length, u16)];
}
#[test]
fn block_serde() {
let block = TestBlock {
file_name_length: 3,
};
let mut c = Cursor::new(Vec::new());
block.write(&mut c).unwrap();
c.set_position(0);
let block2 = TestBlock::parse(&mut c).unwrap();
assert_eq!(block, block2);
}
#[test]
fn test_size_zip64_central_directory_end() {
use super::Zip64CentralDirectoryEnd;
assert_eq!(Zip64CentralDirectoryEnd::MIN_SIZE, 44);
}
}