2009-09-06 18:49:05 +00:00

944 lines
29 KiB
C++

// Filename: multify.cxx
// Created by:
//
////////////////////////////////////////////////////////////////////
//
// PANDA 3D SOFTWARE
// Copyright (c) Carnegie Mellon University. All rights reserved.
//
// All use of this software is subject to the terms of the revised BSD
// license. You should have received a copy of this license along
// with this source code in a file named "LICENSE."
//
////////////////////////////////////////////////////////////////////
#include "pandabase.h"
#ifndef HAVE_GETOPT
#include "gnu_getopt.h"
#else
#include <getopt.h>
#endif
#include "multifile.h"
#include "pointerTo.h"
#include "filename.h"
#include "pset.h"
#include "vector_string.h"
#include <stdio.h>
#include <time.h>
bool create = false; // -c
bool append = false; // -r
bool update = false; // -u
bool tlist = false; // -t
bool extract = false; // -x
bool kill_cmd = false; // -k
bool verbose = false; // -v
bool compress_flag = false; // -z
int default_compression_level = 6;
Filename multifile_name; // -f
bool got_multifile_name = false;
bool to_stdout = false; // -O
bool encryption_flag = false; // -e
string password; // -p
bool got_password = false;
string header_prefix; // -P
bool got_header_prefix = false;
Filename chdir_to; // -C
bool got_chdir_to = false;
size_t scale_factor = 0; // -F
pset<string> dont_compress; // -Z
vector_string sign_params; // -S
pvector<Filename> cert_chain; // -N
// Default extensions not to compress. May be overridden with -Z.
string dont_compress_str = "jpg,png,mp3,ogg";
bool got_record_timestamp_flag = false;
bool record_timestamp_flag = true;
////////////////////////////////////////////////////////////////////
// Function: string_to_int
// Description: A string-interface wrapper around the C library
// strtol(). This parses the ASCII representation of an
// integer, and then sets tail to everything that
// follows the first valid integer read. If, on exit,
// str == tail, there was no valid integer in the
// source string; if !tail.empty(), there was garbage
// after the integer.
//
// It is legal if str and tail refer to the same string.
////////////////////////////////////////////////////////////////////
static int
string_to_int(const string &str, string &tail) {
const char *nptr = str.c_str();
char *endptr;
int result = strtol(nptr, &endptr, 10);
tail = endptr;
return result;
}
////////////////////////////////////////////////////////////////////
// Function: string_to_int
// Description: Another flavor of string_to_int(), this one returns
// true if the string is a perfectly valid integer (and
// sets result to that value), or false otherwise.
////////////////////////////////////////////////////////////////////
static bool
string_to_int(const string &str, int &result) {
string tail;
result = string_to_int(str, tail);
return tail.empty();
}
void
usage() {
cerr <<
"Usage: multify -[c|r|u|t|x] -f <multifile_name> [options] <subfile_name> ...\n";
}
void
help() {
usage();
cerr << "\n"
"multify is used to store and extract files from a Panda Multifile.\n"
"This is similar to a tar or zip file in that it is an archive file that\n"
"contains a number of subfiles that may later be extracted.\n\n"
"Panda's VirtualFileSystem is capable of mounting Multifiles for direct\n"
"access to the subfiles contained within without having to extract them\n"
"out to independent files first.\n\n"
"The command-line options for multify are designed to be similar to those\n"
"for tar, the traditional Unix archiver utility.\n\n"
"Options:\n\n"
" You must specify exactly one of the following command switches:\n\n"
" -c\n"
" Create a new Multifile archive. Subfiles named on the command line\n"
" will be added to the new Multifile. If the Multifile already exists,\n"
" it is first removed.\n\n"
" -r\n"
" Rewrite an existing Multifile archive. Subfiles named on the command\n"
" line will be added to the Multifile or will replace subfiles within\n"
" the Multifile with the same name. The Multifile will be repacked\n"
" after completion, even if no Subfiles were added.\n\n"
" -u\n"
" Update an existing Multifile archive. This is similar to -r, except\n"
" that files are compared byte-for-byte with their corresponding files\n"
" in the archive first. If they have not changed, the multifile is not\n"
" modified (other than to repack it if necessary).\n\n"
" -t\n"
" List the contents of an existing Multifile. With -v, this shows\n"
" the size of each Subfile and its compression ratio, if compressed.\n\n"
" -x\n"
" Extract the contents of an existing Multifile. The Subfiles named on\n"
" the command line, or all Subfiles if nothing is named, are extracted\n"
" into the current directory or into whichever directory is specified\n"
" with -C.\n\n"
" -k\n"
" Delete (kill) the named Subfiles from the Multifile. The Multifile\n"
" will be repacked after completion.\n\n"
"\n"
" You must always specify the following switch:\n\n"
