provide PBKDF2 functionarity.
}
if (archive_random(salt, salt_len) != ARCHIVE_OK)
return (0);
- archive_pbkdf2_sha1("p", 1, salt, salt_len, 1000,
+ ret = archive_pbkdf2_sha1("p", 1, salt, salt_len, 1000,
derived_key, key_len * 2 + 2);
+ if (ret != 0)
+ return (0);
ret = archive_encrypto_aes_ctr_init(&cctx, derived_key, key_len);
if (ret != 0)
struct archive *a;
char buff[512];
+
+ /* Check if running system has cryptographic functionarity. */
+ assert((a = archive_write_new()) != NULL);
+ assertEqualIntA(a, ARCHIVE_OK, archive_write_set_format_zip(a));
+ assertEqualIntA(a, ARCHIVE_OK, archive_write_add_filter_none(a));
+ if (ARCHIVE_OK != archive_write_set_options(a,
+ "zip:encryption=aes256")) {
+ skipping("This system does not have cryptographic liberary");
+ archive_write_free(a);
+ return;
+ }
+ archive_write_free(a);
+
+
extract_reference_file(refname);
/*