" -f <multifile_name>\n"
" Names the Multifile that will be operated on.\n\n\n"
" The remaining switches are optional:\n\n"
" -v\n"
" Run verbosely. In -c, -r, or -x mode, list each file as it is\n"
" written or extracted. In -t mode, list more information about each\n"
" file.\n\n"
" -z\n"
" Compress subfiles as they are written to the Multifile. Unlike tar\n"
" (but like zip), subfiles are compressed individually, instead of the\n"
" entire archive being compressed as one stream. It is not necessary\n"
" to specify -z when extracting compressed subfiles; they will always be\n"
" decompressed automatically. Also see -Z, which restricts which\n"
" subfiles will be compressed based on the filename extension.\n\n"
" -e\n"
" Encrypt subfiles as they are written to the Multifile using the password\n"
" specified with -p, below. Subfiles are encrypted individually, rather\n"
" than encrypting the entire multifile, and different subfiles may be\n"
" encrypted using different passwords (although this requires running\n"
" multify multiple times). It is not possible to encrypt the multifile's\n"
" table of contents using this interface, but see the pencrypt program to\n"
" encrypt the entire multifile after it has been generated.\n\n"
" -p \"password\"\n"
" Specifies the password to encrypt or decrypt subfiles. If this is not\n"
" specified, and passwords are required, the user will be prompted from\n"
" standard input.\n\n"
" -P \"prefix\"\n"
" Specifies a header_prefix to write to the beginning of the multifile.\n"
" This is primarily useful for creating a multifile that can be invoked\n"
" directly as a program from the shell on Unix-like environments,\n"
" for instance, p3d files. The header_prefix must begin with a hash\n"
" mark and end with a newline; this will be enforced if it is not\n"
" already so. This only has effect in conjunction with with -c, -u,\n"
" or -k.\n\n"
" -F <scale_factor>\n"
" Specify a Multifile scale factor. This is only necessary to support\n"
" Multifiles that will exceed 4GB in size. The default scale factor is\n"
" 1, which should be sufficient for almost any application, but the total\n"
" size of the Multifile will be limited to 4GB * scale_factor. The size\n"
" of individual subfiles may not exceed 4GB in any case.\n\n"
" -C <extract_dir>\n"
" With -x, change to the named directory before extracting files;\n"
" that is, extract subfiles into the named directory.\n\n"
" -O\n"
" With -x, extract subfiles to standard output instead of to disk.\n\n"
" -Z <extension_list>\n"
" Specify a comma-separated list of filename extensions that represent\n"
" files that are not to be compressed. The default if this is omitted is\n"
" \"" << dont_compress_str << "\". Specify -Z \"\" (be sure to include the space) to allow\n"
" all files to be compressed.\n\n"
" -T <flag>\n"
" Enable or disable the recording of file timestamps within the multifile.\n"
" If <flag> is 1, timestamps will be recorded within the multifile for\n"
" each subfile added; this is the default behavior. If <flag> is 0,\n"
" timestamps will not be recorded, which will make it easier to do a\n"
" bitwise comparison between multifiles to determine whether their\n"
" contents are equivalent.\n\n"
" -1 .. -9\n"
" Specify the compression level when -z is in effect. Larger numbers\n"
" generate slightly smaller files, but compression takes longer. The\n"
" default is -" << default_compression_level << ".\n\n"
" -N ca-chain.crt\n"
" Adds the indicated certificate chain file to the multifile. This must\n"
" used in conjunction with -c or -u mode. The indicated file must be\n"
" a PEM-formatted collection of certificates, representing the chain of\n"
" authentication from the certificate used to sign the multifile (-S,\n"
" below), and a certificate authority. This may be necessary for\n"
" certain certificates whose signing authority is one or more steps\n"
" removed from a well-known certificate authority. You must add this\n"
" file to the multifile before signing it (or at least at the same time).\n\n"
" -S file.crt,file.key[,\"password\"]\n"
" Sign the multifile. The signing certificate should be in PEM form in\n"
" file.crt, with its private key in PEM form in file.key. If the key\n"
" is encrypted on-disk, specify the decryption password as the third\n"
" option. PEM form is the form accepted by the Apache web server. The\n"
" signature is written to the multifile to prove it is unchanged; any\n"
" subsequent change to the multifile will invalidate the signature.\n"
" This parameter may be repeated to sign the multifile with different\n"
" certificates.\n\n";
}
const string &
get_password() {
if (!got_password) {
cerr << "Enter password: ";
getline(cin, password);
got_password = true;
}
return password;
}
bool
is_named(const string &subfile_name, const vector_string &params) {
// Returns true if the indicated subfile appears on the list of
// files named on the command line.
if (params.empty()) {
// No named files; everything is listed.
return true;
}
vector_string::const_iterator pi;
for (pi = params.begin(); pi != params.end(); ++pi) {
if (subfile_name == (*pi)) {
return true;
}
}
return false;
}
int
get_compression_level(const Filename &subfile_name) {
// Returns the appropriate compression level for the named file.
if (!compress_flag) {
// Don't compress anything.
return 0;
}
string ext = subfile_name.get_extension();
if (dont_compress.find(ext) != dont_compress.end()) {
// This extension is listed on the -Z parameter list; don't
// compress it.
return 0;
}
// Go ahead and compress this file.
return default_compression_level;
}
bool
do_add_files(Multifile *multifile, const pvector<Filename> &filenames,
bool cert_chain_flag);
bool
do_add_directory(Multifile *multifile, const Filename &directory_name,
bool cert_chain_flag) {
vector_string files;
if (!directory_name.scan_directory(files)) {
cerr << "Unable to scan directory " << directory_name << "\n";
return false;
}
pvector<Filename> filenames;
filenames.reserve(files.size());
vector_string::const_iterator fi;
for (fi = files.begin(); fi != files.end(); ++fi) {
Filename subfile_name(directory_name, (*fi));
filenames.push_back(subfile_name);
}
return do_add_files(multifile, filenames, cert_chain_flag);
}
bool
do_add_files(Multifile *multifile, const pvector<Filename> &filenames,
bool cert_chain_flag) {
bool okflag = true;
pvector<Filename>::const_iterator fi;
for (fi = filenames.begin(); fi != filenames.end(); ++fi) {
const Filename &subfile_name = (*fi);
if (subfile_name.is_directory()) {
if (!do_add_directory(multifile, subfile_name, cert_chain_flag)) {
okflag = false;
}
} else if (!subfile_name.exists()) {
cerr << "Not found: " << subfile_name << "\n";
okflag = false;
} else {
string new_subfile_name;
if (update) {
new_subfile_name = multifile->update_subfile
(subfile_name, subfile_name, get_compression_level(subfile_name));
} else {
new_subfile_name = multifile->add_subfile
(subfile_name, subfile_name, get_compression_level(subfile_name));
}
if (new_subfile_name.empty()) {
cerr << "Unable to add " << subfile_name << ".\n";
okflag = false;
} else {
if (verbose) {
cout << new_subfile_name << "\n";
}
if (cert_chain_flag) {
// Set the cert_chain flag on the file.
int index = multifile->find_subfile(new_subfile_name);
nassertr(index >= 0, false);
multifile->set_subfile_is_cert_chain(index, true);
}
}
}
}
return okflag;
}
bool
add_files(const vector_string &params) {
PT(Multifile) multifile = new Multifile;
if (append || update) {
if (!multifile->open_read_write(multifile_name)) {
cerr << "Unable to open " << multifile_name << " for updating.\n";
return false;
}
} else {
if (!multifile->open_write(multifile_name)) {
cerr << "Unable to open " << multifile_name << " for writing.\n";
return false;
}
}
if (got_record_timestamp_flag) {
multifile->set_record_timestamp(record_timestamp_flag);
}
if (encryption_flag) {
multifile->set_encryption_flag(true);
multifile->set_encryption_password(get_password());
}
if (got_header_prefix) {
multifile->set_header_prefix(header_prefix);
}
if (scale_factor != 0 && scale_factor != multifile->get_scale_factor()) {
cerr << "Setting scale factor to " << scale_factor << "\n";
multifile->set_scale_factor(scale_factor);
}
pvector<Filename> filenames;
filenames.reserve(params.size());
vector_string::const_iterator si;
for (si = params.begin(); si != params.end(); ++si) {
Filename subfile_name = Filename::from_os_specific(*si);
filenames.push_back(subfile_name);
}
bool okflag = do_add_files(multifile, filenames, false);
if (okflag && !cert_chain.empty()) {
okflag = do_add_files(multifile, cert_chain, true);
}
if (multifile->needs_repack()) {
if (!multifile->repack()) {
cerr << "Failed to write " << multifile_name << ".\n";
okflag = false;
}
} else {
if (!multifile->flush()) {
cerr << "Failed to write " << multifile_name << ".\n";
okflag = false;
}
}
return okflag;
}
bool
extract_files(const vector_string &params) {
if (!multifile_name.exists()) {
cerr << multifile_name << " not found.\n";
return false;
}
PT(Multifile) multifile = new Multifile;
if (!multifile->open_read(multifile_name)) {
cerr << "Unable to open " << multifile_name << " for reading.\n";
return false;
}
int num_subfiles = multifile->get_num_subfiles();
// First, check to see whether any of the named subfiles have been
// encrypted. If any have, we may need to prompt the user to enter
// a password before we can extract them.
int i;
bool any_encrypted = false;
for (i = 0; i < num_subfiles && !any_encrypted; i++) {
string subfile_name = multifile->get_subfile_name(i);
if (is_named(subfile_name, params)) {
if (multifile->is_subfile_encrypted(i)) {
any_encrypted = true;
}
}
}
if (any_encrypted) {
multifile->set_encryption_password(get_password());
}
// Now walk back through the list and this time do the extraction.
for (i = 0; i < num_subfiles; i++) {
string subfile_name = multifile->get_subfile_name(i);
if (is_named(subfile_name, params)) {
Filename filename = subfile_name;
if (got_chdir_to) {
filename = Filename(chdir_to, subfile_name);
}
if (to_stdout) {
if (verbose) {
cerr << filename << "\n";
}
multifile->extract_subfile_to(i, cout);
} else {
if (verbose) {
cout << filename << "\n";
}
multifile->extract_subfile(i, filename);
}
}
}
return true;
}
bool
kill_files(const vector_string &params) {
if (!multifile_name.exists()) {
cerr << multifile_name << " not found.\n";
return false;
}
PT(Multifile) multifile = new Multifile;
if (!multifile->open_read_write(multifile_name)) {
cerr << "Unable to open " << multifile_name << " for read/write.\n";
return false;
}
if (got_header_prefix) {
multifile->set_header_prefix(header_prefix);
}
int i = 0;
while (i < multifile->get_num_subfiles()) {
string subfile_name = multifile->get_subfile_name(i);
if (is_named(subfile_name, params)) {
Filename filename = subfile_name;
if (verbose) {
cout << filename << "\n";
}
multifile->remove_subfile(i);
} else {
++i;
}
}
bool okflag = true;
if (multifile->needs_repack()) {
if (!multifile->repack()) {
cerr << "Failed to write " << multifile_name << ".\n";
okflag = false;
}
} else {
if (!multifile->flush()) {
cerr << "Failed to write " << multifile_name << ".\n";
okflag = false;
}
}
return okflag;
}
bool
sign_multifile() {
#ifndef HAVE_OPENSSL
cerr << "Cannot sign multifiles without OpenSSL compiled in.\n";
return false;
#else // HAVE_OPENSSL
// Re-open the Multifile, and sign it with the indicated certificate
// and key files.
PT(Multifile) multifile = new Multifile;
if (!multifile->open_read_write(multifile_name)) {
cerr << "Unable to re-open " << multifile_name << " for signing.\n";
return false;
}
vector_string::iterator si;
for (si = sign_params.begin(); si != sign_params.end(); ++si) {
const string &param = (*si);
size_t comma1 = param.find(',');
if (comma1 == string::npos) {
cerr << "Signing parameter requires a comma: " << param << "\n";
return false;
}
size_t comma2 = param.find(',', comma1 + 1);
Filename certificate = Filename::from_os_specific(param.substr(0, comma1));
Filename pkey;
string password;
if (comma2 != string::npos) {
pkey = Filename::from_os_specific(param.substr(comma1 + 1, comma2 - comma1 - 1));
password = param.substr(comma2 + 1);
} else {
pkey = Filename::from_os_specific(param.substr(comma1 + 1));
}
if (!multifile->add_signature(certificate, pkey, password)) {
return false;
}
}
return true;
#endif // HAVE_OPENSSL
}
const char *
format_timestamp(bool record_timestamp, time_t timestamp) {
static const size_t buffer_size = 512;
static char buffer[buffer_size];
if (!record_timestamp) {
// No timestamps.
return "";
}
if (timestamp == 0) {
// A zero timestamp is a special case.
return " (no date) ";
}
time_t now = time(NULL);
struct tm *tm_p = localtime(&timestamp);
if (timestamp > now || (now - timestamp > 86400 * 365)) {
// A timestamp in the future, or more than a year in the past,
// gets a year appended.
strftime(buffer, buffer_size, "%b %d %Y", tm_p);
} else {
// Otherwise, within the past year, show the date and time.
strftime(buffer, buffer_size, "%b %d %H:%M", tm_p);
}
return buffer;
}
bool
list_files(const vector_string &params) {
if (!multifile_name.exists()) {
cerr << multifile_name << " not found.\n";
return false;
}
PT(Multifile) multifile = new Multifile;
if (!multifile->open_read(multifile_name)) {
cerr << "Unable to open " << multifile_name << " for reading.\n";
return false;
}
int num_subfiles = multifile->get_num_subfiles();
int i;
if (verbose) {
cout << num_subfiles << " subfiles:\n" << flush;
for (i = 0; i < num_subfiles; i++) {
string subfile_name = multifile->get_subfile_name(i);
if (is_named(subfile_name, params)) {
char encrypted_symbol = ' ';
if (multifile->is_subfile_encrypted(i)) {
encrypted_symbol = 'e';
}
char cert_chain_symbol = ' ';
if (multifile->get_subfile_is_cert_chain(i)) {
cert_chain_symbol = 'N';
}
if (multifile->is_subfile_compressed(i)) {
size_t orig_length = multifile->get_subfile_length(i);
size_t internal_length = multifile->get_subfile_internal_length(i);
double ratio = 1.0;
if (orig_length != 0) {
ratio = (double)internal_length / (double)orig_length;
}
if (ratio > 1.0) {
printf("%12d worse %c%c %s %s\n",
(int)multifile->get_subfile_length(i),
encrypted_symbol, cert_chain_symbol,
format_timestamp(multifile->get_record_timestamp(),
multifile->get_subfile_timestamp(i)),
subfile_name.c_str());
} else {
printf("%12d %3.0f%% %c%c %s %s\n",
(int)multifile->get_subfile_length(i),
100.0 - ratio * 100.0,
encrypted_symbol, cert_chain_symbol,
format_timestamp(multifile->get_record_timestamp(),
multifile->get_subfile_timestamp(i)),
subfile_name.c_str());
}
} else {
printf("%12d %c%c %s %s\n",
(int)multifile->get_subfile_length(i),
encrypted_symbol, cert_chain_symbol,
format_timestamp(multifile->get_record_timestamp(),
multifile->get_subfile_timestamp(i)),
subfile_name.c_str());
}
}
}
fflush(stdout);
if (multifile->get_record_timestamp()) {
cout << "Last modification "
<< format_timestamp(true, multifile->get_timestamp()) << "\n";
}
if (multifile->get_scale_factor() != 1) {
cout << "Scale factor is " << multifile->get_scale_factor() << "\n";
}
if (multifile->needs_repack()) {
cout << "Multifile needs to be repacked.\n";
}
} else {
for (i = 0; i < num_subfiles; i++) {
string subfile_name = multifile->get_subfile_name(i);
if (is_named(subfile_name, params)) {
cout << subfile_name << "\n";
}
}
}
#ifdef HAVE_OPENSSL
int num_signatures = multifile->get_num_signatures();
if (num_signatures != 0) {
multifile->load_certificate_chains();
cout << "\n";
for (i = 0; i < num_signatures; ++i) {
cout << "Signed by " << multifile->get_signature_common_name(i);
int verify_result = multifile->validate_signature_certificate(i);
if (verify_result == 0) {
cout << " (certificate validated)\n";
} else {
cout << " (certificate unknown, reason " << verify_result << ")\n";
}
if (verbose) {
multifile->write_signature_certificate(i, cout);
cout << "\n";
}
}
}
#endif // HAVE_OPENSSL
return true;
}
void
tokenize_extensions(const string &str, pset<string> &extensions) {
size_t p = 0;
while (p < str.length()) {
size_t q = str.find_first_of(",", p);
if (q == string::npos) {
extensions.insert(str.substr(p));
return;
}
extensions.insert(str.substr(p, q - p));
p = q + 1;
}
extensions.insert(string());
}
int
main(int argc, char *argv[]) {
if (argc < 2) {
usage();
return 1;
}
// To emulate tar, we assume an implicit hyphen in front of the
// first argument if there is not one already.
if (argc >= 2) {
if (*argv[1] != '-' && *argv[1] != '\0') {
char *new_arg = (char *)PANDA_MALLOC_ARRAY(strlen(argv[1]) + 2);
new_arg[0] = '-';
strcpy(new_arg + 1, argv[1]);
argv[1] = new_arg;
}
}
extern char *optarg;
extern int optind;
static const char *optflags = "crutxkvz123456789Z:T:S:T:f:OC:ep:P:F:h";
int flag = getopt(argc, argv, optflags);
Filename rel_path;
while (flag != EOF) {
switch (flag) {
case 'c':
create = true;
break;
case 'r':
append = true;
break;
case 'u':
update = true;
break;
case 't':
tlist = true;
break;
case 'x':
extract = true;
break;
case 'k':
kill_cmd = true;
break;
case 'v':
verbose = true;
break;
case 'z':
compress_flag = true;
break;
case '1':
default_compression_level = 1;
compress_flag = true;
break;
case '2':
default_compression_level = 2;
compress_flag = true;
break;
case '3':
default_compression_level = 3;
compress_flag = true;
break;
case '4':
default_compression_level = 4;
compress_flag = true;
break;
case '5':
default_compression_level = 5;
compress_flag = true;
break;
case '6':
default_compression_level = 6;
compress_flag = true;
break;
case '7':
default_compression_level = 7;
compress_flag = true;
break;
case '8':
default_compression_level = 8;
compress_flag = true;
break;
case '9':
default_compression_level = 9;
compress_flag = true;
break;
case 'Z':
dont_compress_str = optarg;
break;
case 'N':
cert_chain.push_back(Filename::from_os_specific(optarg));
break;
case 'S':
sign_params.push_back(optarg);
break;
case 'T':
{
int flag;
if (!string_to_int(optarg, flag) ||
(flag != 0 && flag != 1)) {
cerr << "Invalid timestamp flag: " << optarg << "\n";
usage();
return 1;
}
record_timestamp_flag = (flag != 0);
got_record_timestamp_flag = true;
}
break;
case 'f':
multifile_name = Filename::from_os_specific(optarg);
got_multifile_name = true;
break;
case 'C':
chdir_to = Filename::from_os_specific(optarg);
got_chdir_to = true;
break;
case 'O':
to_stdout = true;
break;
case 'e':
encryption_flag = true;
break;
case 'p':
password = optarg;
got_password = true;
break;
case 'P':
header_prefix = optarg;
got_header_prefix = true;
break;
case 'F':
{
char *endptr;
scale_factor = strtol(optarg, &endptr, 10);
if (*endptr != '\0') {
cerr << "Invalid integer: " << optarg << "\n";
usage();
return 1;
}
if (scale_factor == 0) {
cerr << "Scale factor must be nonzero.\n";
usage();
return 1;
}
}
break;
case 'h':
help();
return 1;
case '?':
usage();
return 1;
default:
cerr << "Unhandled switch: " << flag << endl;
break;
}
flag = getopt(argc, argv, optflags);
}
argc -= (optind - 1);
argv += (optind - 1);
// We should have exactly one of these options.
if ((create?1:0) + (append?1:0) + (update?1:0) + (tlist?1:0) + (extract?1:0) + (kill_cmd?1:0) != 1) {
cerr << "Exactly one of -c, -r, -u, -t, -x, -k must be specified.\n";
usage();
return 1;
}
if (!got_multifile_name) {
cerr << "Multifile name not specified.\n";
usage();
return 1;
}
// Split out the extensions named by -Z into different words.
tokenize_extensions(dont_compress_str, dont_compress);
// Build a list of remaining parameters.
vector_string params;
params.reserve(argc - 1);
for (int i = 1; i < argc; i++) {
params.push_back(argv[i]);
}
bool okflag = true;
if (create || append || update) {
okflag = add_files(params);
} else if (extract) {
if (got_record_timestamp_flag) {
cerr << "Warning: -T ignored on extract.\n";
}
okflag = extract_files(params);
} else if (kill_cmd) {
if (got_record_timestamp_flag) {
cerr << "Warning: -T ignored on kill.\n";
}
okflag = kill_files(params);
} else { // list
if (got_record_timestamp_flag) {
cerr << "Warning: -T ignored on list.\n";
}
okflag = list_files(params);
}
if (okflag && !sign_params.empty()) {
sign_multifile();
}
if (okflag) {
return 0;
} else {
return 1;
}
}